• About
  • Subscribe
  • Contact
Thursday, May 8, 2025
    Login
FutureCISO
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
No Result
View All Result
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
No Result
View All Result
FutureCISO
No Result
View All Result
Home Technology Data Protection

Organisations still not doing the basics even as cyber threats get more sophisticated

Eileen Yu by Eileen Yu
March 27, 2025
Photo by Pixabay: https://www.pexels.com/photo/gold-padlock-locking-door-164425/

Photo by Pixabay: https://www.pexels.com/photo/gold-padlock-locking-door-164425/

Share on FacebookShare on Twitter

Emerging technologies, particularly artificial intelligence (AI), are driving more sophisticated cyber attacks that will be increasingly tough to detect and businesses that are neglecting the fundamentals face the biggest risks.

In Singapore, for instance, 13% of phishing email that were analysed in 2023 contained AI-generated or assisted content, according to the country’s cybersecurity regulator Cyber Security Agency (CSA). Its Singapore Cyber Landscape 2023 report found that these AI-generated email messages were more grammatically sound and showed better sentence structure.

“They also had better flow and reasoning, intended to reduce logic gaps and enhance legitimacy,” CSA said, adding that these AI-generated phishing email could adapt to various tone. This enabled them to better exploit the victim’s emotions, making them more convincing and dangerous, the agency said in the report, which was released last July.

David Koh

The CSA report highlighted AI as a trend to watch, where improvements and adoption of the technology would continue to scale. Malicious actors also were likely to benefit, leveraging AI to enhance social engineering attacks.

Furthermore, AI models would produce higher quality output as they continued to be trained on growing volumes of data.

Threat actors also could use generative AI (GenAI) tools to recreate and operationalise research findings, incorporating these to improve their attacks, CSA noted, pointing to more advanced cyber attacks such as AI-proliferated worms and automated hacking.

“The use of GenAI has brought a new dimension to cyber threats,” said CSA’s chief executive and commissioner of cybersecurity, David Koh. “As AI becomes more accessible and sophisticated, threat actors will also become better at exploiting it.”

Enabling scams to achieve scale and authenticity

As it further advances, AI will enable cybercriminals to scale their attacks, where victims can be targeted via automation and in mass numbers, said Thanh Tai Vo, Asia-Pacific director of fraud and identity at LexisNexis Risk Solutions.

Related:  Crypto agility to combat quantum threats, posits FS-ISAC

AI also can be used to mimic human behaviour that will be increasingly convincing, Thanh said in an interview with FutureCISO.

Thank Tai Vo

British engineering company Arup last year fell victim to a deepfake scam when an employee was tricked into transferring HK$200 million to fraudsters. The scammers had used AI to create deepfakes of the company’s senior executives and, via video calls, “instructed” the employee to make the fund transfers.

Arup’s global CIO Rob Greig had noted that the company was subject to frequent attacks, including phishing scams, WhatsApp voice spoofing, and deepfakes. “What we have seen is that the number and sophistication of these attacks has been rising sharply in recent months,” Greig said.

Rob Greig

With many people have taken to sharing their photos freely online, it is not difficult to create deepfakes, noted Thanh. All it takes are a few photos and minutes of audio to generate a basic deepfake version of an individual.

Such clones will be increasingly difficult to distinguish from genuine ones as AI continues to advance, further fuelling scammers’ goal to impersonate a targeted individual in order to build trust with their victims, before eventually executing the scam.

Thanh suggested that companies adopt a multi-layered fraud management strategy to mitigate such risks, including focusing on key areas such as digital intelligence, identity authentication, and behavioural analysis. Establishing digital intelligence, for instance, would allow organisations to better assess the risk of certain activities and distinguish genuine users from fraudulent ones.

AI also could be used to enhance capabilities in analysing and detecting anomalies in images, such as identification cards, and documents. In addition, behavioural analysis would help determine if a transaction is made under coercion.

Related:  90% of organisations suffered a major cyber attack, CISO reveals

Back to basics for cyber resilience

Brendan Laws

Ultimately, too, the fundamentals matter, said Brendon Laws, COO of cyber incident response vendor, Blackpanda.

