Cyber Affairs
No Result
View All Result
  • Login
  • Register
  • Home
  • Live Threat Map
  • Books
  • Careers
  • Latest
  • Podcast
  • Popular
  • Press Release
  • Reports
  • Tech Indexes
  • White Papers
  • Contact
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
COMMUNITY
NEWSLETTER
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
NEWSLETTER
No Result
View All Result
Cyber Affairs
No Result
View All Result
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers
Home Cyber Intelligence

Cyber ​​Threats Awaiting the World in 2023

admin by admin
Dec 21, 2022
in Cyber Intelligence
0 0
A A
0
FacebookTwitterLinkedIn
Cyber ​​Threats Awaiting the World in 2023

Laykon Bilişim has announced its predictions for cyber security trends that will come to the fore in 2023. ​Alev Akkoyunlu, Operations Director of Laykon Bilişim, the Turkey distributor of Bitdefender Antivirus, Alev Akkoyunlu, Operations Director of Laykon Bilişim, shares 6 cyber security predictions that we will encounter frequently next year.

“one. Coding with artificial intelligence tools will create many fundamental vulnerabilities.”

Artificial intelligence tools have developed immensely in the new era. AI and ML tools can provide written answers, code for users, prepare lyrics, and rank your dinners. Although this amazing technology excites us, it also brings many security vulnerabilities. Artificial intelligence leverages existing computer code to create new algorithms and code. This is how ChatGPT and GitHub’s Copilot auto-encoding tool released by OpenAI work. Using big data consisting of billions of sample code lines, these artificial intelligence-based applications can also use vulnerable code. Whatever is given to artificial intelligence, it will offer us the same. We foresee that the very useful structure of artificial intelligence and the comfort it provides may create critical security vulnerabilities in the application to be implemented by a software developer who trusts AI coding tools in the future.

“2. Attacks on electric vehicles will increase”

The automotive industry is developing day by day, and depending on this development, it has been going through a digital transformation especially in the last 10 years, which includes the emergence of autonomous and electric vehicles with unique safety features, using artificial intelligence. Vehicles that were once purely mechanical have become digital devices with millions of lines of code and many electronic control units after their digital transformation. New electric vehicles are the number one target of cybercriminals as they have more ports and become digital than before. Electric vehicle manufacturers should resort to effective cybersecurity measures against security vulnerabilities and possible phishing by cybercriminals that may occur during vehicle updates or at charging stations. With the increasing demand for electric vehicles, we anticipate that cyber attacks against electric vehicles will increase both in Turkey and in the world.

“3. We will see attacks on the Metaverse more often.”

Although it has lost its place on the agenda, studies on the metaverse universe continue at full speed. It would not be wrong to say that we will live in a mixed real and digital life in the next 10 years. Metaverse will change all our norms and create brand new opportunities. The metaverse, which has the effect and potential to replicate the effect of internet technology, will also be the number one target of cyber attackers. We anticipate that frauds and manipulations will increase in the Metaverse universe, which will create brand new opportunities for companies in a wide range from increasing their social assets to office work, from individual payments to healthcare services. Although generations Z and Alpha can anticipate these attacks because they were born into technology, it can be extremely easy for older age groups to be fooled. Technologies that secure the IT devices needed by the metadata warehouse will be the most prominent areas of the future for the cyber security field.

“4. There may be cyber wars between states”

Cyber ​​attacks are one of the methods used not only by hackers or cybercriminals, but also by large organizations and states. The struggle of states with traditional methods stands in a very challenging position in terms of both time and cost. On the other hand, with cyber intelligence methods, states can access information faster, more effectively and at less cost. The cyber attacks not only affect the targeted institutions, but also create a ripple effect that concerns everyone in the supply chain. Keeping up with the digitalizing world continues to be one of the main duties of states. The largest countries in the world, especially the United States of America, are increasing their cyber security measures in all other areas, especially in national security. We foresee that the possibility of interstate cyber warfare in 2023 is highly probable and we expect the attacks to be carried out in this direction to continue increasingly.

“5. Zero Trust will be adopted by more companies”

The tech industry is still not using zero trust cybersecurity principles enough. Zero trust is a security framework that requires all users, inside or outside of the network, to be authenticated, authorized, and continually verifying the state of their security configuration before access to applications and data is granted. Zero trust provides services to protect both infrastructure and data in today’s digital transformation. While many organizations make extensive use of zero trust integration, it is still not enough. We expect rapid adoption of the zero trust approach, which is one of the most fundamental parts of developing cyber security measures, which tries to verify the identities of users wherever possible in a modern cloud infrastructure in the coming period.

