{"id":102034,"date":"2025-01-22T15:42:24","date_gmt":"2025-01-22T07:42:24","guid":{"rendered":"https:\/\/version-2.com\/?p=102034"},"modified":"2025-01-17T15:47:03","modified_gmt":"2025-01-17T07:47:03","slug":"inside-a-hackers-playbook-for-2025-what-to-watch-for","status":"publish","type":"post","link":"https:\/\/version-2.com\/en\/2025\/01\/inside-a-hackers-playbook-for-2025-what-to-watch-for\/","title":{"rendered":"Inside a hackers\u2019 playbook for 2025: What to watch for"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"102034\" class=\"elementor elementor-102034\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-35fe5dd post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"35fe5dd\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;cef08c3&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-409a2e9a\" data-id=\"409a2e9a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5a8be8f elementor-widget elementor-widget-text-editor\" data-id=\"5a8be8f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/content.nordlayer.com\/uploads\/The_mechanics_of_cybercrime_blog_cover_83e833b886.png\" width=\"1400\" height=\"800\" \/><\/p><div class=\"Grid_item__8Wd1v Grid_col9Lg__IiDDJ BlogArticle_contentGrid__wDyG9\"><div class=\"Paper_lightPrimary__mYiVF\" data-testid=\"paper\" data-theme=\"light\">\u00a0<\/div><div class=\"BlogArticle_articleSummary__vUkIt\"><div class=\"ArticleSummary_markdownWrapper__admhj\"><p class=\"Text_text__rSWMU Markdown_paragraph__WNGcF ArticleSummary_paragraph__AmdWA Text_bodyColor__a5sZX\" data-testid=\"text\"><strong class=\"Markdown_strong__zgufl ArticleSummary_strong__PSecf\">Summary:<\/strong> We spoke with Mary D\u2019Angelo about how \u201cmoving left of the boom\u201d in the cyber kill chain can help your business stay secure.<\/p><\/div><\/div><div id=\"section-1\"><p class=\"Text_text__rSWMU SharedArticleMarkdownComponents_paragraph__rX5nt SharedArticleMarkdownComponents_horizontalSpacing__3J8kD\" data-testid=\"text\">Why can unskilled cybercriminals now run sophisticated attacks? Will cybercriminals outpace us in an AI arms race? And what is the next big thing in cybersecurity in 2025?<\/p><p class=\"Text_text__rSWMU SharedArticleMarkdownComponents_paragraph__rX5nt SharedArticleMarkdownComponents_horizontalSpacing__3J8kD\" data-testid=\"text\">We asked <strong class=\"Markdown_strong__zgufl\">Mary D\u2019Angelo,<\/strong> a threat intelligence and dark web expert, for her insights on emerging cyber threats and how businesses can prepare to protect themselves.<\/p><h2 id=\"the-interviews-highlights\" class=\"Heading_root__vbfeI Heading_heading30__45qwh Heading_primary__3VZgz Heading_medium__jmtkh SharedArticleMarkdownComponents_heading__EjJDp SharedArticleMarkdownComponents_heading2__q1N0l SharedArticleMarkdownComponents_horizontalSpacing__3J8kD\" data-testid=\"heading\">The interview\u2019s highlights<\/h2><ul class=\"SharedArticleMarkdownComponents_list__wACy0 SharedArticleMarkdownComponents_horizontalSpacing__3J8kD List_list__ue2mH\"><li class=\"ListItem_item__IYMrj SharedArticleMarkdownComponents_listItem__cstSU\"><div><strong class=\"Markdown_strong__zgufl\">AI and cybersecurity in 2025<\/strong>: 2025 is definitely going to be an AI arms race, with cybercriminals versus us.<\/div><\/li><li class=\"ListItem_item__IYMrj SharedArticleMarkdownComponents_listItem__cstSU\"><div><strong class=\"Markdown_strong__zgufl\">Key industries under attack<\/strong>: Financial, healthcare, and manufacturing will still be the hardest-hit sectors.<\/div><\/li><li class=\"ListItem_item__IYMrj SharedArticleMarkdownComponents_listItem__cstSU\"><div><strong class=\"Markdown_strong__zgufl\">The kill chain, cybercriminal tactics<\/strong>: Cybercriminals often follow the cyber kill chain, starting with gathering intel and ending with data exfiltration.<\/div><\/li><li class=\"ListItem_item__IYMrj SharedArticleMarkdownComponents_listItem__cstSU\"><div><strong class=\"Markdown_strong__zgufl\">Moving \u201cleft of boom\u201d with threat intelligence<\/strong>: Threat intelligence lets you disrupt attacks during the reconnaissance phase before they escalate.<\/div><\/li><li class=\"ListItem_item__IYMrj SharedArticleMarkdownComponents_listItem__cstSU\"><div><strong class=\"Markdown_strong__zgufl\">The importance of proactive defense<\/strong>: No business is too small to be attacked, so businesses should make it more difficult for cybercriminals.