Advanced malicious actors are seeing more AI tools and are expected to use them for novel methods of cyberattacks in 2024, including supply chain attacks, hack-for-hire services, and new exploits for consumer devices. Security teams must anticipate the exploitation of software vulnerabilities, state-sponsored cyberattacks, and hacktivism. The rise in kernel rootkits, managed file transfer system issues, and the growing underground market for stolen certificates pose significant threats.

Gremlin Stealer's Evolved Tactics: Hiding in Plain Sight With Resource Files – Unit 42
Gremlin Stealer’s Evolved Tactics: Hiding in Plain Sight With Resource Files Unit 42


