Don’t let overlooked obligations become incidents. Learn how.
Utility navigation bar redirect icon
Portal LoginSupportBlogContact
Search
Close search
Huntress Logo in Teal
  • Platform Overview
    Managed EDR

    Get full endpoint visibility, detection, and response.

    Managed EDR

    Get full endpoint visibility, detection, and response.

    Managed ITDR

    Protect your Microsoft 365 and Google Workspace identities and email environments.

    Managed ITDR

    Protect your Microsoft 365 and Google Workspace identities and email environments.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed Security Awareness Training

    Empower your teams with science-backed security awareness training.

    Managed Security Awareness Training

    Empower your teams with science-backed security awareness training.

    Managed ISPM

    Continuous Microsoft 365 and identity hardening, managed and enforced by Huntress experts.

    Managed ISPM

    Continuous Microsoft 365 and identity hardening, managed and enforced by Huntress experts.

    Managed ESPM

    Proactively secure endpoints against attacks.

    Managed ESPM

    Proactively secure endpoints against attacks.

    Integrations
    Integrations
    Support Documentation
    Support Documentation
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
  • Threats We Stop
    Phishing
    Phishing
    Business Email Compromise
    Business Email Compromise
    Ransomware
    Ransomware
    Infostealers
    Infostealers
    View Allright arrowView Allright arrow
    Industries We Serve
    Education
    Education
    Financial Services
    Financial Services
    State and Local Government
    State and Local Government
    Healthcare
    Healthcare
    Law Firms
    Law Firms
    Manufacturing
    Manufacturing
    Utilities
    Utilities
    View Allright arrowView Allright arrow
    Tailored Solutions
    MSPs
    MSPs
    Resellers
    Resellers
    SMBs
    SMBs
    Compliance
    Compliance
    What Gets Overlooked Gets Exploited

    Most days, nothing happens. But one day, something will.

    Huntress Cybersecurity
    Cybercriminals Have Evolved

    Get the intel on today’s cybercriminal groups and learn how to protect yourself.

    Huntress Cybersecurity
  • Pricing
  • Community Series
    The Product Lab

    Shape the next big thing in cybersecurity together.

    The Product Lab

    Shape the next big thing in cybersecurity together.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    Resources
    Upcoming Events
    Upcoming Events
    Ebooks
    Ebooks
    On-Demand Webinars
    On-Demand Webinars
    Videos
    Videos
    Whitepapers
    Whitepapers
    Datasheets
    Datasheets
    Cybersecurity Education
    Cybersecurity 101
    Cybersecurity 101
    Cybersecurity Guides
    Cybersecurity Guides
    Threat Library
    Threat Library
    Real Tradecraft, Real Results
    Real Tradecraft, Real Results
    2026 Cyber Threat Report
    2026 Cyber Threat Report
    The Huntress Blog
    Huntress Lands on the Microsoft Marketplace
    Huntress Cybersecurity
    Huntress Lands on the Microsoft Marketplace
    Huntress Cybersecurity
    How Huntress & DEFCERT Are Streamlining CMMC Assessment Prep
    Huntress Cybersecurity
    How Huntress & DEFCERT Are Streamlining CMMC Assessment Prep
    Huntress Cybersecurity
    Live Hacking Into Microsoft 365 with Kyle Hanslovan
    Huntress Cybersecurity
    Live Hacking Into Microsoft 365 with Kyle Hanslovan
    Huntress Cybersecurity
  • Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    The Huntress SOC

    24/7 Security Operations Center

    The Huntress SOC

    24/7 Security Operations Center

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Community

    Get in touch with the Huntress Community team

    Community

    Get in touch with the Huntress Community team

    Compare Huntress
    Bitdefender
    Bitdefender
    Blackpoint
    Blackpoint
    Breach Secure Now!
    Breach Secure Now!
    Crowdstrike
    Crowdstrike
    Datto
    Datto
    SentinelOne
    SentinelOne
    Sophos
    Sophos
    Compare Allright arrowCompare Allright arrow
  • HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    Partners
    MSPs

    Join our partner community to deliver expert-led managed security.