<\/div><\/li><\/ul><h2 id=\"cyber-threats-in-2025\" class=\"Heading_root__vbfeI Heading_heading30__45qwh Heading_primary__3VZgz Heading_medium__jmtkh SharedArticleMarkdownComponents_heading__EjJDp SharedArticleMarkdownComponents_heading2__q1N0l SharedArticleMarkdownComponents_horizontalSpacing__3J8kD\" data-testid=\"heading\">Cyber threats in 2025<\/h2><h3 class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_medium__jmtkh SharedArticleMarkdownComponents_heading__EjJDp SharedArticleMarkdownComponents_heading3___q75_ SharedArticleMarkdownComponents_horizontalSpacing__3J8kD\" data-testid=\"heading\">Key insight #1: 2025 is going to be an AI arms race, with cybercriminals vs. us<\/h3><p class=\"Text_text__rSWMU SharedArticleMarkdownComponents_paragraph__rX5nt SharedArticleMarkdownComponents_horizontalSpacing__3J8kD\" data-testid=\"text\"><strong class=\"Markdown_strong__zgufl\">NordLayer:<\/strong> As we closed 2024, what was the most common cyber threat?<\/p><p class=\"Text_text__rSWMU SharedArticleMarkdownComponents_paragraph__rX5nt SharedArticleMarkdownComponents_horizontalSpacing__3J8kD\" data-testid=\"text\"><strong class=\"Markdown_strong__zgufl\">Mary D&#8217;Angelo:<\/strong> The most common threat has been ransomware and other financially motivated attacks, a trend that is likely to continue in 2025. These attacks will become even more common because of the lower barrier to entry. Now, even relatively <strong class=\"Markdown_strong__zgufl\">unskilled hackers can access different tools<\/strong>, like AI and malware, to run sophisticated attacks.<\/p><p class=\"Text_text__rSWMU SharedArticleMarkdownComponents_paragraph__rX5nt SharedArticleMarkdownComponents_horizontalSpacing__3J8kD\" data-testid=\"text\">An example of this is the <a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 SharedArticleMarkdownComponents_link__aj_Vl\" href=\"https:\/\/www.s-rminform.com\/cyber-intelligence-briefing\/cyber-intelligence-briefing-27-february-2024\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Lockbit<\/a> source code leak that happened early in 2024. Many cybercriminals gained access to it, made minor tweaks to the code, and then deployed it onto their victims\u2019 networks.<\/p><\/div><div id=\"section-2\"><div class=\"ArticleImage_root__wPCMO BlogArticle_articleImage__BPrGe\"><img decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/content.nordlayer.com\/uploads\/A_quote_2_7e452cbf83.png\" width=\"1400\" height=\"433\" \/><\/div><\/div><div id=\"section-3\"><p class=\"Text_text__rSWMU SharedArticleMarkdownComponents_paragraph__rX5nt SharedArticleMarkdownComponents_horizontalSpacing__3J8kD\" data-testid=\"text\"><strong class=\"Markdown_strong__zgufl\">NordLayer:<\/strong> <a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 SharedArticleMarkdownComponents_link__aj_Vl\" href=\"https:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2024-10-22-gartner-unveils-top-predictions-for-it-organizations-and-users-in-2025-and-beyond\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Gartner<\/a> predicts that 25% of breaches will involve AI by 2028. What are the emerging threats in 2025 we should brace for, in your opinion?<\/p><p class=\"Text_text__rSWMU SharedArticleMarkdownComponents_paragraph__rX5nt SharedArticleMarkdownComponents_horizontalSpacing__3J8kD\" data-testid=\"text\"><strong class=\"Markdown_strong__zgufl\">Mary D&#8217;Angelo:<\/strong> I saw that stat, too, and I thought it was a really, really low number. From the research that I&#8217;ve done and the attacks that I&#8217;ve seen, most <em>already<\/em> include some level of AI. So by 2028, I think most attacks, not just 25%, will be using AI. 2025 is definitely going to be an <strong class=\"Markdown_strong__zgufl\">AI arms race<\/strong>, with cybercriminals versus us.<\/p><p class=\"Text_text__rSWMU SharedArticleMarkdownComponents_paragraph__rX5nt SharedArticleMarkdownComponents_horizontalSpacing__3J8kD\" data-testid=\"text\"><strong class=\"Markdown_strong__zgufl\">Deepfakes<\/strong> will definitely be a huge one. Fake videos will be mostly used for social engineering tactics, and even phishing attempts will be automated by AI. For example, the content of phishing emails will seem much more authentic.<\/p><p class=\"Text_text__rSWMU SharedArticleMarkdownComponents_paragraph__rX5nt SharedArticleMarkdownComponents_horizontalSpacing__3J8kD\" data-testid=\"text\">Another thing is <strong class=\"Markdown_strong__zgufl\">AI-powered malware<\/strong>. It\u2019s very sophisticated and can evolve based on the environment it&#8217;s in, making it harder to detect and neutralize.<\/p><p class=\"Text_text__rSWMU SharedArticleMarkdownComponents_paragraph__rX5nt SharedArticleMarkdownComponents_horizontalSpacing__3J8kD\" data-testid=\"text\">There are also <strong class=\"Markdown_strong__zgufl\">AI-poisoning tactics<\/strong>. As the name suggests, these involve manipulating AI models in security systems so that they produce incorrect results in cybersecurity operations. It\u2019s a bit like the cat-and-mouse game, really.