0:00
yeah certainly in 2024 uh we did as you
0:02
mentioned earlier see a little bit uh
0:04
more influence of AI in a Cyber attack
0:07
uh particularly around the
0:08
sophistication of uh fishing emails and
0:11
how authentic they look right the
0:13
ability to generate these quickly I
0:15
think uh especially from black panis
0:17
perspective we focus more on the mass
0:19
market and the everyday type of Cyber
0:21
attack versus the headlining nation
0:23
state very Advanced attacks and so the
0:26
thing that we really see impacting is
0:27
more along the lines of the everyday
0:30
criminal being able to uh escalate their
0:32
capabilities in terms of Cyber attack
0:34
and again fishing remains to be the the
0:37
number one infiltration technique
0:38
getting somebody to click on something
0:40
accidentally and it's just looking more
0:41
and more real and harder to distinguish
0:43
so I'm curious you know we uh I was
0:45
going to ask you about uh uh what the
0:47
first line of defense should be Etc but
0:49
you're actually at the back end right
0:50
your First Responders at black Panda so
0:52
when something like this happens right
0:55
what do you do for companies uh clients
0:56
yeah fantastic get hit like that great
0:58
Point Martin actually I like to make the
1:00
argument that we're the first line of
1:01
defense right when you think about uh
1:03
the most basic level of security in the
1:05
physical world that we enjoy everyone
1:08
enjoys emergency response or First
1:10
Response right you don't need to own a
1:12
business a house you can be homeless and
1:14
you can call 995 here in Singapore or
1:16
911 in the states and somebody will help
1:18
so I always think of that as the first
1:19
line of defense in terms of what you
1:20
should have in place but certainly from
1:22
from that aspect um you know us being in
1:25
place we get to see uh the type of
1:27
incidents that happened across the
1:28
region and confirm them from our digital
1:30
forensics so at black Panda we saw
1:33
roughly over 60 uh complex cyber attacks
1:35
in Hong Kong and Singapore in 2024 and
1:38
predominantly still the type of attack
1:40
we see is ransomware right and that's
1:43
where the attacker comes in encrypts the
1:45
uh the network and you receive a a
1:47
Anonymous message that you owe $500,000
1:50
in Bitcoin or you'll never see your data
1:52
again this is the equivalent of
1:54
kidnapping your company and holding you
1:55
for ransom right it's the same thing
1:57
it's an extortion extortion motion
2:00
um this is the predominant attack that
2:02
we see and almost always uh from our
2:05
data we're seeing that it's still from
2:06
the basic vulnerabilities uh for example
2:09
remote desk protocols uh that are still
2:12
open or credentials that are leaked or
2:14
misconfigured uh vpns virtual private
2:17
networks that are facing so it's still
2:18
these basic remote access uh protocols
2:21
that are leading to Cyber attack so