{"id":27983,"date":"2024-09-13T15:43:03","date_gmt":"2024-09-13T10:13:03","guid":{"rendered":"https:\/\/www.kaspersky.co.in\/blog\/?p=27983"},"modified":"2024-09-23T13:49:03","modified_gmt":"2024-09-23T08:19:03","slug":"apac-cybersecurity-weekend-2024","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.in\/blog\/apac-cybersecurity-weekend-2024\/27983\/","title":{"rendered":"The future after AI: are we ready for the post-AI era?"},"content":{"rendered":"<p>We\u2019ve just wrapped up our 10th annual APAC Cybersecurity Weekend in Negombo, Sri Lanka, from August 4-7, 2024. The media conference addressed the pressing question: \u201cAre we prepared for the rise of offensive AI and the future of cyberthreats?\u201d<\/p>\n<p>From generative AI tools to supply chain vulnerabilities, the event highlighted strategies that every organization must consider to stay secure in a rapidly changing digital landscape.<\/p>\n<h2>Kaspersky\u2019s use of AI<\/h2>\n<p>Kaspersky has been leveraging AI technologies for years to protect our customers. We employ various AI models to detect threats and continuously research AI vulnerabilities to ensure our technologies remain resilient. Our ongoing studies of harmful AI techniques aim to provide reliable protection against the evolving landscape of offensive AI.<\/p>\n<h2>Evolving threats, evolving defences<\/h2>\n<div id=\"attachment_27987\" style=\"width: 4010px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-27987\" class=\"wp-image-27987 size-full\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2024\/09\/13132704\/AYH09004-Enhanced-NR.jpg\" alt=\"\" width=\"4000\" height=\"2667\"><p id=\"caption-attachment-27987\" class=\"wp-caption-text\">Adrian Hia, Managing Director for APAC<\/p><\/div>\n<p>Our event kicked off with a keynote from <strong>Adrian Hia, Managing Director for APAC<\/strong>, who highlighted the increasing challenges posed by generative AI threats. He shared insights into advanced data protection strategies and stressed the need for organisations to stay ahead of evolving data regulations across the region.<\/p>\n<p>Adrian emphasised that with the widespread availability of GenAI tools, cybercriminals now have easier access to powerful resources. AI is here to stay, and businesses must carefully assess what data they allow AI to access while aligning their compliance strategies.<\/p>\n<p><strong>Igor Kuznetsov, Director of the Global Research &amp; Analysis Team (GReAT)<\/strong>, highlighted the increasing sophistication and scale of cyberattacks across the APAC region.<\/p>\n<div id=\"attachment_27990\" style=\"width: 4010px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-27990\" class=\"wp-image-27990 size-full\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2024\/09\/13134118\/AYH09054-Enhanced-NR.jpg\" alt=\"\" width=\"4000\" height=\"2667\"><p id=\"caption-attachment-27990\" class=\"wp-caption-text\">Igor Kuznetsov, Director of the Global Research &amp; Analysis Team (GReAT),<\/p><\/div>\n<p>\u201cGovernments were the most frequent target of threat actors, followed a distant second by manufacturing and financial institutions, with ransomware and cybersabotage posing the greatest cyberthreat risk,\u201d Igor explained.<\/p>\n<p>Our security solutions protected over 220,000 businesses globally, preventing 6.1 billion attacks and detecting and stopping 437 million internet-borne threats. In addition, over 325,000 users were protected from financial loss through the detection of banking Trojans.<\/p>\n<p>The session also shed light on <a href=\"https:\/\/securelist.com\/trng-2023\/\" target=\"_blank\" rel=\"nofollow noopener\"><strong>Operation Triangulation<\/strong><\/a>, a zero-click iMessage attack that exploited four zero-day vulnerabilities, targeting iOS versions up to 16.2. Igor emphasised that organisations need a comprehensive strategy, skilled teams, advanced technology and strong threat intelligence to build a resilient security posture against evolving threats.<\/p>\n<h2>Threats of offensive AI<\/h2>\n<div id=\"attachment_27992\" style=\"width: 4010px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-27992\" class=\"wp-image-27992 size-full\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2024\/09\/13150214\/AYH09259-Enhanced-NR.jpg\" alt=\"\" width=\"4000\" height=\"2667\"><p id=\"caption-attachment-27992\" class=\"wp-caption-text\">Alexey Antonov, Lead Data Scientist<\/p><\/div>\n<p>The rise of advanced AI systems in the public domain has made them widely accessible for personal and business use. While these systems excel at tasks like content generation and code creation, this accessibility has opened the door for threat actors to launch sophisticated attacks.<\/p>\n<p><strong>Alexey Antonov<\/strong>, our <strong>Lead Data Scientist<\/strong>, highlighted some alarming ways cybercriminals are exploiting AI:<\/p>\n<ul>\n<li>ChatGPT can be used to write malicious software and automate attacks against multiple users<\/li>\n<li>AI can analyse smartphone acceleration sensor data to capture sensitive information such as messages, passwords and bank codes<\/li>\n<li>Swarm intelligence allows autonomous botnets to communicate with one another, restoring malicious networks after damage<\/li>\n<\/ul>\n<p>In a striking example, Alexey stated, \u201cWe analysed a massive data leak and found that 32% of user passwords are not strong enough and can be reverted from encrypted hash form using a simple brute-force algorithm and a modern GPU in less than 60 minutes.\u201d He added: \u201cWe also trained a language model on the password database and tried to check passwords using the resulting AI method. We found that 78% of passwords could be cracked this way, which is about three times faster than using a brute-force algorithm. Only 7% of the passwords analysed were strong enough to withstand a long-term attack\u201d.