Each year at RSA Conference, the SANS Institute provides an authoritative briefing on the most dangerous new attack techniques leveraged by modern-day attackers, including cyber criminals, nation-state actors, and more.

The annual briefing brings together some of the best and brightest minds shaping SANS core curricula to discuss emerging threat actor Tactics, Techniques, and Procedures (TTPs), assess what they mean for the future, and guide organizations on how to prepare for them.

2023 keynote session

The RSAC 2023 session, titled “The Five Most Dangerous New Attack Techniques” and moderated by SANS Technology Institute College President Ed Skoudis, featured four prominent SANS panelists to provide actionable insights that can help security leaders get (and stay) ahead of evolving threats.  

  • Stephen Sims, SANS Fellow & Offensive Cyber Operations Curriculum Lead

Attack Technique: Adversarial AI Attacks

Organizations need to deploy an integrated defense-in-depth security model that provides layered protections

This portion of the session highlighted how threat actors were manipulating AI tools to amplify the velocity of ransomware campaigns and identify zero-day vulnerabilities within complex software. From streamlining the malware coding process to democratizing social engineering, adversarial AI has changed the game for attackers.

In response, organizations need to deploy an integrated defense-in-depth security model that provides layered protections, automates critical detection and response actions, and facilitates effective incident-handling processes.

  • Heather Mahalik, SANS Fellow, DFIR Curriculum Lead, and Senior Director of Digital Intelligence, Cellebrite

Attack Technique: ChatGPT-Powered Social Engineering Attacks

This portion of the session highlighted how AI-driven social engineering campaigns are hitting close to home. With the rise of ChatGPT, threat actors are now leveraging generative AI to exploit human risk targeting the vulnerabilities of individual employees to breach their wide organization’s network, including their families. 

This development means that everyone is now more easily attackable than ever, and all it takes is one wrong click on a malicious file to put not only an entire company at immediate risk but the victim’s livelihood as well. This widened attack surface requires organizations to foster a culture of cyber vigilance across every fabric of their enterprise to ensure employees are cognizant of ChatGPT-related attacks.

  • Dr. Johannes Ullrich, SANS Technology Institute College Dean of Research, Internet Storm Center (ISC) Founder

Attack Technique: Third-party Developer Attacks

For organizations, the attack underscored the criticality of effectively working in tandem with software developers

This portion of the session highlighted the rise of targeted attacks on third-party software developers to infiltrate enterprise networks through the supply chain. It references the December 2022 LastPass breach, where a threat actor exploited third-party software vulnerabilities to bypass existing controls and access privileged environments.

For organizations across sectors, the attack underscored the criticality of effectively working in tandem with software developers to align security architectures, share threat intelligence, and navigate evolving attack techniques.

  • Katie Nickels, SANS Certified Instructor and Director of Intelligence, Red Canary

Attack Technique: SEO Attacks & Paid Advertising Attacks

This portion of the session highlighted the emergence of new Search Engine Optimization (SEO) and advertising attacks leveraging fundamental marketing strategies to gain initial access to enterprise networks. In these instances, threat actors are exploiting SEO keywords and paid advertisements to trick victims into engaging spoofed websites, downloading malicious files, and allowing remote user access.

These attacks signify proactiveness on behalf of malicious attackers, who are increasingly pivoting away from traditional attack techniques that have become easier to defend against. These two attack vectors heighten the importance of incorporating scalable user awareness training programs tailored to new threats.

Discover how AI, biometrics, and analytics are transforming casino security

In case you missed it

What Are Emerging Applications For Physical Security In Transportation?
What Are Emerging Applications For Physical Security In Transportation?

Transportation systems need robust physical security to protect human life, to ensure economic stability, and to maintain national security. Because transportation involves moving...

Gallagher's Perimeter Solutions With Fortified Partnership
Gallagher's Perimeter Solutions With Fortified Partnership

Global security manufacturer Gallagher Security is proud to announce a strategic partnership with Fortified Security, a pioneering perimeter systems integrator with over 30 years o...

Genetec's Role In Data Sovereignty For Security
Genetec's Role In Data Sovereignty For Security

Genetec Inc., the global pioneer in enterprise physical security software, highlights why data sovereignty has become a central concern for physical security leaders as more survei...