Cyber Security Trends 2023

Fahri Korkmaz
6 min readMar 15, 2023

Cybersecurity experts are in demand like never before. With each passing year, more and more destructive hacks and vulnerabilities are coming out. To keep businesses safe in 2023, it’s important to stay on top of IT security trends. In this article, I go over 9 trends that will keep us busy this year.

Web 3 Security

Picture from Pixabay by Werner Moser

Web 3 is a vision for the future of the Internet, where data and content are decentralized. It aims to represent a new era of the Internet where users have more control over their data and online identity and enjoy greater privacy. It uses technologies such as blockchain and smart contracts to provide a more secure and trustworthy online experience.

Web 3 thus refers to the next generation of the World Wide Web, which is oriented toward decentralization, data protection, and responsibility. Unlike the current World Wide Web, where much of the data is collected and managed by large corporations, Web 3 will have a decentralized structure where data is managed and secured by users themselves. In addition, the interaction between users and applications will take place via blockchain technology, which should ensure greater transparency and data security.

Attacks on the blockchain of companies have already been observed, in which hackers were able to capture several million in cryptocurrency. Maintaining the security of Web 3 applications requires new skill sets, and since Web 3 has a trend curve similar to that of the Internet, it is advantageous to acquire these skills.

Zero Trust

Picture from Pixabay by Anemone123

Zero Trust is a concept where any access to systems and data, regardless of location or device, is accompanied by strict authentication and monitoring. The idea behind Zero Trust is that no network node or device is automatically trusted and that all access to data and applications must always be verified before it is approved. This is to help prevent data theft, malware attacks, and other threats.

Cloud Security

Picture from Pixabay by Pexels

More and more companies are taking the path to the cloud. This allows companies to develop software quickly on the one hand and save costs on the other. However, this move also comes with its own pitfalls. This is because cloud systems have their own security vulnerabilities. For example, sensitive data can be leaked through the insecure configuration of an AWS S3 bucket. This is another reason why it may be worthwhile to familiarize yourself with cloud security in 2023. Attack vectors on cloud systems are listed in the Cloud Matrix of the MITRE ATT&CK Framework.

Artificial intelligence

Picture from Pixabay by Gerd Altmann

At the latest with ChatGPT, everyone has realized the potential of artificial intelligence. AI will be integrated more and more into society and will be found more and more often in software. And that’s where the problem lies because AI systems can still be insecure.

This is because AI systems still require software and infrastructure so that they can be developed and executed. These systems should be protected. But there are also attack methods that explicitly target AI systems. For example, if someone develops an AI that is used to write code. Then that AI also needs data. If the developer of the AI collects data from GitHub for training, then an attacker could simply create noisy repositories where there is a backdoor in the code. Then the AI learns that the code to be generated must also contain this backdoor. This type of attack is also called “Poison Training Data”.

For this reason, I think it will become more important in IT security to adequately secure Machine Learning models. The MITRE ATLAS framework shows further concrete attack vectors on AI systems.

Supply Chain Attacks

Picture from Pixabay by Markus Kammermann

The supply chain is a chain of vendors required for the manufacturing process of a product or service. An attack on the supply chain refers to any attempt to impair or compromise any of these components to cause a negative impact on the final product or service.

For example, a supply chain attack can occur when a hacker manipulates or infects a product in the supply chain before it is delivered to the end customer. In this way, an attacker can introduce malicious software on a computer and thus spy out data or compromise the system.

State-sponsored hacking

Picture from Pixabay by Tumisu

Especially with the war between Russia and Ukraine, we have seen that hacking is also increasingly used by state actors such as intelligence agencies. Critical infrastructure has also already been attacked in various countries by state actors, so-called Advanced Persistent Threats. The war is exacerbating the situation, making attacks by APTs on businesses and government agencies increasingly likely. APTs have also been seen behind supply chain attacks, such as the attack on Solarwinds.

For organizations to protect themselves effectively against APTs, they must improve their cyber resilience. Resilience refers to the ability of a system to cope with disruptions and quickly return to normal functions. In IT security, this can be understood as resilience to cyber attacks. It includes measures to minimize the risk of failure and damage and to enable rapid recovery in the event of an incident.

Because it’s hard to protect yourself from APTs. After all, they have access to all the resources a state has and pretty much infinite time. Which makes these types of attackers very dangerous. For this reason, organizations need to change their mindset from Prevent-The-Breach to Assume-The-Breach. To find out if the measures, especially in the area of resilience, are good enough, companies should implement Red Teaming or Purple Teaming.

Internet of Things

Picture from Pixabay by Gerd Altmann

With Industry 4.0, companies have been relying on IoT for years. However, IoT is now also increasingly being used in private homes and in public. States are trying to transform their cities into so-called smart cities, i.e. cities, using IoT. Of course, this also brings a high risk, as attacks on cities now pose a high threat to the population. Especially due to the increase in state attacks, attacks on IoT networks have become more likely.

OT Security

Picture from Pixabay by Randgruppe

Operational Technology, or OT for short, refers to the technology used to monitor and control industrial processes, productions, and infrastructures. These technologies are often used in the context of the Internet of Things (IoT) and include sensors, actuators, control systems, and networks. OT is an important part of industrial automation and has a major impact on the efficiency, reliability, and safety of industrial processes.

Often, critical infrastructure is operated through OT. Since attacks by state hackers are becoming increasingly likely and these hackers also like to target OT. It is therefore important that companies and critical operators secure their OT infrastructure as well as possible.

Many IT security experts specialize in normal IT infrastructure, which means that experts for OT security are desperately needed. Therefore, it is a good strategy to educate yourself in the direction of OT security.

Ransomware

Picture from Pixabay by Michal Jarmoluk

Ransomware is a type of malware that prevents access to files on a computer or network by encrypting them. The attacker then demands a ransom, called a ransom, to release the data. This can have a significant impact on business operations and data protection for affected companies or individuals.

Ransomware has caused many cybersecurity experts sleepless nights in recent years. This year, ransomware attacks will certainly not stop. Because many hacker groups earn big money with it.

For this reason, securing systems against ransomware will become an important topic in 2023. Fighting cybercrime through law enforcement investigations is also likely to increase this year.

--

--