<\/p>\n<h2>Future of supply chain attacks<\/h2>\n<div id=\"attachment_27993\" style=\"width: 4010px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-27993\" class=\"wp-image-27993 size-full\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2024\/09\/13150827\/AYH09445-Enhanced-NR.jpg\" alt=\"\" width=\"4000\" height=\"2667\"><p id=\"caption-attachment-27993\" class=\"wp-caption-text\">Vitaly Kamluk, Head of GReAT APAC<\/p><\/div>\n<p>Supply chain attacks are especially appealing to threat actors because of the inherent trust in software providers. By infiltrating a manufacturer\u2019s infrastructure, attackers can inject malware into software updates, making this one of the most dangerous attack vectors.<\/p>\n<p><strong>Vitaly Kamluk, Head of GReAT APAC<\/strong>, addressed the future of supply chain attacks, citing notable incidents such as the global BSOD outage that impacted roughly 8.5 million systems and the complex compromise of the Linux XZ utility. The recent <a href=\"https:\/\/www.kaspersky.com\/blog\/crowdstrike-global-cyber-outages\/51748\/\" target=\"_blank\" rel=\"nofollow noopener\"><strong>CrowdStrike incident<\/strong><\/a> underscored the vulnerabilities within supply chains and the significant impact they can have, highlighting the critical importance of securing these systems. Earlier in 2024, the <a href=\"https:\/\/securelist.com\/xz-backdoor-part-3-hooking-ssh\/113007\/\" target=\"_blank\" rel=\"nofollow noopener\"><strong>Linux XZ Utils<\/strong><\/a> project \u2013 a set of data compression tools \u2013was compromised in a sophisticated supply chain attack: this backdoor was cleverly obfuscated and manipulated the logic of OpenSSH to allow unauthorised access.<\/p>\n<p>Vitaly stressed the need for proactive strategies to mitigate these growing threats. \u201cIn addition to cybersecurity best practices, organisations need to implement mitigation strategies to manage or minimise the potential impact of a supply chain attack on their infrastructure,\u201d Vitaly said. <a href=\"https:\/\/www.kaspersky.com\/blog\/managing-cybersecurity-risks\/51786\/\" target=\"_blank\" rel=\"nofollow noopener\"><strong>Key strategies<\/strong><\/a> include rigorous testing before deployments, ensuring tool integrity, strict control of manufacturing processes, version tracking, continuous monitoring for anomalies, implementing digital signatures and conducting regular security audits.<\/p>\n<h2>Post-AI: building a safer tomorrow<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-27994\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2024\/09\/13150953\/1.jpg\" alt=\"\" width=\"4000\" height=\"2667\"><\/p>\n<p>The event wrapped up with a dynamic panel discussion titled \u201cPost AI: Building a Safer Tomorrow.\u201d Experts, including key figures from Kaspersky and the cybersecurity industry, engaged in a thought-provoking conversation about the transformative impact of AI on cybersecurity. They explored emerging strategies that can help shape a safer digital future, providing valuable insights into the evolving landscape of cyberthreats and AI-driven defences.<\/p>\n<h2>Leading the charge at CSW<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-27995\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2024\/09\/13151114\/AYH09621-Enhanced-NR.jpg\" alt=\"\" width=\"4000\" height=\"2667\"><\/p>\n<p>APAC Cybersecurity Weekend 2024 was a huge success, providing crucial insights into the evolving cybersecurity landscape, particularly with the rise of AI-driven threats. With expert perspectives on generative AI, supply chain vulnerabilities and offensive AI, the event highlighted both the challenges and solutions shaping the digital future. As organisations navigate these complexities, Kaspersky remains at the forefront, committed to strengthening cybersecurity strategies and building a safer, more resilient digital world.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"b2b\"><input type=\"hidden\" class=\"placeholder_for_banner\" data-cat_id=\"b2b\" value=\"27967\">\n<p>\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>AI is changing the game, but are we ready for the risks? Discover key insights from our APAC Cybersecurity Weekend 2024 on how to tackle AI-driven threats and secure the future.<\/p>\n","protected":false},"author":2707,"featured_media":28039,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2036,2609,2610,1342,2196],"tags":[1094,1095,3236,2835,3313,36,321,527],"class_list":{"0":"post-27983","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-enterprise","9":"category-smb","10":"category-technology","11":"category-threats","12":"tag-ai","13":"tag-artificial-intelligence","14":"tag-chatgpt","15":"tag-cyberimmunity","16":"tag-kaspersky-csw","17":"tag-malware-2","18":"tag-technology","19":"tag-threats"},"hreflang":[{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/apac-cybersecurity-weekend-2024\/27983\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.in\/blog\/tag\/kaspersky-csw\/","name":"Kaspersky CSW"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/27983","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/users\/2707"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/comments?post=27983"}],"version-history":[{"count":10,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/27983\/revisions"}],"predecessor-version":[{"id":28040,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/27983\/revisions\/28040"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/media\/28039"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/media?parent=27983"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/categories?post=27983"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/tags?post=27983"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}