Often when things go awry, the problem usually points back to the same issues where organisations still lack understanding of their infrastructure and fail to maintain it properly, Laws said in a video interview.

“It feels like it all boils down to the same thing,” he said. “It’s back to the basics [and] and I haven’t seen that change in 20 years...people [still] aren’t doing what they need to do.”

Two-factor authentication (2FA) solutions, for example, have been in the market for a long time and can effectively detect a significant chunk of phishing attacks. However, there still are businesses that have yet to deploy 2FA as a basic layer of authentication and access control, Laws said.

They probably also are not deploying and updating security patches regularly, he added.

He underscored the need for organisations, as custodians of people’s data, to uplift their infrastructure by adopting security best practices and better ride the tide even as the threat landscape evolves.

“There’s always a storm, so it’s about whether your house is built to standard,” he said. It calls for organisations to understand their infrastructure and determine the tools and procedures to put in place, so they can weather the storm in a more viable way and return to a steady state, he added.

Noting that threat adversaries were not constrained by budget or ingenuity, Laws urged businesses to leverage emerging technologies including AI to bolster their cyber resilience.

Tags: artificial inteligencecyber threat detectioncybersecurityfraud managementgenerative AI
Eileen Yu

Eileen Yu

Eileen is currently an independent tech journalist and content specialist, providing analysis of key market developments across the Asian region and helping enterprises craft their communications plan. She also moderates panel discussions and roundtables, as well as provides media training to help senior executives better manage press interviews. Eileen has worked with corporate clients in markets, such as cybersecurity and enterprise software, and non-tech including financial services and logistics. She also has planned high-level panel and roundtable discussions and has been an invited speaker on online media. On CXOCIETY, she contributes articles across the four CXOCIETY brands -- FutureCIO, FutureCISO, FutureIoT, and FutureCFO -- covering key industry developments impacting the Asia-Pacific region, including cybersecurity, AI, data management, governance, workforce modernisation, and supply chain. Eileen has more than 25 years of industry experience at established media platforms, including ZDNET in Singapore, where she led the tech site's Asian editorial team and blogger network. Before her stint at ZDNET, she was assistant editor at Computer Times for Singapore Press Holdings and deputy editor of Computerworld Singapore. With her extensive industry experience, Eileen has navigated discussions on key trending topics including cybersecurity, artificial intelligence, quantum computing, edge/cloud computing, and regulatory policies. Eileen trained under the Journalism department at The University of Queensland, Australia. There, she earned a Bachelor of Arts (Honours) degree in Journalism, with a thesis titled, To Censor or Not: The Great Singapore Dilemma.

No Result
View All Result

Recent Posts

  • Reimagining security for the AI Era
  • PodChats for FutureCISO: Articulating the business value of security in 2025
  • New standard for cybersecurity at the storage layer
  • Cybersecurity challenges persist despite improved defenses
  • Weak password reuse crisis remains

Categories

  • Blogs
  • Compliance and Governance
  • Culture and Behaviour
  • Cybersecurity careers
  • Data Protection
  • Endpoint Security
  • Incident Response
  • Network Security
  • People
  • Process
  • Resources
  • Risk Management
  • Technology
  • Training and awarenes
  • Videos
  • Webinars and PodChats
  • White Papers

Strategic Insights for Chief Information Officers

FutureCISO serves the interests of the Chief Information Security Officer (CISO) and the information security profession. Its purpose is to provide relevant and timely industry insights around all things important to security professionals and organisations that recognize and value the importance of protecting the organisation’s data and its customers’ privacy.

Cxociety Media Brands

  • FutureIoT
  • FutureCFO
  • FutureCIO

Categories

  • Privacy Policy
  • Terms of Use
  • Cookie Policy

Copyright © 2024 Cxociety Pte Ltd | Designed by Pixl

Login to your account below

or

Not a member yet? Register here

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
Login

Copyright © 2024 Cxociety Pte Ltd | Designed by Pixl