CYBERSECURITY
networks.“ These tools are harder for threat hunters to detect and indict as they may be an authorised user conducting system maintenance,” Adam notes.
Cloud-based attacks have risen by 75 % in the past year, while interactive intrusions have increased by 55 % as criminals move away from automated attacks.“ What’ s notable is that these intrusions aren’ t fully automated; human operators actively engage with compromised systems to blend in as legitimate users and bypass security controls to maximise their gains,” he explains.
This evolution in attack methods requires a corresponding change in defence strategies.“ Relying solely on reactive measures or traditional defences isn’ t enough anymore. Threat hunting allows organisations to go out and meet the adversary when they make contact: the closer you can get to the initial intrusion, the faster you can stop the adversary.”
Peak attack periods identified in industry sectors Analysis by Adam’ s team has identified seasonal patterns in cyber criminal activity, with peak periods during the third and fourth quarters. Threat actors have begun targeting edge devices with vulnerabilities, while ransomware operators focus on unmanaged systems and hypervisors.
And looking forward, the emergence of AI and machine learning presents new challenges for cybersecurity teams.
CROWDSTRIKE’ S
2024
THREAT HUNTING REPORT FOUND HANDS-ON-KEYBOARD INTRUSIONS INCREASED BY
55 %,
WHILE REMOTE MONITORING AND MANAGEMENT( RMM) ADVERSARIAL TOOL ABUSE GREW BY
70 %
“ One trend we’ re closely monitoring is the increasing use of AI and machine learning by adversaries,” he notes.“ Just as defenders are leveraging these technologies, attackers are too.
“ We’ re beginning to see threat actors use AI to automate tasks like phishing campaigns and penetration testing. The pace at which adversaries are evolving is unprecedented and organisations must continue to invest in intelligence-driven security.”
110 August 2025