22
Dom, Dic
0 New Articles

Reports and Coverage
Typography
  • Smaller Small Medium Big Bigger
  • Default Helvetica Segoe Georgia Times

Amidst the bustling ecosystem of data centers, AI advancements, and telecom networks, it is important to shed a light on the web of cybersecurity which aims to protect our lives digitally. Staying ahead is the cornerstone of safeguarding our digital future.

According to Google Cloud Security’s M-Trends 2024 Special Report, high tech is among the top three most targeted industries, as it has a variety of sensitive information, including proprietary business information, personally identifiable information (PII), protected health information (PHI), and financial data.

Despite attackers’ efforts to evade detection, defenders are also continuing to get better at identifying compromises. In 2023, more than half of compromised organizations (54%) first learned of a compromise from an external source, while 46% first identified evidence of a compromise internally.

Attackers have also abused service providers and technology organizations to facilitate third-party compromises or to obtain access to data or networks belonging to many organizations through a single compromise.

Over the past three years, automated intrusions stemming from compromised architectures have surged, driven by widespread exploitation of vulnerabilities. Having said that, the top five malware categories have shown remarkable consistency year after year, comprising backdoors (33%), downloaders (16%), droppers (15%), credential stealers (7%), and ransomware (5%).

Clearly, cyberattacks wield the potential for widespread disruption, with business interruptions accounting for approximately 60% of the value of cyber claims. Due to this, projections suggest that by 2025, about 60% of organizations will integrate cybersecurity risk assessment as a pivotal factor in their decision-making processes for transactions and business collaborations with third parties.

Outlook in the Americas

Extracting more valuable insights from the M-Trends report, in the Americas, about two-thirds of ransomware-related intrusions were externally reported, often initiated by attackers themselves via ransom notes. Additionally, the median dwell time, representing the duration attackers remain undetected within a target environment, stood at 10 days.

To combat this, organizations in the Americas have been enhancing their detection capabilities, with 45% of intrusions identified within a week or less. Mandiant investigations revealed that in 68.5% of cases, defenders were notified of intrusions within 30 days. Notably, there was a slight increase in intrusions detected within five years or less, coupled with a decrease in intrusions lingering undetected for over five years.

Globally, organizations are deriving significant value from their investments in cybersecurity services, with cybersecurity strategy, cyber cloud, and data protection and privacy emerging as top value-driving capabilities across the Americas, EMEA, and APAC regions, as per the responses of nearly 75% of surveyed respondents.

Deloitte's 2023 Global Future of Cyber Survey also highlighted the Americas, particularly the US, in reporting the highest negative impact across operational disruption, brand damage, and financial impact categories.

In the Latin American region, countries like Brazil and Chile, recognized as cyber-capable, are urged to take on more proactive leadership roles in enhancing regional cybersecurity cooperation. According to a Netscout DDoS Threat Intelligence Report, wireless telecom carriers topped the list of industries targeted by DDoS attacks in Brazil during the first half of 2023. This underscores the evolving threat landscape where Brazil not only faces cyber threats but also serves as a source of attacks.

Cyber incidents in countries such as Costa Rica and Colombia have spurred the establishment of comprehensive cybersecurity policies across Latin America.

Cyber Resilience in Data Centers

Data centers serve as crucial repositories for vast amounts of sensitive data, rendering them attractive targets for cybercriminals. These facilities face an array of threats ranging from phishing attacks and malware infections to DDoS assaults and insider breaches. Safeguarding against such threats necessitates the implementation of robust security measures encompassing a comprehensive cybersecurity strategy.

Over the past decade, prominent data center providers, including industry giants like Google, Amazon Web Services, OVH, and GitHub, have fallen victim to major DDoS attacks. Such incidents underscore the pressing need for heightened security measures within the industry.

Looking ahead to 2024, the data center industry is poised to prioritize fortifying its defenses by implementing zero-trust security models, deploying advanced threat detection and prevention systems, and enhancing secure hardware architectures. Collaboration with cybersecurity experts and adherence to best practices will be instrumental in safeguarding sensitive information and critical infrastructure.

By embedding security protocols at every layer, the industry aims to instill trust and confidence in the digital ecosystem while mitigating the risks associated with our growing reliance on data.

The integration of AI into cybersecurity defenses marks a significant advancement, especially within storage systems. Leveraging ML capabilities, these systems can proactively identify and mitigate various cyber threats, including ransomware and emerging AI-based attacks, in real-time, thus providing a crucial layer of defense.

In response, companies are reconfiguring their data centers to accommodate the additional computing power required by AI applications, alongside related energy consumption and cooling considerations. It's imperative for all industry participants to proactively adapt to these trends, devising strategies to address the evolving landscape and staying ahead of future requirements.

Moreover, the rise of cloud computing underscores the importance of 'confidential computing' to safeguard data during processing, relying on trusted execution environments (TEEs) to ensure secure computation and access sensitive data.

Navigating the Intersection of AI and Security

AI is increasingly vital in cybersecurity, aiding threat detection, reducing workload, and addressing talent shortages. While attackers have limited AI use, they employ it for social engineering and information operations.

To defend networks, AI development teams focus on aligning values within language models, termed "AI Alignment," to ensure models adhere to ethical guidelines. This alignment serves as a safeguard against malicious AI use, compelling attackers to operate within defined boundaries or attempt to breach them.

Developers must innovate AI Alignment approaches to balance legitimate and malicious uses while securing model access. Combining red team expertise with AI could enhance defense against motivated attackers.

However, generative AI integration isn't a cure-all. Effective data governance is crucial for navigating challenges and driving innovation responsibly.

Telecom Industry

Within the telecom industry, a lot of cyber attacks have been recorded, and this will not slow down anytime soon as the service coverage expands and more data are collected. We can cite several examples that alarmingly raise the case for a better cybersecurity strategy within industry players.

In October 2023, Chile's Grupo GTD suffered a ransomware attack impacting various services, while in September 2023, approximately 63,000 Verizon employees fell victim to a breach. The breach was discovered three months later and was attributed to an insider threat labeled as an "inadvertent disclosure." A compromise from an AT&T marketing vendor also exposed data from nearly 9 million wireless telecom accounts.

Additionally, telecom companies face threats from advanced persistent threat (APT) actors like "Sandman," deploying a novel backdoor named "LuaDream" using LuaJIT.

"LuaDream," observed in attacks across the Middle East, Western Europe, and South Asia, is highly modular, enabling data theft and future attacks.

In a similar context, the LightBasin hacking group harvested mobile network data from at least 13 telecom companies, emphasizing the need to critically evaluate existing cybersecurity standards and best practices.

In late 2023, a new Linux malware dubbed "GTPDOOR" emerged as the latest threat for the telecommunication sector, attributed to LightBasin.

These are just some of the attacks observed within the industry. While advanced technologies offer enhanced protection to fight this, nurturing skilled cybersecurity professionals and fostering a culture of security within organizations is crucial.

Furthermore, with the support of the government, the severity of the attacks can be prevented. Starting March 2024, telecom and VoIP providers must issue data breach notifications to customers whenever personally identifiable information (PII) is involved, as per new FCC rules requiring prompt reporting to relevant authorities.

Conclusion

In the dynamic landscape of today's technology-driven world, where data centers, AI innovations, and telecom networks intersect, cybersecurity emerges as the critical guardian of our digital lives.

As demonstrated by recent breaches and attacks, staying ahead of evolving threats is imperative to secure our digital future. By embracing proactive measures, harnessing the power of advanced technologies, and fostering a culture of vigilance, we can navigate the complexities of cyberspace and ensure the resilience of our interconnected world.