Advanced malicious actors are seeing more AI tools and are expected to use them for novel methods of cyberattacks in 2024, including supply chain attacks, hack-for-hire services, and new exploits for consumer devices. Security teams must anticipate the exploitation of software vulnerabilities, state-sponsored cyberattacks, and hacktivism. The rise in kernel rootkits, managed file transfer system issues, and the growing underground market for stolen certificates pose significant threats.

He downloaded a WhatsApp image. Minutes later, Rs 2 lakh was gone | Technology News
Pradeep Jain lost Rs 2.01 lakh from his bank account after hackers gained access to his phone through a scam using Least Significant Bit (LSB)