Ukraine will face more sophisticated cyberattacks in 2024

0
717
Ukraine will face more sophisticated cyberattacks in 2024

Next year, Ukraine must be prepared for more sophisticated cyberattacks by the Russian aggressor, including those using artificial intelligence. This was stated by Nazar Tymoshyk, a specialist of the Governmental Computer Emergency Response Team of Ukraine (CERT-UA), during his speech at the SANS CyberThreat 2023 conference in London (UK) .

“The enemy is actively engaging young people and training a new generation of motivated hackers who will become cybercriminals in the future. We expect that attacks by Russian hacker groups will be more sophisticated, so Ukrainian cyber defenders – both special agencies and businesses – must be prepared for this,” said Tymoshyk, who presented his conclusions and observations on recent changes in Russian intelligence cyber operations.

According to him, the level of cybersecurity in Ukraine has improved significantly since 2022, among other things, due to technical assistance from Western countries and information exchange. At the same time, Ukrainian companies have begun to respond more professionally to cyber risks.

The expert told the participants of the event about the change in the behavioral patterns, goals, and capabilities of the Russian government and hacker groups under its control that took place in the first half of 2023.

“We are very grateful to our British partners for the invitation and the opportunity to participate in the conference. It was an unforgettable experience that strengthened our cooperation and contributed to the development of cybersecurity in Ukraine and around the world,” said the expert from CERT-UA.

The CyberThreat 2023 conference was organized by the Escal Institute for Advanced Security (SANS) and the UK National Cyber Security Center. CyberThreat 2023 enables professionals to develop skills and better understand, synthesize and use complex attack scenarios, conduct operational and strategic intelligence on threats and enemy data collection sources.

LEAVE A REPLY

Please enter your comment!
Please enter your name here