Advanced malicious actors are seeing more AI tools and are expected to use them for novel methods of cyberattacks in 2024, including supply chain attacks, hack-for-hire services, and new exploits for consumer devices. Security teams must anticipate the exploitation of software vulnerabilities, state-sponsored cyberattacks, and hacktivism. The rise in kernel rootkits, managed file transfer system issues, and the growing underground market for stolen certificates pose significant threats.

Hackers are using PDFs to impersonate big brands like Microsoft and PayPal in a new threat campaign
Summarize this content to a maximum of 60 words: Hackers are increasingly using PDF attachments to impersonate major brands in phishing campaigns, according to new