AI Automated Cyber Attacks are on the Horizon; Keeper Security Report

Emerging Tech like AI, AI automation, Zero Trust and IoT fueling up sophisticated cyber attacks.AI based threats are a new kind to deal and making a proactive cyber strategy is on the radar for every  organization .

Keeper Security, announced the releases key findings from its latest survey about what’s on the cybersecurity horizon.

The organization is provider of zero-trust and zero-knowledge cybersecurity software that protects passwords, passkeys, privileged access, secrets and remote connections.

The survey of more than 800 IT security leaders around the globe finds that the vast majority (95%) believe cyber attacks are more sophisticated than they have ever been.

AI-powered attacks emerge as the most serious and phishing attacks are widely considered to be increasing the fastest.

The cyber security landscape in 2024 showcases a compelling mix of factors with novel AI threats casting a looming shadow.

The dynamic environment underscores the necessity for proactive cyber security strategies that can adeptly counter both existing and emerging threats.

The Respondents ranked the most serious attack vectors as follows:

  1. AI-Powered Attacks
  2. Deepfake Technology
  3. Supply Chain Attacks
  4. Cloud Jacking
  5. Internet of Things (IoT) Attacks

According to global IT leaders, the attack vectors increasing the fastest are:

  1. Phishing
  2. Malware
  3. Ransomware
  4. Password Attacks
  5. Denial of Service (DoS)

“As emerging technologies, such as AI, fuel the next wave of cyber threats, a great paradox lies in our ability to implement the very innovations that, if not controlled properly, will radically increase cyber risk,” said¬†Darren Guccione, CEO and Co-founder, Keeper Security.

“With the cybersecurity tools at our disposal today, we possess the arsenal to mitigate emerging threats – thereby converting this challenge into an opportunity for resilience and fortification of our digital defenses.”

As technology continues to advance, evolving threats demand constant adaptation, which must remain a top priority for IT leaders.

A password manager can mitigate risks by enforcing strong password practices, while privileged access management safeguards an organization’s vital assets by controlling and monitoring high-level access, collectively fortifying defences and minimizing potential damage in the event of a cyber-attack.

Integrating these solutions creates a layered security approach that restricts unauthorized access and enhances overall cybersecurity resilience.


Leave a Reply

Your email address will not be published. Required fields are marked *