Beyond Encryption: Ransomware's New Game & Top Exploits of 2024
In 2024, cyber attackers demonstrated remarkable adaptability by splintering into agile ransomware groups focused on data theft and extortion, while heavily exploiting critical vulnerabilities like ScreenConnect and abusing legitimate tools across organizations of all sizes.
🎧 Listen to this Episode
Show Notes
Tune in to explore the rapidly evolving cyber threat landscape of 2024 from Huntress 2025 global Cyber Threat Report, where attackers standardized sophisticated techniques across businesses of all sizes. We dissect the significant shifts in ransomware strategies, including the fragmentation of major groups following takedowns like LockBit, Dharma, Hive, and Phobos. Discover how agile affiliate networks like RansomHub and INC/Lynx emerged, offering high payouts and dominating the landscape. Learn about the pivot from traditional encryption to data theft and extortion as a cost-saving tactic due to improved defenses. We'll also break down the most impactful vulnerabilities exploited, including the critical ConnectWise ScreenConnect flaws (CVE-2024-1709 & CVE-2024-1708) that spurred a major campaign, the zero-day CrushFTP vulnerability (CVE-2024-4040), and the continued exploitation of the older ProxyShell Exchange vulnerability (CVE-2021-31207). Finally, we'll cover the pervasive use of abused tools like RATs, RMM software, malicious scripts, LOLBins, and sophisticated phishing techniques that defined attacker methodologies throughout the year. This episode provides crucial insights for defenders navigating this complex and challenging environment
breached.company/navigating-the-new-frontier-key-cyber-threats-exploits-and-tools-of-2024
Share this episode
Enjoying CISO Insights?
Subscribe to get new episodes delivered directly to your podcast app.
Related Episodes
The Perimeter is Dead: How Vendor Insecurity Ignited a $500 Million Ransomware Crisis
This episode exposes how systemic negligence and delayed disclosures by major firewall vendors have facilitated nation-state espionage and a healthcare ransomware catastrophe, proving that the hardwar...
▶️ Listen Now
Smart Cities, Critical Failures: Unpacking the IoT Ransomware Threat
As urban infrastructure becomes smarter through connected technology, the reliance on often insecure IoT systems exposes critical services to devastating ransomware attacks that threaten citizen safet...
▶️ Listen Now
The 2025 Convergence: AI, Critical Infrastructure, and the Supply Chain Siege
The 2025 cyber landscape was redefined by the convergence of AI-driven tactics, nation-state pre-positioning in critical infrastructure (such as water, energy, and transport), and mass exploitation of...
▶️ Listen Now