<\/p><\/div><div id=\"section-4\"><div class=\"ArticleImage_root__wPCMO BlogArticle_articleImage__BPrGe\"><img decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/content.nordlayer.com\/uploads\/A_quote_1_d639f16c62.png\" width=\"1400\" height=\"433\" \/><\/div><\/div><div id=\"section-5\"><div class=\"BlogArticle_relatedArticles__N8UHK\"><div class=\"RelatedArticles_articlesContainer__ZSn2r\"><div class=\"RelatedArticlesCard_root__SK53_\"><div class=\"RelatedArticlesCard_content__QDAXW\"><div class=\"ArticleMetadata_root__lkO5H ArticleMetadata_variantSmall___9ZcM\"><div class=\"ArticleMetadata_metadata__kBNOr ArticleMetadata_withBullets__kFhOa\">\u00a0<\/div><\/div><\/div><\/div><\/div><\/div><\/div><div id=\"section-6\"><p class=\"Text_text__rSWMU SharedArticleMarkdownComponents_paragraph__rX5nt SharedArticleMarkdownComponents_horizontalSpacing__3J8kD\" data-testid=\"text\"><strong class=\"Markdown_strong__zgufl\">NordLayer:<\/strong> These AI threats mean companies need to be more proactive. With cybercrime expected to cost <a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 SharedArticleMarkdownComponents_link__aj_Vl\" href=\"https:\/\/www.ibm.com\/de-de\/ai-cybersecurity?utm_content=SRCWW&amp;p1=Search&amp;p4=43700072818985278&amp;p5=e&amp;p9=58700007553522963&amp;gad_source=1&amp;gclid=Cj0KCQiA3sq6BhD2ARIsAJ8MRwX4U-oFbqxBhVb0gY73t3WId2jgzkCTil3cgX78b4TgKpcnnjUKMrkaAljzEALw_wcB&amp;gclsrc=aw.ds\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">$13.82 trillion<\/a> by 2028, which industries will be hit hardest next year?<\/p><p class=\"Text_text__rSWMU SharedArticleMarkdownComponents_paragraph__rX5nt SharedArticleMarkdownComponents_horizontalSpacing__3J8kD\" data-testid=\"text\"><strong class=\"Markdown_strong__zgufl\">Mary D&#8217;Angelo:<\/strong> I think it&#8217;s the same as in 2024, so <strong class=\"Markdown_strong__zgufl\">financial, healthcare, and manufacturing<\/strong>. Financial because it&#8217;s the most lucrative. Healthcare is often low-hanging fruit. Threat actors know it is stretched thin without the budget and resources to adopt better tools. However, healthcare has incredibly valuable data, which will always be a target. Manufacturing is at risk, too, mostly due to shadow IT and legacy systems. The infrastructure is often outdated, making it easier for threat actors to exploit.<\/p><p class=\"Text_text__rSWMU SharedArticleMarkdownComponents_paragraph__rX5nt SharedArticleMarkdownComponents_horizontalSpacing__3J8kD\" data-testid=\"text\">However, there are <strong class=\"Markdown_strong__zgufl\">attackers with a moral code<\/strong>. Some won\u2019t target hospitals because of the ethics behind it. But they\u2019ll justify attacking banks and large financial organizations. So, the financial sector will always be a top target.<\/p><h3 class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_medium__jmtkh SharedArticleMarkdownComponents_heading__EjJDp SharedArticleMarkdownComponents_heading3___q75_ SharedArticleMarkdownComponents_horizontalSpacing__3J8kD\" data-testid=\"heading\">Key insight #2: Bad actors typically use the cyber kill chain approach to carry out attacks<\/h3><p class=\"Text_text__rSWMU SharedArticleMarkdownComponents_paragraph__rX5nt SharedArticleMarkdownComponents_horizontalSpacing__3J8kD\" data-testid=\"text\"><strong class=\"Markdown_strong__zgufl\">NordLayer<\/strong>: How do cybercriminals typically plan their attacks?<\/p><p class=\"Text_text__rSWMU SharedArticleMarkdownComponents_paragraph__rX5nt SharedArticleMarkdownComponents_horizontalSpacing__3J8kD\" data-testid=\"text\"><strong class=\"Markdown_strong__zgufl\">Mary D&#8217;Angelo:<\/strong> When you say cybercriminals plan their attacks, I think that gives them too much credit. They&#8217;re usually financially motivated, opportunistic, and sporadic. They&#8217;ll do research on who they want to target, but it&#8217;s not incredibly thorough because they look for <strong class=\"Markdown_strong__zgufl\">the easiest prey and easy money.<\/strong><\/p><\/div><div id=\"section-7\"><div class=\"ArticleImage_root__wPCMO BlogArticle_articleImage__BPrGe\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/content.nordlayer.com\/uploads\/A_quote_3_bb33b57493.png\" width=\"1400\" height=\"433\" \/><\/div><\/div><div id=\"section-8\"><p class=\"Text_text__rSWMU SharedArticleMarkdownComponents_paragraph__rX5nt SharedArticleMarkdownComponents_horizontalSpacing__3J8kD\" data-testid=\"text\"><strong class=\"Markdown_strong__zgufl\">NordLayer<\/strong>: And what tactics do cybercriminals use?