The theme for Cybersecurity Awareness Month 2024 is “Secure Our World”, as introduced by the Cybersecurity and Infrastructure Security Agency (CISA), and the US National Cybersecurity Alliance (NCA). This theme emphasizes empowering individuals with the knowledge and tools to protect themselves from cyber threats. However, individual actions alone are not enough. Global cyber threats are evolving, and governments are working to keep pace through new laws and regulations aimed at strengthening our collective defense.
This article explores today’s major cybersecurity threats and how new legislation is being developed to enhance global cybersecurity.
The rise of AI-powered cyber threats
Artificial intelligence (AI) and machine learning are revolutionizing both sides of the cybersecurity battlefield. Cybercriminals now leverage AI to launch more sophisticated and adaptive attacks, bypassing traditional security systems. According to the Global Cybersecurity Outlook 2024, published by World Economic Forum (WEF), AI could give attackers a significant edge.

Major threats:
- AI-Driven malware: Adaptive malware that learns and evolves, avoiding detection.
- Deepfakes and synthetic identities: Hyper-realistic content used for fraud and disinformation.
- Automated phishing: AI automates and personalizes phishing attacks, making them harder to detect.
Legislative response:
Governments are acting, with the EU AI Act, effective August 2024, being a key regulatory effort. This groundbreaking legislation establishes a framework for the safe and ethical development of AI across the European Union. It uses a risk-based approach, classifying AI systems by potential harm, from minimal to unacceptable risk. The Act enforces strict guidelines for high-risk applications, including critical infrastructure, law enforcement, and cybersecurity, ensuring transparency and protection of fundamental rights. In the U.S., debates around the ethical use of AI in cybersecurity are also gaining momentum.
Ransomware and supply chain attacks: growing threats
Ransomware continues to be a major threat, locking organizations out of their data, while supply chain attacks, such as SolarWinds in 2020 and Kaseya in 2021, remain a significant risk for critical infrastructure.

Key trends:
- Ransomware-as-a-Service (RaaS): Cybercriminals offer ransomware tools to inexperienced hackers, increasing the frequency of attacks and higher ransom demands.
- Supply chain attacks: With incidents like SolarWinds in 2020 and Kaseya in 2021, hackers are targeting weak links in software and infrastructure supply chains to breach large organizations and government agencies.
Legislative response:
Governments are responding with acts like the U.S. Ransomware Disclosure Act requiring companies to report ransom payments for transparency. Globally, agreements like the Paris Call for Trust and Security in Cyberspace promote international collaboration to combat cyber threats.
Cloud security challenges: data sovereignty and privacy
As more organizations move to the cloud, concerns around data privacy, breaches, and compliance have become more pronounced. Misconfigurations in cloud environments, such as improper security settings or access controls, often lead to data exposure and are a major cause of breaches. Differing national laws on data storage further complicate these challenges.
Major risks:
- Data breaches: Misconfigurations in cloud environments expose sensitive information.
- Data Sovereignty: Different countries have different laws regarding where data can be stored, creating challenges for global companies.
Legislative Response:
Regulations like GDPR in Europe enforce strict data protection laws, while the U.S. Cloud Act addresses how cross-border data can be accessed by law enforcement.
Internet of Things (IoT) vulnerabilities: new devices, new risks
With the growing number of IoT devices in use, from smart home systems to industrial controls, the attack surface for cybercriminals continues to expand significantly.
Key risks:
- Increased attack surface: Many IoT devices are not designed with security in mind, leaving them vulnerable to hacking. These vulnerabilities extend to critical infrastructure, where insecure IoT devices can compromise entire systems.
- Botnet attacks: IoT devices are often co-opted into botnets, which are used to launch large-scale Distributed Denial of Service (DDoS) attacks that can take down services and networks.
Legislative Response:
The IoT Cybersecurity Improvement Act in the U.S. sets standards for the security of IoT devices used by federal agencies. The EU Cybersecurity Act establishes a framework for certifying the security of IoT devices, aiming to protect both consumers and organizations.
Cybersecurity governance: towards international collaboration and regulatory evolution
Cybercriminals operate without borders, exploiting vulnerabilities across the digital landscape worldwide. The borderless nature of these threats makes it evident that no single nation can defend itself alone. The rise of cybercrime has compelled governments and organizations to rethink their approaches to cybersecurity governance. Traditional methods of regulation and law enforcement, often constrained by national jurisdictions, have proven inadequate against the borderless-cyber threats. As such, robust international cooperation is now recognized as essential for developing effective solutions. Countries are working together to craft unified strategies, sharing intelligence, best practices, and legal frameworks to create a safer digital environment.

One of the most significant examples is the Budapest Convention on Cybercrime. It is the first international treaty designed to address international based crime. Beyond the Budapest Convention, ongoing efforts at the United Nations aims to establish a Global Cybercrime Treaty to create a more comprehensive, globally inclusive framework that unites nations in the fight against cyber threats.
If successfully negotiated and ratified, this treaty could become a landmark agreement that defines cooperation on a global scale to combat cybercrime. However, there are concerns that it creates digital borders, restricting the innovation and freedom that has long been considered a cornerstone of digital world. There is also the risk that such frameworks could be misused, particularly by authoritarian regimes, as tools for censorship and control over digital spaces.
In essence, the cybersecurity landscape is evolving rapidly, and the dynamics involved are increasingly complex. Navigating these changes requires a delicate balance between fostering security and preserving the openness and innovation that define the digital age. We are in the midst of a critical transition that will shape the future of the global digital ecosystem.
