FinTech Magazine August 2025 | Page 105

CYBERSECURITY

The landscape of corporate cybersecurity continues to shift, as threat actors abandon conventional malware attacks in favour of identity-based infiltration. This evolution in tactics presents new challenges for western organisations already grappling with state-sponsored cyber campaigns and increasingly sophisticated criminal groups.

According to research by Crowdstrike, cloud-based intrusions have risen by 75 % in the past year, while cyber criminals have increased their use of legitimate remote management tools by 70 %. These changes reflect a broader shift in attack methodologies, as adversaries adapt to improved corporate defences and seek new ways to breach company networks.
The transformation coincides with an increase in state-sponsored activities targeting western corporations, particularly from North Korean actors. Their operations have expanded beyond traditional cyber attacks to include the placement of IT workers within aerospace and technology companies, creating insider threats that conventional security measures struggle to detect.
Adam Meyers, Senior Vice President of Counter Adversary Operations( CAO) at CrowdStrike, heads a global team tracking criminal groups, state-sponsored actors and nation-state entities. His division integrates the capabilities of CrowdStrike Falcon Intelligence and Falcon OverWatch managed threat hunting teams with the company’ s AI-powered Falcon platform to detect and respond to emerging threats.
HOW CROWDSTRIKE TRACKED 2015-16 DNC CYBERATTACKS
CrowdStrike played a crucial role in investigating the 2015-2016 cyberattacks on the Democratic National Committee( DNC). The company’ s analysis linked the intrusions to two Russian intelligence-affiliated groups, with FBI Director James Comey later testifying to congress that CrowdStrike, along with other cybersecurity firms, concluded with high certainty that Russian intelligence services were behind the attacks.
From political science student to cyber threat response chief Adam, who joined CrowdStrike as one of its first employees, traces his path to cybersecurity through an unconventional route. After studying political science, he began work as a penetration tester for a defence contractor, where his interest in cyber threats developed.
“ This led me to the path of exploit development, but my curiosity led me to reverse engineering,” he explains. The transition to threat hunting came through hands-on experience with cyber criminals.“ I was working with a number of researchers tracking various threats when I encountered malware that was being used as a proxy for criminals. I could see the traffic they were
fintechmagazine. com 105