<\/p><p class=\"Text_text__rSWMU SharedArticleMarkdownComponents_paragraph__rX5nt SharedArticleMarkdownComponents_horizontalSpacing__3J8kD\" data-testid=\"text\">For their reconnaissance, they&#8217;ll go into the dark web, where many initial access brokers sell credentials at a decent price. But they follow what is called <strong class=\"Markdown_strong__zgufl\">the cyber kill chain<\/strong>. It&#8217;s like the steps a threat actor takes to achieve their objective. The kill chain is basically six or seven stages, but it always starts with gathering intel. Then you have weaponization, where you develop the weapon you plan to use. Then, you have your command and control stage. Finally, data exfiltration or the attack.<\/p><p class=\"Text_text__rSWMU SharedArticleMarkdownComponents_paragraph__rX5nt SharedArticleMarkdownComponents_horizontalSpacing__3J8kD\" data-testid=\"text\"><strong class=\"Markdown_strong__zgufl\">NordLayer:<\/strong> The cyber kill chain is the hackers\u2019 playbook, right?<\/p><p class=\"Text_text__rSWMU SharedArticleMarkdownComponents_paragraph__rX5nt SharedArticleMarkdownComponents_horizontalSpacing__3J8kD\" data-testid=\"text\"><strong class=\"Markdown_strong__zgufl\">Mary D&#8217;Angelo:<\/strong> Yes, the <a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 SharedArticleMarkdownComponents_link__aj_Vl\" href=\"https:\/\/attack.mitre.org\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">MITRE ATT&amp;CK<\/a> framework does a great job of defining the tactics a threat actor uses when trying to exfiltrate data from a network. Cybercriminals often don&#8217;t deviate from their playbook because it works. As the saying goes, if it ain&#8217;t broke, don&#8217;t fix it. They&#8217;ll try <strong class=\"Markdown_strong__zgufl\">new approaches only when access is taken away from them<\/strong>, forcing them to start over.<\/p><p class=\"Text_text__rSWMU SharedArticleMarkdownComponents_paragraph__rX5nt SharedArticleMarkdownComponents_horizontalSpacing__3J8kD\" data-testid=\"text\">It&#8217;s unfortunate, but organizations often fall behind because they lack the resources to implement better detection and response tools. Smaller organizations, including hospitals, don&#8217;t have those resources and hence are more vulnerable.<\/p><\/div><div id=\"section-9\"><div class=\"ArticleImage_root__wPCMO BlogArticle_articleImage__BPrGe\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/content.nordlayer.com\/uploads\/Quote_Laurynas_984643a725.png\" width=\"1400\" height=\"771\" \/><\/div><\/div><div id=\"section-10\"><p class=\"Text_text__rSWMU SharedArticleMarkdownComponents_paragraph__rX5nt SharedArticleMarkdownComponents_horizontalSpacing__3J8kD\" data-testid=\"text\"><strong class=\"Markdown_strong__zgufl\">NordLayer:<\/strong> Given the threats and hacker tactics we\u2019ve just discussed, what are the top 5 challenges businesses face this year?<\/p><p class=\"Text_text__rSWMU SharedArticleMarkdownComponents_paragraph__rX5nt SharedArticleMarkdownComponents_horizontalSpacing__3J8kD\" data-testid=\"text\"><strong class=\"Markdown_strong__zgufl\">Mary D&#8217;Angelo:<\/strong> Patching, technical debt, and legacy systems will be big challenges. Cloud security is still in its infancy for many organizations, so we&#8217;ll need to work on it collectively. Exposed and misconfigured vulnerabilities within systems also need attention.<\/p><h2 id=\"threatspecific-responses\" class=\"Heading_root__vbfeI Heading_heading30__45qwh Heading_primary__3VZgz Heading_medium__jmtkh SharedArticleMarkdownComponents_heading__EjJDp SharedArticleMarkdownComponents_heading2__q1N0l SharedArticleMarkdownComponents_horizontalSpacing__3J8kD\" data-testid=\"heading\">Threat-specific responses<\/h2><h3 class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_medium__jmtkh SharedArticleMarkdownComponents_heading__EjJDp SharedArticleMarkdownComponents_heading3___q75_ SharedArticleMarkdownComponents_horizontalSpacing__3J8kD\" data-testid=\"heading\">Key insight #3: \u201cMoving left of boom\u201d lets you stop attacks before they start.<\/h3><p class=\"Text_text__rSWMU SharedArticleMarkdownComponents_paragraph__rX5nt SharedArticleMarkdownComponents_horizontalSpacing__3J8kD\" data-testid=\"text\"><strong class=\"Markdown_strong__zgufl\">NordLayer:<\/strong> How can threat intelligence solutions and security solutions work together to prevent cyber threats?<\/p><p class=\"Text_text__rSWMU SharedArticleMarkdownComponents_paragraph__rX5nt SharedArticleMarkdownComponents_horizontalSpacing__3J8kD\" data-testid=\"text\"><strong class=\"Markdown_strong__zgufl\">Mary D&#8217;Angelo:<\/strong> When it comes to threat intelligence, there are three buckets: <strong class=\"Markdown_strong__zgufl\">tactical, operational, and strategic<\/strong>. If these three work alongside security operations, they can help you be more defensive rather than constantly reacting at the last minute. This way, you\u2019re not always on the edge of your seat when threats or attacks come in.