Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Hazy Hawk exploits DNS Records in CDC CDC, Corporate Domains for Delivery Programs

May 20, 2025

100+ fake expansion of chromed found sessions, theft of credentials, injection ads

May 20, 2025

AWS default Iam roles that allow you to enable side motion and cross -service operation

May 20, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Exclamating the excitement of AI: Inside a true hacker tactics
Global Security

Exclamating the excitement of AI: Inside a true hacker tactics

AdminBy AdminFebruary 18, 2025No Comments4 Mins Read
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


February 18, 2025Hacker NewsArtificial intelligence / cyber -defense

It’s AI really Restoration of the cyber-threatening landscape, or the constant eardrum of excitement, which drown with a real, more sensitive, real danger? According to Picus Labs Red Report 2025 In which more than a million samples of malware are analyzed, there has not been a significant overvoltage. Yes, opponents certainly continue innovation, and although II will certainly start playing a greater and big role, the latest data suggest that a set of known tactics, methods and procedures (TTPS) is still dominated in the industry.

The noise around artificial intelligence certainly dominates the media headlines; However, data in the real world paint a much more nuanced picture that thrive threats to malware, and why. Here is a view of the most important conclusions and trends that form the most detailed competition companies in the year and what steps of cybersecurity teams should take them to answer them.

Why the excitement of AI lacking … at least

While the titles trumpets II, as one in the size of a new secret weapon for cybercriminals, statistics-and-still reveals a completely different story. Really, after data parsing, Picus Labs did not find a significant rise in the AI ​​-based tactics in 2024. Yes, the opponents began to include II to improve efficiency, such as developing more reliable phishing sheets or creating/ debuging malicious code, but they have not yet undergone the transformation force of AI overwhelmingly. Really, data from Red Report 2025 shows that you can still disrupt most of the attacks by focusing on proven TTPS.

“Security teams should prefer the definition and elimination of critical gaps in defense rather than secure the potential II influence.” – Picus Red Report 2025

The theft accounts are more than 3 times (8% → 25%)

The attackers are increasingly aiming at the passwords, accounts that store the browser, and cached inputs using stolen keys to escalate privileges and spread in networks. This three -time leap emphasizes the urgent need for constant and reliable management of powers in combination with active threats.

Modern malicious Infosteeler orchestral multi -stage hens style mixing stealth, automation and perseverance. With legitimate processes containing harmful operations and actual everyday network traffic, hiding pre -loaded data, bad actors can allocate data directly under the proclamation of your team, is not required in Hollywood style. Think about this as a digital equivalent of a perfect choreographic hacking. Only criminals do not peel off in a vacation car; They are silently hiding, waiting for your next step or opening.

93% malware uses at least one top -10 MITER ATT & CK Technique

Despite the wide Frame Miter ATT & CK®Most opponents follow the main set of TTPS. Among the best 10 ATT & CK methods given in the Red Report, the following exploration methods and stealth remain the most used:

Combined effect? The legitimate processes that seem to use legitimate tools to collect and transfer data on widely used network channels. Not surprisingly, these methods can only be difficult to detect signature -based methods. However, the use of behavioral analysis, especially when several methods are used to monitor and data ratio together, greatly facilitates the anomalies. Security teams should focus on finding a harmful activity that seems virtually indistinguishable from regular network traffic.

Back to the basics for better protection

Today’s threats often unite many stages of the attack to penetrate, persist and exploit. As long as one step will be determined, the attackers may have already moved to the next one. Thus, while the threat landscape is undoubtedly complicated, the silver lining, revealed in the red report of 2025, quite simple: Most current malicious activities actually rotate around a small set of attack methods. Following the current foundations of cybersecurity, such as strict protection accounting, extended threats and permanent security check, organizations can confidently ignore the tsunami ai excitement and focus instead of resisting the threats that are actually targeting today.

Ready to cut through the excitement of the II and strengthen the defense?

While the headings are recorded on AI, Picus Security, Pioneer Violation and Modeling Attack (BAS) Since 2013, the methods and methods that attackers actually use: tested TTPS are carefully focused on the methods and methods. The Picus security platform constantly evaluates and strengthens the protection of organizations, emphasizing the basics such as protecting accounts and rapid detection of threats.

Ready to see the difference for yourself? Download Picus Red 2025 report either visit picusssecurity.com To learn how to adjust the excitement and keep real threats in fear.

Note: This article wrote Doctor assumes that Oarlah.

Found this article interesting? This article is a contribution to one of our esteemed partners. Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Hazy Hawk exploits DNS Records in CDC CDC, Corporate Domains for Delivery Programs

May 20, 2025

100+ fake expansion of chromed found sessions, theft of credentials, injection ads

May 20, 2025

AWS default Iam roles that allow you to enable side motion and cross -service operation

May 20, 2025

South Asia ministries affected by SIDGE APT using old office deficiencies and custom malicious programs

May 20, 2025

Basic ideas from the 2025 state report

May 20, 2025

Chinese hackers unfold the back of Marsssnake in a perennial attack on the Saudi Organization

May 20, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Hazy Hawk exploits DNS Records in CDC CDC, Corporate Domains for Delivery Programs

May 20, 2025

100+ fake expansion of chromed found sessions, theft of credentials, injection ads

May 20, 2025

AWS default Iam roles that allow you to enable side motion and cross -service operation

May 20, 2025

South Asia ministries affected by SIDGE APT using old office deficiencies and custom malicious programs

May 20, 2025

Basic ideas from the 2025 state report

May 20, 2025

Chinese hackers unfold the back of Marsssnake in a perennial attack on the Saudi Organization

May 20, 2025

Based on GO based on malicious programs deployed Xmrig Miner on hosts Linux through Redis configuration abuse

May 20, 2025

Malicious Pypi Packages Operating Instagram and Tiktok API to verify users’ accounts

May 20, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Hazy Hawk exploits DNS Records in CDC CDC, Corporate Domains for Delivery Programs

May 20, 2025

100+ fake expansion of chromed found sessions, theft of credentials, injection ads

May 20, 2025

AWS default Iam roles that allow you to enable side motion and cross -service operation

May 20, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.