    MSPs

    Join our partner community to deliver expert-led managed security.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Tech Alliances

    Driving innovation through global technology Partnerships

    Tech Alliances

    Driving innovation through global technology Partnerships

    Microsoft Partnership

    A Level-Up for Your Business Security

    Microsoft Partnership

    A Level-Up for Your Business Security

  • Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Awards
    Awards
    Contact Us
    Contact Us
  • Portal Login
  • Support
  • Blog
  • Contact
  • Search
  • Get a Demo
  • Start for Free
Portal LoginSupportBlogContact
Search
Close search
Get a Demo
Start for Free
HomeBlog
Going the Distance: Cyber Predictions for 2023
Published:
January 3, 2023

Going the Distance: Cyber Predictions for 2023

By:
Alana Stroud
Share icon
Glitch effectGlitch effectGlitch effect

There is always buzz around this time of year from cyber professionals the world over doing their best to foretell what the threat landscape will look like in the coming year. And at Huntress, we’ve got some hard-hitting takes from two of the best in the field.

Entering the ring, two of Huntress’ heavy hitters John Hammond and Dray Agha laced up their gloves to join the good fight and add their predictions for 2023 to the slugfest based on Huntress observations in 2022—and you can bet your patootie they didn’t pull any punches. 

Let's be clear about the point of this blog though: whilst we can always step up our technological security game, we’ll hit harder and smarter if we step up and foster our cultural security game. This will have the cascading impact of reducing burnout, training users to be shrewder and ultimately imposing a far greater cost on adversaries.

Below we cover five key trusted knowledge observations (TKOs) regarding the threats and insights John and Dray feel are trending for 2023 that we can all take a part in preventing from becoming reality. 

TKO #1: Phishing 🎣 

Cyber attackers will continue using the economic crisis and political tie-ins to phish users.

Backdoor documents with catchy titles/content like “Layoffs 2023” or “Department Budgets 2023" will continue to be a popular method for cybercriminals phishing users, as will attachments and links that leverage spicy political topics like Liz Truss stepping down, midterm elections, etc. There are even efforts out there masquerading as legitimate relief asking for donations that never make it to the orgs they claim to support. The tomfoolery knows no bounds.

The best way to combat phishing is security awareness training for all employees. Yes, we’ve said it before and we’ll continue to say it for those trickling in and standing in the back (we see you 👀): train up your workforce to be keen to attack techniques that face the average user on a daily basis. 

👉 By ignoring this simple yet crucial task, you are creating your own insider threats. 

Social engineering isn’t going to go away, so help your people help themselves (and you!) by knowing what to look for, who to report suspicious activity to, and how to keep your company safe from attackers.

In the wise words of Dray Agha:

"Email is the best delivery mechanism for adversaries. Whether they're delivering malware, socially engineering users to install something SUS, or if they're just straight tryna STEAL your users creds - email is the necessary evil we're all going to have to continue managing. An educated user force is best defence we can foster to create a hostile environment that rejects malicious intent."

TKO #2: Dark Web Marketing 🕸️ 

Dark web marketing will only get more sophisticated and widespread.

Cybercriminals are getting more and more innovative with how they advertise their products, even giving them to security researchers (like John Hammond) to play around with and utilize in research/educational materials. Cybercriminal groups are going to continue to rework their marketing operations to look more like those of legitimate businesses (FAQs, marketing materials, case studies, etc.).

💡ICYMI💡 The Merriam-Webster online dictionary defines the term dark web with the following definition: The set of web pages on the World Wide Web that cannot be indexed by search engines, are not viewable in a standard Web browser, require specific means (such as specialized software or network configuration) in order to access, and use encryption to provide anonymity and privacy for users.

If you think cybercrime isn’t already a business venture, you’re severely misguided. 

Sure, some of these threat actors are script kiddies seeing what all they can get up to and striking gold. However, the more experienced cyber gangs have business models, organizational hierarchies, and even ways in which they handle grievances among themselves in forums on the darknet. They are very much for-profit and they make a lot of money by selling ransomware-as-a-service (RaaS) to other hackers, collecting ransoms from breached companies, and duping the average Joe out of their money with ingenious phishing techniques. Staying aware and up-to-date on the threat landscape will be your best course of action.

TKO #3: Cybercriminal Insider Threats 🧑💻 

Cybercriminal groups will continue facing their own insider threats.

The recent incident with LockBit won’t be the last time we see builder code get leaked…and it likely won’t be the last time we see hackers screwing up the plans of groups they’re disgruntled with or competing against. And we’re sorta fine with that.