<\/p><p class=\"Text_text__rSWMU SharedArticleMarkdownComponents_paragraph__rX5nt SharedArticleMarkdownComponents_horizontalSpacing__3J8kD\" data-testid=\"text\">Tactical threat intelligence helps security operations by providing background on indicators of compromise and ongoing threats. Strategic threat intelligence is about planning for the year. Executives will identify the ransomware groups more likely to target their organization and their tactics, then build a defense plan for the year to stay strong against them. Operational intelligence is about the day-to-day, ensuring your business has the right intel to respond effectively.<\/p><p class=\"Text_text__rSWMU SharedArticleMarkdownComponents_paragraph__rX5nt SharedArticleMarkdownComponents_horizontalSpacing__3J8kD\" data-testid=\"text\">Most <strong class=\"Markdown_strong__zgufl\">security tools don\u2019t alert you until stages two or three of the kill chain<\/strong>. The advantage of dark web intelligence and threat intelligence is that you can be alerted at the very first stage\u2014during the reconnaissance phase. This is when threat actors are doing their research to identify their next victim and how they plan to attack. By catching the threat early, you disrupt the cybercriminal, forcing them to start over with someone else.<\/p><p class=\"Text_text__rSWMU SharedArticleMarkdownComponents_paragraph__rX5nt SharedArticleMarkdownComponents_horizontalSpacing__3J8kD\" data-testid=\"text\">That\u2019s why threat intelligence is a powerful tool for organizations if done correctly and made actionable.<\/p><\/div><div id=\"section-11\"><div class=\"ArticleImage_root__wPCMO BlogArticle_articleImage__BPrGe\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/content.nordlayer.com\/uploads\/Quote_Andrius_88ec47604b.png\" width=\"1400\" height=\"810\" \/><\/div><\/div><div id=\"section-12\"><p class=\"Text_text__rSWMU SharedArticleMarkdownComponents_paragraph__rX5nt SharedArticleMarkdownComponents_horizontalSpacing__3J8kD\" data-testid=\"text\"><strong class=\"Markdown_strong__zgufl\">NordLayer:<\/strong> Threat intelligence has the power to break this cyber kill chain. How does it work?<\/p><p class=\"Text_text__rSWMU SharedArticleMarkdownComponents_paragraph__rX5nt SharedArticleMarkdownComponents_horizontalSpacing__3J8kD\" data-testid=\"text\"><strong class=\"Markdown_strong__zgufl\">Mary D&#8217;Angelo:<\/strong> Organizations often track their key criminal groups through strategic threat intelligence. For example, if I were in healthcare, I\u2019d focus on the threat actors targeting the healthcare industry and understand their tactics and techniques. Once I identify these groups, I can set up systems to detect their activity.<\/p><p class=\"Text_text__rSWMU SharedArticleMarkdownComponents_paragraph__rX5nt SharedArticleMarkdownComponents_horizontalSpacing__3J8kD\" data-testid=\"text\">A good analyst tracking the right dark web forums and marketplaces might come across an initial access broker selling credentials for a hospital. These brokers are very sneaky\u2014they don\u2019t directly name the hospital but mention the industry and the company\u2019s revenue size. But if you\u2019re sharp, you can identify the target hospital.<\/p><p class=\"Text_text__rSWMU SharedArticleMarkdownComponents_paragraph__rX5nt SharedArticleMarkdownComponents_horizontalSpacing__3J8kD\" data-testid=\"text\">Once you know the attack is targeting you, you\u2019re ahead of the game. The broker sells privileged access to the hospital, which could lead to a breach. By spotting this early, you can take action to mitigate the threat.<\/p><p class=\"Text_text__rSWMU SharedArticleMarkdownComponents_paragraph__rX5nt SharedArticleMarkdownComponents_horizontalSpacing__3J8kD\" data-testid=\"text\">We always say \u201c<strong class=\"Markdown_strong__zgufl\">move left of boom,\u201d<\/strong> a military term. It\u2019s about getting <strong class=\"Markdown_strong__zgufl\">as far left on the kill chain as possible.<\/strong> Instead of being alerted at stage three, when you&#8217;re panicking, you can act early and prevent the attack before it escalates.<\/p><p class=\"Text_text__rSWMU SharedArticleMarkdownComponents_paragraph__rX5nt SharedArticleMarkdownComponents_horizontalSpacing__3J8kD\" data-testid=\"text\"><strong class=\"Markdown_strong__zgufl\">NordLayer:<\/strong> So moving to the left of the kill chain also means always upgrading your security?<\/p><p class=\"Text_text__rSWMU SharedArticleMarkdownComponents_paragraph__rX5nt SharedArticleMarkdownComponents_horizontalSpacing__3J8kD\" data-testid=\"text\"><strong class=\"Markdown_strong__zgufl\">Mary D&#8217;Angelo:<\/strong> Yes, absolutely. Stressing that <strong class=\"Markdown_strong__zgufl\">no business is too small to be attacked<\/strong> is never enough. So gear up for it and make it more difficult for cybercriminals.