Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

The Future of Process Automation is Here: Meet TwinH

Jack Dorsey says his “safe” new bitchat app hasn’t been tested for security

Hallucinations about soundslice on chatgpt music app frequently, founders have made to lie

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Uncovering AI hype: Inside the tactics of real hackers
Identity

Uncovering AI hype: Inside the tactics of real hackers

userBy userFebruary 18, 2025No Comments5 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

February 18, 2025Hacker NewsArtificial Intelligence/Cyber ​​Defense

Is AI really changing the landscape of cyber threats, or is the constant drum beat of hype owning real, more concrete, real-world dangers? According to Picus Labs’ Red Report 2025, which analyzed over a million malware samples, there has been no significant surge in AI-driven attacks so far. Yes, the enemy is undoubtedly continuing to innovate, and AI certainly starts to play a bigger and bigger role, but the latest data shows that a well-known set of tactics, techniques, and procedures (TTP) still remains in the field. It suggests that they dominate.

The hype about artificial intelligence has certainly dominated media headlines. However, the actual data draws a much more subtle picture of the malware threat thrives. This gives you a glimpse into the most important findings and trends that will shape the most unfolding hostile campaign of the year, as well as the steps cybersecurity teams need to respond to them.

Why is there a shortage of AI hype… at least for now

The headline trumpets AI as a new all-purpose secret weapon for cybercriminals, but so far, statistics tell a very different story. In fact, after ripening the data, Picus Labs found no meaningful upwards in 2024 with AI-based tactics. Yes, enemies have begun to incorporate AI for greater efficiency, such as writing more reliable phishing emails and writing/debugging malicious code, but they have been using AI for most of the attacks so far. I haven’t tapped Transformation Power yet. In fact, data from Red Report 2025 shows that focusing on proven TTPs can prevent most of the attacks.

“Security teams need to prioritize identifying and addressing key gaps in defense, rather than sticking to the potential impact of AI.” – Picus Red Report 2025

Qualification theft is more than three times stronger (8% to 25%)

Attackers are increasingly targeting password stores, browser-stored credentials, and cached logins, leveraging stolen keys to escalate privileges and spreading them within the network. These three jumps highlight the urgent need for continuous and robust qualification management in conjunction with aggressive threat detection.

Modern Infostealer malware coordinates multi-stage style robbery that blends stealth, automation, and persistence. As legal processes hide malicious data uploads as they hide malicious operations and actual daily network traffic, bad actors can turn data right under the proverbs of their security teams. Can be removed. No Hollywood style “smash and grab” is required. Think of it as digital equivalent to a completely choreographed robber. Only criminals cannot be removed in escape cars. They are quietly hiding, waiting for your next misstep or opening.

93% of malware use at least one top 10 Miter ATT & CK technique

Despite the vast Miter ATT & CK® framework, most enemies stick to the TTP core set. Of the top 10 ATT & CK techniques offered in Red Report, the following peel and stealth techniques are the most used:

Combined effects? The legitimate selection process uses legitimate tools to collect and transmit data over widely used network channels. Naturally, these techniques can be difficult to detect using signature-based methods alone. However, behavioral analysis makes it much easier to spot anomalies, especially when monitoring and correlating data using multiple techniques. Security teams should focus on finding malicious activity that appears virtually indistinguishable from normal network traffic.

Return to basics for better defense

Today’s threats are often penetrated, sustained and eliminated through many stages of attack. By the time one step is identified, the attacker may have already moved to the next step. So, while the threat landscape is undoubtedly refined, the silver lining discovered in Red Report 2025 is rather simple. The current malicious activity actually revolves around small attack techniques. By doubling the foundations of modern cybersecurity, including strict qualification protection, advanced threat detection, and continuous security verification, organizations have confidently ignored the tsunami of AI hype for now, instead You can focus on facing the threats that are actually targeting them today.

Ready to get through AI hype and bolster your defenses?

Although the headline is pinned to AI, PICUS Security has been a pioneer in Violation and Attack Simulation (BAS) since 2013, and has been eager to focus on the methods and techniques that attackers actually use. Masu. The PICUS security verification platform continuously evaluates and fortifies organizational defenses, highlighting the fundamentals of eligibility protection and rapid threat detection.

Are you ready to see the differences? Download Picus Red Report 2025 or visit picussecurity.com to learn how to adjust your hype and keep real threats at bay.

Note: This article was written by Dr. Suleyman Ozarslan, co-founder of Picus Security and VP of Picus Labs. Here we do every day to simulate cyber threats and strengthen organizational defenses.

Did you find this article interesting? This article is a donation from one of our precious partners. Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleProtecting animal health for a better society
Next Article The brilliance of the legal technology startup, backed by the late Mike Lynch, raises $75 million
user
  • Website

Related Posts

The Future of Process Automation is Here: Meet TwinH

July 9, 2025

Gold Melody IAB exploits exposed ASP.NET machine keys to unauthorized access to targets

July 9, 2025

donot apt expands operations and targets the European Ministry of Foreign Affairs with lopticmod malware

July 9, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

The Future of Process Automation is Here: Meet TwinH

Jack Dorsey says his “safe” new bitchat app hasn’t been tested for security

Hallucinations about soundslice on chatgpt music app frequently, founders have made to lie

Gold Melody IAB exploits exposed ASP.NET machine keys to unauthorized access to targets

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

The Future of Process Automation is Here: Meet TwinH

Robots Play Football in Beijing: A Glimpse into China’s Ambitious AI Future

TwinH: A New Frontier in the Pursuit of Immortality?

Meta’s Secret Weapon: The Superintelligence Unit That Could Change Everything 

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.