Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceArenas / Stadiums / Leagues / EntertainmentInfrastructure:Electric,Gas & Water

2024: The year of upticks in cyber warfare

By Carlos Morales
The Earth

Image via Unsplash

June 11, 2024

Historical trends over the past decade prove that when global conflicts arise, it’s inevitable that we’ll begin to see widespread cyberattacks shortly thereafter. This has been the case during the recent happenings between Russia and Ukraine, and Israel and Gaza. At the beginning of each crisis, we witnessed an immediate uptick in cyberattacks worldwide in areas such as DDoS, API and DNS attacks.

Following the Iranian missile strike in April, we have already seen and can expect a sustained increase in attacks — especially leading up to major upcoming events like the 2024 United States presidential election, the Olympic Games and the international soccer cup tournaments.

Everyone must be on high alert for the increasing threat of cyber warfare, and time is of the essence to establish preventative measures.

The spillover effect of geopolitical events

Geopolitical events spur cyberattacks because attackers want to sow chaos to gain advantage over their adversaries. Attackers gather intelligence and disrupt everything from critical infrastructure, politics and the economy. Monitoring the correlations between events like the Iranian missile strike and related attack traffic can help predict potential future attacks around similar events.

In the case of Iran, one cyber mitigation provider reported seeing approximately 2,130 DDoS attacks between April 12 and 13, around the time of the strike. In the days before, there was also an uptick in DDoS attacks, with the provider recording 1,494 attacks. This attack rate represented an astounding 589 percent increase from the April 2024 daily average for that provider.

In the aftermath of the strike, hacktivist groups also targeted key industries such as finance, government, utilities and education. Similarly, there was an uptick in DDoS threats from hacktivist groups against Jordanian organizations in response to their action in intercepting some of the Iranian missiles with unmanned aerial vehicles (UAVs).

Attacks stemming from geopolitical motives can also impact enterprises by disrupting services or compromising sensitive data. The higher risk of attacks and potential repercussions reinforce the need for establishment of robust security defenses.

Critical threats to watch out for

Considering this year’s election, it’s more likely that we’ll witness increased cybersecurity threats that will impact businesses, critical infrastructure and individuals involved. These events ratchet up the intensity of politically motivated attacks as nation-state actors often target event-specific infrastructure — such as election websites and systems — and increased data consumption of individuals, like tampering with online election content and political party platforms. The same holds true for major sporting events that will take place such as the Olympics.

The maturity of generative AI and its involvement in carrying out attacks is increasing the success efficacy of attackers, so defenses must take this into account. AI-generated deepfakes threaten election administration and security by impersonating candidates or other prominent figures. AI can also be used in phishing or smishing attacks to make them appear more legitimate and entice potential victims interested in political commentary or a particular sport.

Fraudulent bots will play a major role across social media as well. During the 2016 and 2020 elections, bots were used to echo messages and misinformation from political parties to increase voter outrage toward their candidates’ opponents. Bot controllers create accounts and steal more benign posts from real users to increase their reach. These accounts then interact with political posts to trick social media algorithms into thinking that the political posts are more popular than they actually are. Thanks to AI, bot activity will surely be repeated this election — only on a larger scale — as it has the power to better diversify content and appear like real users.

While it’s essential for organizations to be on high alert of potential threats ahead of this year’s major events, planning must start now. History has proven that any business, even those minimally involved in the event, can become a target.

Don’t wait until a major event happens to put defenses in place

Effective defenses against any attack are wholly dependent on preparation. Reactive measures will always cause delays in implementing protections and, in turn, getting those protections right. Having preparations in place will limit exposure considerably.

Threats like DDoS and attacks against APIs and DNS are a severe risk to business continuity. Organizations should continuously assess their attack surface and ensure they have protections or services in place against these types of attacks. There should also be continuous inspection of configuration, automation, integration and testing of response processes — even if there’s no indication of an imminent attack. Organizations should also increase their layered protections for ransomware, malware and other intrusion attacks, including implementation of zero trust frameworks, intelligent proxies and endpoint detection and response.

Adopting a proactive mindset

Everyone must be prepared for the inevitable attack before it happens. Global conflicts, social upheaval and major events heighten the opportunity for attacks, and enterprises and government entities alike need to be ready to detect, identify and block attacks as they happen.

The key is to think proactively to withstand whatever comes your way with minimal exposure. Businesses, critical infrastructure and governmental bodies should be taking the time to either put solutions in place or assess their current tech stack to prepare defenses before the upcoming periods of increased threats, like the U.S. election, the Olympics and the international soccer cup tournaments. Acknowledging the evolving threat landscape and taking action to improve defenses will drastically help organizations mitigate risks and safeguard their integrity.

KEYWORDS: critical infrastructure cybersecurity cyberattacks global security threats proactive security security preparation

Share This Story

Carlos morales headshot

Carlos Morales is SVP of Solutions at Vercara. Image courtesy of Morales

Blog Topics

Security Blog

On the Track of OSAC

Blog Roll

Security Industry Association

Security Magazine's Daily News

SIA FREE Email News

SDM Blog

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

Coding on screen

Research reveals mass scanning and exploitation campaigns

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

September 29, 2025

Global Security Exchange (GSX)

 

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing