Cyber Magazine March 2025 | Page 103

THE CYBER INTERVIEW

“ I WAS ONE OF THE LAUNCH EMPLOYEES AT CROWDSTRIKE , BUILDING THE INTELLIGENCE

PROGRAMME FROM THE GROUND UP ”

ADAM MEYERS , SENIOR VICE PRESIDENT OF
COUNTER ADVERSARY OPERATIONS , CROWDSTRIKE
monitoring multiple domains . In order to catch a human threat actor we need to have visibility and human threat hunters to run down those leads and connect the dots across multiple attack surfaces .”
The nature of cyber attacks has transformed significantly in recent years , according to Adam with traditional attack vectors having given way to more sophisticated approaches . “ A few years ago , phishing emails with malicious attachments were the most common tactic . Today , attackers increasingly rely on identity-based attacks , understanding that many organisations have fortified their technical defences with solutions like endpoint detection and response .”
Identity attacks rise as criminals adopt legitimate tools The shift extends to the tools used by threat actors . According to Crowdstrike ’ 2024 Threat Hunting Report , Remote Monitoring and Management ( RMM ) tools have seen a 70 % increase in malicious usage over the past 12 months as criminals adopt legitimate software to maintain persistence in compromised
cybermagazine . com 103