<\/p><p class=\"Text_text__rSWMU SharedArticleMarkdownComponents_paragraph__rX5nt SharedArticleMarkdownComponents_horizontalSpacing__3J8kD\" data-testid=\"text\"><strong class=\"Markdown_strong__zgufl\">NordLayer:<\/strong> Thank you very much for your insights.<\/p><p class=\"Text_text__rSWMU SharedArticleMarkdownComponents_paragraph__rX5nt SharedArticleMarkdownComponents_horizontalSpacing__3J8kD\" data-testid=\"text\">Mary D\u2019Angelo is a Cyber Threat Intelligence Solutions Lead at Filigran, where she focuses on democratizing threat intelligence. She started her career at Darktrace before joining Searchlight in 2021.<\/p><p class=\"Text_text__rSWMU SharedArticleMarkdownComponents_paragraph__rX5nt SharedArticleMarkdownComponents_horizontalSpacing__3J8kD\" data-testid=\"text\">Outside of work, Mary is dedicated to supporting child safety initiatives through the Innocent Lives Foundation. She\u2019s passionate about sharing her knowledge and continuing to learn as the cybersecurity field evolves.<\/p><h2 id=\"how-can-nordlayer-help\" class=\"Heading_root__vbfeI Heading_heading30__45qwh Heading_primary__3VZgz Heading_medium__jmtkh SharedArticleMarkdownComponents_heading__EjJDp SharedArticleMarkdownComponents_heading2__q1N0l SharedArticleMarkdownComponents_horizontalSpacing__3J8kD\" data-testid=\"heading\">How can NordLayer help?<\/h2><p class=\"Text_text__rSWMU SharedArticleMarkdownComponents_paragraph__rX5nt SharedArticleMarkdownComponents_horizontalSpacing__3J8kD\" data-testid=\"text\">Cybersecurity can feel overwhelming, but it starts with building awareness of safe digital practices. From there, focus on easy-to-deploy tools or partner with an MSP or MSSP to protect against opportunistic attacks.<\/p><p class=\"Text_text__rSWMU SharedArticleMarkdownComponents_paragraph__rX5nt SharedArticleMarkdownComponents_horizontalSpacing__3J8kD\" data-testid=\"text\">NordLayer is <strong class=\"Markdown_strong__zgufl\">a toggle-ready platform<\/strong> that offers comprehensive security to protect your business. Our solutions include:<\/p><ul class=\"SharedArticleMarkdownComponents_list__wACy0 SharedArticleMarkdownComponents_horizontalSpacing__3J8kD List_list__ue2mH\"><li class=\"ListItem_item__IYMrj SharedArticleMarkdownComponents_listItem__cstSU\"><div><a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 SharedArticleMarkdownComponents_link__aj_Vl\" href=\"https:\/\/nordlayer.com\/network-security\/threat-prevention\/\"><strong class=\"Markdown_strong__zgufl\">Threat Prevention<\/strong><\/a> to stop malicious downloads or prevent access to harmful websites<\/div><\/li><li class=\"ListItem_item__IYMrj SharedArticleMarkdownComponents_listItem__cstSU\"><div><a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 SharedArticleMarkdownComponents_link__aj_Vl\" href=\"https:\/\/nordlayer.com\/business-vpn\/\"><strong class=\"Markdown_strong__zgufl\">Business VPN<\/strong><\/a> for secure remote work<\/div><\/li><li class=\"ListItem_item__IYMrj SharedArticleMarkdownComponents_listItem__cstSU\"><div><a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 SharedArticleMarkdownComponents_link__aj_Vl\" href=\"https:\/\/nordlayer.com\/features\/cloud-firewall\/\"><strong class=\"Markdown_strong__zgufl\">Cloud Firewall<\/strong><\/a> for robust network access controls<\/div><\/li><\/ul><p class=\"Text_text__rSWMU SharedArticleMarkdownComponents_paragraph__rX5nt SharedArticleMarkdownComponents_horizontalSpacing__3J8kD\" data-testid=\"text\">We also recommend multi-layered <a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 SharedArticleMarkdownComponents_link__aj_Vl\" href=\"https:\/\/nordlayer.com\/zero-trust\/network-access\/\"><strong class=\"Markdown_strong__zgufl\">Zero Trust Network Access (ZTNA)<\/strong><\/a> policies for stronger network protection. Need help? <a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 SharedArticleMarkdownComponents_link__aj_Vl\" href=\"https:\/\/nordlayer.com\/contact-sales\/\">Our sales team<\/a> is always ready to guide you every step of the way.<\/p><p class=\"Text_text__rSWMU SharedArticleMarkdownComponents_paragraph__rX5nt SharedArticleMarkdownComponents_horizontalSpacing__3J8kD\" data-testid=\"text\">Monitoring the dark web is crucial for staying ahead of threats. This is where <a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 SharedArticleMarkdownComponents_link__aj_Vl\" href=\"https:\/\/nordstellar.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">NordStellar<\/a> comes in. It tackles <strong class=\"Markdown_strong__zgufl\">vulnerabilities during the reconnaissance phase<\/strong> of the cyber kill chain.