Close Menu
Philstar Tech
    • Deals
    • Contact Us
    • About Us
    Philstar Tech
    • Home
    • All Post
    • News
      • Features
    • Tech @Life
    • Reviews
      • Fitness
      • Laptops
      • Mobility
      • Smartphones
      • Wearables
    • Opinion
    Philstar Tech
    Home » Proliferation of AI-driven Attacks Anticipated in 2024
    News

    Proliferation of AI-driven Attacks Anticipated in 2024

    PhilSTAR Tech TeamBy PhilSTAR Tech TeamJanuary 24, 20243 Mins Read
    Facebook Twitter Pinterest LinkedIn Tumblr Email
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global cybersecurity leader, today warned of the transformative role of generative AI (GenAI) in the cyber threat landscape and a coming tsunami of sophisticated social engineering tactics and identity theft powered GenAI tools.

    To read more about Trend Micro’s 2024 cybersecurity predictions, please visit: https://www.trendmicro.com/vinfo/us/security/research-and-analysis/predictions/critical-scalability-trend-micro-security-predictions-for-2024

    Eric Skinner, VP of market strategy at Trend Micro: “Advanced large language models (LLMs), proficient in any language, pose a significant threat as they eliminate the traditional indicators of phishing such as odd formatting or grammatical errors, making them exceedingly difficult to detect. Businesses must transition beyond conventional phishing training and prioritize the adoption of modern security controls. These advanced defenses not only exceed human capabilities in detection but also ensure resilience against these tactics.”

    The widespread availability and improved quality of GenAI, coupled with the use of Generative Adversarial Networks (GANs), are expected to disrupt the phishing market in 2024. This transformation will enable cost-effective creation of hyper-realistic audio and video content—driving a new wave of business email compromise (BEC), virtual kidnapping, and other scams, Trend predicts.

    Given the potentially lucrative gains* that threat actors might achieve through malicious activities, threat actors will be incentivized to develop nefarious GenAI tools for these campaigns or to use legitimate ones with stolen credentials and VPNs to hide their identities.

    AI models themselves may also come under attack in 2024. While GenAI and LLM datasets are difficult for threat actors to influence, specialized cloud-based machine learning models are a far more attractive target. The more focused datasets they are trained on will be singled out for data poisoning attacks with various outcomes in mind—from exfiltrating sensitive data to disrupting fraud filters and even connected vehicles. Such attacks already cost less than $100 to carry out.

    These trends may, in turn, lead to increased regulatory scrutiny and a push from the cybersecurity sector to take matters into its own hands.

    “In the coming year, the cyber industry will begin to outpace the government when it comes to developing cybersecurity-specific AI policy or regulations,” said Greg Young, VP of cybersecurity at Trend. “The industry is moving quickly to self-regulate on an opt-in basis.”

    Elsewhere, Trend’s 2024 predictions report highlighted:

    A surge in cloud-native worm attacks, targeting vulnerabilities and misconfigurations and using a high degree of automation to impact multiple containers, accounts and services with minimal effort.

    Cloud security will be crucial for organizations to address security gaps in cloud environments, highlighting the vulnerability of cloud-native applications to automated attacks. Proactive measures, including robust defense mechanisms and thorough security audits, are essential to mitigate risks.

    More supply chain attacks will target not only upstream open-source software components but also inventory identity management tools, such as telco SIMs, which are crucial for fleet and inventory systems. Cybercriminals will also likely exploit vendors’ software supply chains through CI/CD systems, with a specific focus on third-party components.

    Attacks on private blockchains will increase as a result of vulnerabilities in the implementation of a number of private blockchains. Threat actors could use these rights to modify, override, or erase entries and then demand a ransom. Alternatively, they could try to encrypt the entire blockchain if it’s possible to seize control of enough nodes.

    *BEC cost victims over $2.7bn in 2022, according to the FBI.

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    PhilSTAR Tech Team

    The editorial team of PhilSTAR Tech.

    Related Posts

    Mapúa University secures strategic partnership with Capcom and Prime Manpower for Philippine game industry growth

    January 28, 2026

    RCBC enables first nationwide cardless withdrawals for GCash users

    January 27, 2026

    Apple unveils the new Black Unity Apple Watch band

    January 27, 2026

    Most Popular

    RCBC enables first nationwide cardless withdrawals for GCash users

    January 27, 20262 Mins Read

    Cebu is home to largest cold storage run by AI and robotics

    June 27, 20256 Mins Read

    How Globe 5G Transforms Sinulog into the Most Connected Festival in the Visayas

    January 20, 20263 Mins Read

    Let the digital bulls run: How tech can finally wake up our capital markets

    January 9, 20263 Mins Read

    HONOR X9d review: beyond the durability hype, a new standard in “midrange” capability

    January 9, 20265 Mins Read

    Yes, you can still use Google on a HUAWEI phone. I tried it. Here’s what actually works

    July 29, 20254 Mins Read

    Latest

    Aurora Gaming Philippines shocks the world and reigns supreme at M7

    By PhilSTAR Tech TeamJanuary 28, 20266 Mins Read

    Your own personal hell: Why you should play Silent Hill 2

    By Jianzen DeananeasJanuary 28, 20265 Mins Read

    Mapúa University secures strategic partnership with Capcom and Prime Manpower for Philippine game industry growth

    By Danie BravoJanuary 28, 20264 Mins Read

    A pocketable gimbal in the DJI Osmo Mobile 8

    By Jayvee FernandezJanuary 28, 20263 Mins Read

    RCBC enables first nationwide cardless withdrawals for GCash users

    By PhilSTAR Tech TeamJanuary 27, 20262 Mins Read

    ASUS NUC 15 Pro Review: small form factor PC that can rival some gaming handhelds

    By Jayvee FernandezJanuary 27, 20264 Mins Read
    Copyright © 2026 Philstar Tech | Powered by The Philippine STAR

    Type above and press Enter to search. Press Esc to cancel.