As mentioned in TKO #2, there exists in a not-so-far-away land a dark and scary place in the bowels of the interwebs called the dark web, and most of the grievances threat actors take with each other occur there in moderated forums. But those who are really fed up with their cohorts take to publishing trade secrets on the regular ol’ internet for all to see, much like any other whistleblower has. Sometimes it’s an attempt to save their own hides and comply with law enforcement, and sometimes it’s just a “screw you guys, I’m goin’ home” type of thing. But whatever the reason, we are happy when they do.

TKO #4: Burnout 🔥 

Burnout will continue to be an issue at all stages of cybersecurity practitioners’ careers (and pre-careers).

John Hammond has some empathetic and insightful words on this topic:

Personally I'm a huge fan of the talk-track on "burnout before even getting into the business" -- like there are so many people and students that are so interested in, fascinated by, and passionate about cybersecurity -- but get super bogged down and overwhelmed by everything because our industry is just a freaking information yard sale. So anything we can do to offer some solace and level-headedness that says, "Hey, let's take this as an opportunity to curate what we offer to passionate people and cultivate the best in our community" is something I think we should strive for.

From applicants to junior staffers to team leads to CISOs—cybersecurity burnout is going to continue to fuel the widening of the workforce/skills gap. Applicants are having to spend thousands of dollars on certifications and training to even be considered for positions in cybersecurity and once they get in, they get burned out from alert fatigue…not to mention the toll on family and friends that comes with sacrificing free time to dedicate to cybersecurity training. 

As threats increase, so will burnout, and it will become more important than ever for companies to prioritize their employees’ well-being. 

Many companies—Huntress included—are offering wellness programs for employees to take advantage of and we sincerely urge you to do so! We are in an era of information overload via the handy-dandy portable computer we keep in our pockets and spend much of our time looking at for various reasons. Studies show how detrimental blue light, excessive screen time and sitting for hours can be. The increase in work-from-home jobs also means less time outside in the sun soaking up that vital vitamin D3. 

Without turning this into a self-help article, suffice it to say we care about the well-being of our cyber community and hope everyone invests just as much in themselves and their mental and emotional health as they do in their careers. If you need a break, take it.

TKO #5: Acronym Acropolis 🔤 

The alphabet soup of acronyms is only getting more confusing.

More acronyms are going to be added to the “alphabet soup” of cybersecurity and the industry is going to continue to push things like zero-trust, AI and ML that aren’t working the way they were intended to. And Huntress will keep breaking these concepts down to help MSPs and SMBs understand.

We previously talked about the most popular acronyms in the blog linked above, but that doesn’t mean the list is all-encompassing. It is, however, a great place to start. 

Whether you are new to the industry or a seasoned pro, it is inevitable that someone will rattle off an acronym you don’t yet know (pretty sure some of ‘em make them up on the spot 😤). 

First, don’t be alarmed. Second, don’t just roll with the punches; ask and make sure that you do understand. We tend to do this to shorten our typing time and have fewer words to say in meetings, but it can compound the situation if all parties are not aware of what SOARing over the SIEM in the SOC means. 

Don’t assume understanding, and don’t pretend to know what you don’t.

Break! Wrapping This Up

While this particular bout is by no means over, we feel we got in a few strong jabs to contend with other predictions being made for 2023 right now. 

Even though we didn’t foretell any haymakers, there’s still time for threat actors to change up the combination and deliver punches we didn’t see coming. 

It’s up to everyone in the community to make sure they don’t end up on the ropes or down for the count by employing strong cyber hygiene, issuing security awareness training, seeking continuing education and tending to one’s health when needed. 

 

Categories
Huntress News
ChatGPT logoChatGPTOpens in new tabClaude logoClaudeOpens in new tabPerplexity logoPerplexityOpens in new tabGoogle Gemini logoGoogle AIOpens in new tab
AI sparkle iconSummarize This Page
ChatGPT logoChatGPTOpens in new tabClaude logoClaudeOpens in new tabPerplexity logoPerplexityOpens in new tabGoogle Gemini logoGoogle AIOpens in new tab

See Huntress in action

Our platform combines a suite of powerful managed detection and response tools for endpoints and Microsoft 365 identities, science-backed security awareness training, and the expertise of our 24/7 Security Operations Center (SOC).

Book a Demo
Share
Facebook iconTwitter X iconLinkedin iconDownload icon
On This Page
We Are Huntress
Phishing is everywhere. But it can be prevented.

We Are Huntress

Phishing is everywhere. But it can be prevented.

