MANY CHANGES. "Body swim-posture changes during flounder metamorphosis as one eye migrates to the opposite side of the head.” https://lnkd.in/d9EMwRb View in LinkedIn
BOTNET SWARMS. “The Hide ‘N Seek IoT botnet, first detected this past spring, has moved the bar significantly closer to enabling a botnet to function as a swarm. It communicates in a complex and decentralized manner using custom-built peer-to-peer communication to implement a variety of malicious routines. It also leverages multiple anti-tampering techniques to prevent a third party from hijacking or poisoning it, and it is also the first IoT botnet malware strain that can survive device reboots and still remain on compromised devices.” https://lnkd.in/dBM3R6W View in LinkedIn
WHOLESALE CHANGES. "The external transformation in flatfish morphology is accompanied by a plethora of changes in the structure and function of tissues and organs." https://lnkd.in/du68ipH View in LinkedIn
MALWARE ADVANTAGE. “Not only will this emerging development accelerate the time required to breach a system, but the sheer volume that can be applied by a swarm-based botnet targeting multiple devices and exploits simultaneously can quickly overwhelm traditional defense systems.” https://lnkd.in/dBM3R6W View in LinkedIn
EYE MIGRATION. "All adult flatfishes (Pleuronectiformes), including the gastronomically familiar plaice, sole, turbot and halibut, have highly asymmetrical skulls, with both eyes placed on one side of the head. This arrangement, one of the most extraordinary anatomical specializations among vertebrates, arises through migration of one eye during late larval development." https://lnkd.in/dXkc9jF View in LinkedIn
DUAL USE TECHNOLOGY. “The digital world we now inhabit creates unprecedented opportunities – both for good and for ill. One of these possibilities is swarm-based tools that can be used to either attack or defend the network.” https://lnkd.in/dCRvRzp View in LinkedIn
EVOLVING MALWARE. "Soon we will begin to see malware completely created by machines based on automated vulnerability detection and complex data analysis...Polymorphic malware is not new, but it is about to take on a new face by leveraging artificial intelligence to create sophisticated new code that can learn to evade detection through machine written routines." https://lnkd.in/de5H3Um View in LinkedIn
AVOIDING IMMUNE SURVEILLANCE. “In addition, Manky predicts that we'll also see the rise of what he calls next-generation morphic malware, whereby the code of malicious software is automatically altered slightly to evade detection from anti-virus but the same functionality is kept (or some new functionality is gained).” https://lnkd.in/de5H3Um View in LinkedIn
SPREADING INFECTION. “Infected devices will also become smarter, acting on commands without the botnet herder instructing them to do so, he says. As a result, hivenets will be able to grow exponentially as swarms, widening their ability to simultaneously attack multiple victims and significantly impede mitigation and response.” https://lnkd.in/de5H3Um View in LinkedIn