Breaking the Mold: 2025 Cyber Threats Outlook (Cyber Security Master Class: Episode 20)

Logo
Presented by

Etay Maor (Chief Security Strategist, Cato Networks & Founding Member of Cato CTRL )

About this talk

This year, we’ve seen familiar threats take on unexpected forms - from supply chain breaches and AI-driven vulnerabilities to the risks and costs caused by security complexity. As we head into 2025, understanding these shifts is essential. Join Cato Networks’ Chief Security Strategist and Cato CTRL founding member, Etay Maor, for a Cybersecurity Masterclass unpacking key lessons from 2024’s most significant and unique breaches, and learn what organizations need to know to stay vigilant and protected in the year ahead. What’s covered: New levels of patience and precision in ‘low and slow’ supply chain attacks: The XZ vulnerability attack showcased a rare strategy: a threat actor embedded themselves in an open-source project for years, waiting for the perfect moment to commit a backdoor. Tricking AI with new evasion tactics: Attackers use prompt injections in malware code to mislead AI-based security tools and evade detection, tricking them into marking malicious code as safe. Why complexity is the enemy of security: How the biggest threat to organizations may be their security complexity, which is the leading contributor to the cost of a data breach.
Related topics:

More from this channel

Upcoming talks (15)
On-demand talks (282)
Subscribers (17886)
Cato Networks provides organizations with a cloud-based and secure global SD-WAN that replaces rigid and expensive MPLS and network security point products -- to power the digital business. Cato connects all data centers, branches, mobile users, and cloud resources into a global, optimized cloud network that is tightly secured by a cloud-based network security stack and backed by expert managed security services. Cato cuts MPLS costs, improves performance between global locations and to cloud applications, eliminates branch appliances, provides secure Internet access everywhere, and seamlessly integrates mobile users and cloud datacenters into the WAN.