Phishing is a cyberattack (usually email-based) that occurs when threat actors disguise themselves as legitimate entities to trick users into revealing personally identifiable or sensitive information.Phishing is one of the most common tactics used by hackers because it's efficient and effective. With new tools and tech like AI at their disposal, hackers can now send out convincing phishing attacks to the masses with little effort required. The good news: we can be one step ahead.
Care is Compromised
Medical services are disrupted, causing treatment delays, misdiagnoses, and even spikes in mortality rates.
Data is Breached
Sensitive patient data can be stolen and used for identity theft, blackmail, or sold online.
Finances Take a Hit
Ransom payments, recovery costs, and lost revenue are just a few of the financial hits. And don’t forget potential HIPAA fines.
Patients Lose Trust
Your reputation can suffer, and when that happens, your patients will go elsewhere for care.
Legal Backlash
Lawsuits from patients affected by a breach aren’t uncommon. You may also face regulatory penalties for non-compliance with data protection laws.
Operational Chaos
Accessing patient records, providing emergency care, and communicating among your staff becomes far more complex.
Huntress is custom built for you. But don't take our word for it – hear directly from businesses like yours.
Try Huntress for Free
On This Page
We Are Huntress
Phishing is everywhere. But it can be prevented.

Huntress Managed EDR in action

See how our expert-led solution can help you stay one step ahead of threat actors—without overwhelming your in-house team or busting your budget.
Start a Free TrialSchedule a Demo
Glitch effect

You Might Also Like

  • The Craftiest Trends, Scams, and Tradecraft of 2025 (So Far)

    John Hammond and Greg Linares with Huntress discuss the top tradecraft we’ve seen this year so far, from ClickFix attacks to deepfake social engineering
  • Experts Weigh in on the State of Email-Based Threats

    Cybersecurity experts John Hammond and Sébastien Goutal provide insider insight on the current state of phishing, ransomware and email-based attacks.
  • Confluence to Cerber: Exploitation of ​​CVE-2023-22518 for Ransomware Deployment

    CVE-2023-22518 is being exploited in Confluence for Cerber ransomware deployment. Read up on Huntress’ observations and mitigation guidance.
  • 3 Hot Takes and Tips for Cybersecurity Awareness Month 2023

    In the spirit of Cybersecurity Awareness Month, use these cybersecurity tips to take your security hygiene and cyber knowledge up a notch.
  • Is There a Right Way to Set Up Two-Factor Authentication?

    In this blog, we aim to answer the question: how easy is it for hackers to circumvent two-factor authentication? We look at their tricks to learn the best way to set up 2FA.
  • Everything We Know About CVE-2023-23397

    Huntress is tracking CVE-2023-23397, a 0-day that impacts Microsoft Outlook and requires no user interaction to expose user credential hashes.
  • The Top 3 Cyber Challenges for Mid-Market Businesses

    Uncover top cyber challenges for mid-sized businesses in 2023; from lack of time and skills, human vulnerabilities, and budget constraints.
  • The Hunt for RedCurl

    Huntress discovered RedCurl activity across several organizations in Canada going back to 2023. Learn more about how this APT operates and how they aim to remain undetected while exfiltrating sensitive data.

Sign Up for Huntress Updates

Get insider access to Huntress tradecraft, killer events, and the freshest blog updates.
Privacy • Terms
By submitting this form, you accept our Terms of Service & Privacy Policy
Huntress Managed Security PlatformManaged EDRManaged EDR for macOSManaged EDR for LinuxManaged ITDRManaged SIEMManaged Security Awareness TrainingManaged ISPMManaged ESPMBook a Demo
PhishingComplianceBusiness Email CompromiseEducationFinanceHealthcareManufacturingState & Local Government
Managed Service ProvidersResellersIT & Security Teams24/7 SOCCase Studies
BlogResource CenterCybersecurity 101Upcoming EventsSupport Documentation
Our CompanyLeadershipNews & PressCareersContact Us
Huntress white logo

Protecting 242k+ customers like you with enterprise-grade protection.

Privacy PolicyCookie PolicyTerms of UseCookie Consent
Linkedin iconTwitter X iconYouTube iconInstagram icon
© 2025 Huntress All Rights Reserved.

Join the Hunt

Get insider access to Huntress tradecraft, killer events, and the freshest blog updates.

By submitting this form, you accept our Terms of Service & Privacy Policy