<\/p><p class=\"Text_text__rSWMU SharedArticleMarkdownComponents_paragraph__rX5nt SharedArticleMarkdownComponents_horizontalSpacing__3J8kD\" data-testid=\"text\">The platform automates key security tasks, such as:<\/p><ul class=\"SharedArticleMarkdownComponents_list__wACy0 SharedArticleMarkdownComponents_horizontalSpacing__3J8kD List_list__ue2mH\"><li class=\"ListItem_item__IYMrj SharedArticleMarkdownComponents_listItem__cstSU\"><div><strong class=\"Markdown_strong__zgufl\">Dark web monitoring<\/strong> to track company-related risks<\/div><\/li><li class=\"ListItem_item__IYMrj SharedArticleMarkdownComponents_listItem__cstSU\"><div><strong class=\"Markdown_strong__zgufl\">Leaked data management<\/strong> to protect employees and customers<\/div><\/li><li class=\"ListItem_item__IYMrj SharedArticleMarkdownComponents_listItem__cstSU\"><div><strong class=\"Markdown_strong__zgufl\">Attack surface assessments<\/strong> to identify and mitigate potential weaknesses.<\/div><\/li><\/ul><p class=\"Text_text__rSWMU SharedArticleMarkdownComponents_paragraph__rX5nt SharedArticleMarkdownComponents_horizontalSpacing__3J8kD\" data-testid=\"text\">Together, NordLayer and NordStellar provide <strong class=\"Markdown_strong__zgufl\">a proactive, multi-layered defense<\/strong> to protect your business.<\/p><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-cf03edf elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"cf03edf\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b576c6d\" data-id=\"b576c6d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-9e34e91 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"9e34e91\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-bb2c932\" data-id=\"bb2c932\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-bfd91ca elementor-widget elementor-widget-shortcode\" data-id=\"bfd91ca\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"63561\" class=\"elementor elementor-63561\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1b6aa2c4 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"1b6aa2c4\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1b283ee5\" data-id=\"1b283ee5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4e466f1a elementor-widget elementor-widget-text-editor\" data-id=\"4e466f1a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About NordLayer<br \/><\/strong>NordLayer is an adaptive network access security solution for modern businesses \u2013 from the world\u2019s most trusted cybersecurity brand, Nord Security.<\/p><p>The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>\u00a0 Summary: We spoke with Mary D\u2019Angelo about how \u201cmovin [&hellip;]<\/p>","protected":false},"author":149011790,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1130,1305,973,61],"tags":[974,1077,1132],"class_list":["post-102034","post","type-post","status-publish","format-standard","hentry","category-nordlayer","category-1305","category-nord-security","category-press-release","tag-nord-security","tag-1077","tag-nordlayer"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Inside a hackers\u2019 playbook for 2025: What to watch for - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nordlayer.com\/blog\/inside-hackers-playbook-2025\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Inside a hackers\u2019 playbook for 2025: What to watch for - Version 2\" \/>\n<meta property=\"og:description\" content=\"\u00a0 Summary: We spoke with Mary D\u2019Angelo about how \u201cmovin [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nordlayer.com\/blog\/inside-hackers-playbook-2025\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2025-01-22T07:42:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/content.nordlayer.com\/uploads\/The_mechanics_of_cybercrime_blog_cover_83e833b886.png\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/inside-hackers-playbook-2025\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2025\\\/01\\\/inside-a-hackers-playbook-for-2025-what-to-watch-for\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"Inside a hackers\u2019 playbook for 2025: What to watch for\",\"datePublished\":\"2025-01-22T07:42:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2025\\\/01\\\/inside-a-hackers-playbook-for-2025-what-to-watch-for\\\/\"},\"wordCount\":1740,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/inside-hackers-playbook-2025\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/content.nordlayer.com\\\/uploads\\\/The_mechanics_of_cybercrime_blog_cover_83e833b886.png\",\"keywords\":[\"Nord Security\",\"2025\",\"NordLayer\"],\"articleSection\":[\"NordLayer\",\"2025\",\"Nord Security\",\"Press Release\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2025\\\/01\\\/inside-a-hackers-playbook-for-2025-what-to-watch-for\\\/\",\"url\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/inside-hackers-playbook-2025\\\/\",\"name\":\"Inside a hackers\u2019 playbook for 2025: What to watch for - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/inside-hackers-playbook-2025\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/inside-hackers-playbook-2025\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/content.nordlayer.com\\\/uploads\\\/The_mechanics_of_cybercrime_blog_cover_83e833b886.png\",\"datePublished\":\"2025-01-22T07:42:24+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/inside-hackers-playbook-2025\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nordlayer.com\\\/blog\\\/inside-hackers-playbook-2025\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/inside-hackers-playbook-2025\\\/#primaryimage\",\"url\":\"https:\\\/\\\/content.nordlayer.com\\\/uploads\\\/The_mechanics_of_cybercrime_blog_cover_83e833b886.png\",\"contentUrl\":\"https:\\\/\\\/content.nordlayer.com\\\/uploads\\\/The_mechanics_of_cybercrime_blog_cover_83e833b886.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/inside-hackers-playbook-2025\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Inside a hackers\u2019 playbook for 2025: What to watch for\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/en\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Inside a hackers\u2019 playbook for 2025: What to watch for - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nordlayer.com\/blog\/inside-hackers-playbook-2025\/","og_locale":"en_US","og_type":"article","og_title":"Inside a hackers\u2019 playbook for 2025: What to watch for - Version 2","og_description":"\u00a0 Summary: We spoke with Mary D\u2019Angelo about how \u201cmovin [&hellip;]","og_url":"https:\/\/nordlayer.com\/blog\/inside-hackers-playbook-2025\/","og_site_name":"Version 2","article_published_time":"2025-01-22T07:42:24+00:00","og_image":[{"url":"https:\/\/content.nordlayer.com\/uploads\/The_mechanics_of_cybercrime_blog_cover_83e833b886.png","type":"","width":"","height":""}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"Written by":"tracylamv2","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nordlayer.com\/blog\/inside-hackers-playbook-2025\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2025\/01\/inside-a-hackers-playbook-for-2025-what-to-watch-for\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"Inside a hackers\u2019 playbook for 2025: What to watch for","datePublished":"2025-01-22T07:42:24+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2025\/01\/inside-a-hackers-playbook-for-2025-what-to-watch-for\/"},"wordCount":1740,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/nordlayer.com\/blog\/inside-hackers-playbook-2025\/#primaryimage"},"thumbnailUrl":"https:\/\/content.nordlayer.com\/uploads\/The_mechanics_of_cybercrime_blog_cover_83e833b886.png","keywords":["Nord Security","2025","NordLayer"],"articleSection":["NordLayer","2025","Nord Security","Press Release"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2025\/01\/inside-a-hackers-playbook-for-2025-what-to-watch-for\/","url":"https:\/\/nordlayer.com\/blog\/inside-hackers-playbook-2025\/","name":"Inside a hackers\u2019 playbook for 2025: What to watch for - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nordlayer.com\/blog\/inside-hackers-playbook-2025\/#primaryimage"},"image":{"@id":"https:\/\/nordlayer.com\/blog\/inside-hackers-playbook-2025\/#primaryimage"},"thumbnailUrl":"https:\/\/content.nordlayer.com\/uploads\/The_mechanics_of_cybercrime_blog_cover_83e833b886.png","datePublished":"2025-01-22T07:42:24+00:00","breadcrumb":{"@id":"https:\/\/nordlayer.com\/blog\/inside-hackers-playbook-2025\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nordlayer.com\/blog\/inside-hackers-playbook-2025\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/nordlayer.com\/blog\/inside-hackers-playbook-2025\/#primaryimage","url":"https:\/\/content.nordlayer.com\/uploads\/The_mechanics_of_cybercrime_blog_cover_83e833b886.png","contentUrl":"https:\/\/content.nordlayer.com\/uploads\/The_mechanics_of_cybercrime_blog_cover_83e833b886.png"},{"@type":"BreadcrumbList","@id":"https:\/\/nordlayer.com\/blog\/inside-hackers-playbook-2025\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"Inside a hackers\u2019 playbook for 2025: What to watch for"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/en\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-qxI","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/102034","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/comments?post=102034"}],"version-history":[{"count":7,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/102034\/revisions"}],"predecessor-version":[{"id":102041,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/102034\/revisions\/102041"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/media?parent=102034"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/categories?post=102034"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/tags?post=102034"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}