linkedin post 2019-06-06 04:13:52

Uncategorized
EVOLVING MALWARE. "Soon we will begin to see malware completely created by machines based on automated vulnerability detection and complex data analysis...Polymorphic malware is not new, but it is about to take on a new face by leveraging artificial intelligence to create sophisticated new code that can learn to evade detection through machine written routines." https://lnkd.in/de5H3Um View in LinkedIn
Read More

linkedin post 2019-06-06 04:11:33

Uncategorized
AVOIDING IMMUNE SURVEILLANCE. “In addition, Manky predicts that we'll also see the rise of what he calls next-generation morphic malware, whereby the code of malicious software is automatically altered slightly to evade detection from anti-virus but the same functionality is kept (or some new functionality is gained).” https://lnkd.in/de5H3Um View in LinkedIn
Read More

linkedin post 2019-06-06 04:08:52

Uncategorized
SPREADING INFECTION. “Infected devices will also become smarter, acting on commands without the botnet herder instructing them to do so, he says. As a result, hivenets will be able to grow exponentially as swarms, widening their ability to simultaneously attack multiple victims and significantly impede mitigation and response.” https://lnkd.in/de5H3Um View in LinkedIn
Read More

linkedin post 2019-06-05 04:45:36

Uncategorized
HIVENETS. “Swarm cyber attacks, crypto-currency stealing malware predicted for 2018. Manky also predicts that cyber criminals will replace botnets — large numbers of infected internet-connected devices controlled by hackers — with intelligent clusters of compromised devices called "hivenets" to create more effective attack vectors.” https://lnkd.in/de5H3Um View in LinkedIn
Read More

linkedin post 2019-06-05 04:42:40

Uncategorized
LACKING LOOPS. “They will utilise an intelligence originating from crowd stored as a complex network. The network will have certain structure reflecting this intelligence and will help virus instances to visit interesting files in a file system. Basic file system is a tree-based structure. That means no loops. This structure is not very feasible for a swarm dynamics so it will be mapped into the network.” https://lnkd.in/dv5x_qY View in LinkedIn
Read More

linkedin post 2019-06-07 05:49:00

Uncategorized
DUAL EDGE. “Swarm intelligence systems, based on the interaction of a large number of relatively simples agents, rely on emergent intelligence for their problem solving capabilities. When used in trusted autonomous systems, the emergent behaviour of swarm intelligence systems can be both a blessing and a curse.” https://lnkd.in/dRvnSMk View in LinkedIn
Read More