“6. Cryptocurrencies will be on target again”

Blockchain is a huge technology that includes all bitcoin and other altcoins. While the economic fluctuation in the world, unemployment and the radical decisions taken by the countries regarding local monetary policies caused the local currencies to fall, it caused an increase in the interest of users in digital currencies, especially bitcoin. This situation leads ordinary investors who do not fully understand how cryptocurrencies work, to enter the crypto money market. We predict that fraudulent activities against this group, which will be the main target of cyber attackers, will increase significantly. Although there is a long stagnation in the crypto money markets, we will see both attacks on digital money with ransom demands and attacks on digital currency wallets more frequently in 2023.

Read the full article here

ShareTweetSharePinShareShareSend

Related Articles

Cyberattack on Fintech Firm Disrupts Derivatives Trading Globally
Cyber Intelligence

Cyberattack on Fintech Firm Disrupts Derivatives Trading Globally

Palo Alto Networks and TELMEX-Scitum Reinforce Their Commitment to Offer Extended Managed Detection and Response (XMDR)
Cyber Intelligence

Palo Alto Networks and TELMEX-Scitum Reinforce Their Commitment to Offer Extended Managed Detection and Response (XMDR)

Using real-time data platforms to plug cybersecurity skills gap
Cyber Intelligence

Using real-time data platforms to plug cybersecurity skills gap

Trace3, ExtraHop Launch Managed Detection and Response (MDR) Services
Cyber Intelligence

Trace3, ExtraHop Launch Managed Detection and Response (MDR) Services

Spain: Rights experts call for probe into claim Catalan leaders were spied on
Cyber Intelligence

Spain: Rights experts call for probe into claim Catalan leaders were spied on

Enterprise Exposure to Cyberattacks Vastly Elevated with Increased Dependency on Third-Party Partners
Cyber Intelligence

Enterprise Exposure to Cyberattacks Vastly Elevated with Increased Dependency on Third-Party Partners

How Do Threat Hunters Keep Organizations Safe?
Cyber Intelligence

How Do Threat Hunters Keep Organizations Safe?

Cyber Threat Intelligence Services Market to Witness Huge
Cyber Intelligence

Cyber Threat Intelligence Services Market to Witness Huge

APT groups use ransomware TTPs as cover for intelligence gathering and sabotage
Cyber Intelligence

APT groups use ransomware TTPs as cover for intelligence gathering and sabotage

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended Stories

Chinese Chipmaker Nexperia: Gigabytes of Data Stolen

Chinese Chipmaker Nexperia: Gigabytes of Data Stolen

Popular VPN Software Flaw Let Attackers Crash the Systems

Popular VPN Software Flaw Let Attackers Crash the Systems

Hackers Customize LockBit 3.0 Ransomware To Attack Orgs Worldwide

Hackers Customize LockBit 3.0 Ransomware To Attack Orgs Worldwide

What Security Leaders Need to Know

What Security Leaders Need to Know

Iran launched a Cyberattack Against Critical Infrastructure in Israel

Iran launched a Cyberattack Against Critical Infrastructure in Israel

The most important cyber news and events of the day

Be the first to know latest important news & events directly to your inbox.

By signing up, I agree to our TOS and Privacy Policy.

Popular Stories

  • Fortinet Vulnerability Exploited To Deploy RMM Tools & Backdoor

    Fortinet Vulnerability Exploited To Deploy RMM Tools & Backdoor

    0 shares
    Share 0 Tweet 0
  • Malware Trends 2024 – Top Malware Families and Types

    0 shares
    Share 0 Tweet 0
  • French Football Club Ticketing System Targeted in Cyber Attack

    0 shares
    Share 0 Tweet 0
  • Singha Durbar server continues to face cyberattacks

    0 shares
    Share 0 Tweet 0
  • Argentina – Global Investigations Review

    0 shares
    Share 0 Tweet 0
Cyber Affairs

Cyber Affairs is your one-stop news website for the latest cyber crime, cyber warfare, and all cyber related news and updates, follow us to get the news that matters to you.

LEARN MORE »

Recent News

  • Chinese Chipmaker Nexperia: Gigabytes of Data Stolen
  • Popular VPN Software Flaw Let Attackers Crash the Systems
  • Hackers Customize LockBit 3.0 Ransomware To Attack Orgs Worldwide

Topics

  • AI
  • Books
  • Careers
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • News
  • Podcast
  • Reports
  • Tech Indexes
  • Uncategorized
  • White Papers

Get Informed

The most important cyber news and events of the day

Be the first to know latest important news & events directly to your inbox.

By signing up, I agree to our TOS and Privacy Policy.

Copyright © 2022 Cyber Affairs. All rights reserved.

No Result
View All Result
  • Home
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers

Copyright © 2022 Cyber Affairs. All rights reserved.

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.