A Hacker’s View of the 2024 Cyberthreat Landscape

thumbnail A Hacker’s View of the 2024 Cyberthreat Landscape

Former LulzSec hacker discusses the latest developments and heightened risks in cybersecurity heading into 2024. Learn what you should watch out for.

Written By: Jacob Edson
Mar 4, 2024
Channel Insider content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

In a special, two-part bonus episode of Channel Insider: Partner POV, host Katie Bavoso sat down with Cody Kretzinger, Principal Security Advisor at Galactic Advisors and former LulzSec hacker, to discuss the latest developments — and heightened risks — in cybersecurity heading into 2024.

Kretzinger’s experience on both sides of the cybersecurity battlefield allowed him to provide a unique perspective on the current threat landscape and how managed service providers (MSPs) and managed security service providers (MSSPs) can stay ahead of the game in 2024.

How cybersecurity is like the “golden age of piracy”

In Part 1 of the interview, Kretzinger shared insights into the escalating threat of ransomware attacks — particularly those targeting healthcare facilities.

He emphasized the urgency for organizations to fortify their defenses as threat actors increasingly disregard previous “gentlemen’s agreements” that protected healthcare facilities, critical infrastructure, and other public services — leading to disruptive consequences for patient care and organizational operations.

Listen to the Part 1 of the podcast:

Watch the Part 1 video:

Teen hackers are throwing out all the rules

The emergence of younger cybercriminals, exemplified by groups like Scattered Spider, presents a new challenge for cybersecurity professionals. Kretzinger described the recruitment process targeting teenagers through online gaming platforms and the blend of digital and physical tactics employed by these youth-driven entities.

“There are specific cases where they’ve actually assaulted individuals in order to get passwords or other sensitive information that they then can leverage in a cybercrime attack,” Kretzinger said. “There’s not too many threat actors outside of nation-states that are willing to go quite that far.”

So, how can organizations protect themselves?

Proactive vulnerability management and continuous monitoring, to start. Kretzinger underscored the importance of keeping systems up-to-date and patching vulnerabilities promptly, citing recent disclosures of critical SSL vulnerabilities in networking appliances.

Zero trust remains one of the best cyberattacker deterrents

The adoption of zero trust principles is another key strategy for organizations to bolster their security posture. By distributing security controls across every asset within an organization, Zero Trust mitigates the impact of potential breaches and fortifies overall resilience against cyber threats.

Security researchers and malicious hackers alike are “constantly hammering away at [firewall] systems because it allows them that first step into a network,” Kretzinger explained. “That really highlights the need for the adoption of the kind of the zero trust network that everybody has been talking about.”

Why?

“Because the reliance on that [firewall] appliance to do all of the work to totally protect the organization is now distributed amongst every asset within an organization — every endpoint, every network device, every IoT device, as long as they’re all following zero trust — it makes it incredibly more difficult for the bad guys to compromise the entire organization.”

Risks of ransomware in healthcare, and the emergence of AI

In the second part of this Partner POV bonus episode, Kretzinger highlighted the challenging timeline for detecting ransomware attacks, emphasizing the importance of robust cybersecurity hygiene. He explained how threat actors exploit vulnerabilities and move laterally within networks, often remaining undetected for extended periods before deploying ransomware.

Listen to Part 2 of the podcast:

Watch the Part 2 video:

The dangers of ‘just OK’ security

Reflecting on recent ransomware attacks in the healthcare sector, which cost the industry billions of dollars, Kretzinger underscores the critical need for comprehensive security measures.

“What most organizations have,” Kretzinger warned, “is ‘OK’ cybersecurity hygiene. And when you have OK cybersecurity hygiene, you have OK security tools, which means you have OK policies and procedures, which means everything’s just OK. So when you have ‘just OK’ everything, it can take some time in order to not only detect [an attack], but also see what’s going on and maybe who it was from.”

Kretzinger recommends a proactive approach, combining tools like endpoint detection and response (EDR), extended detection and response (XDR), and managed detection and response (MDR) with thorough monitoring and response capabilities, in order to stay on top of any suspicious activity at any level of your networks.

Managing data — and clients — in the AI era

Addressing concerns surrounding emerging AI technologies like Microsoft Copilot, Kretzinger stressed the significance of data classification and sensitivity labels to safeguard sensitive information. He cautioned against complacency and advocated for proactive risk mitigation strategies.

When it comes to addressing these issues for clients, Kretzinger identified “two components” of being a trusted advisor as an MSP: “The first one is being able to identify risk and the second component is to be able to communicate risk.” Kretzinger gave a common example: employees reusing their passwords.

“That is a shared risk,” he said, “a common risk. But you need to be able to talk about it in such a way that it’s a risk to the business — not a risk to the end user, not a risk to the data, but a risk to the organization. When we’re communicating the risk back to business owners, we have to do it in such a way that they understand what we’re talking about.”

Finally, Kretzinger outlined a few practical steps for solution providers to expand their client base and enhance their cybersecurity posture. First, he recommends leveraging cybersecurity incidents as learning opportunities; second, preparing clients for inevitable breaches; and third, emphasizing the value of administrative controls such as acceptable use policies and incident response policies to better enforce employee compliance.

Get informed and get involved

In closing, Kretzinger invited viewers and listeners to connect with Galactic Advisors, where he serves as an executive director, and encouraged involvement with the Illinois Cyber Foundation.

In addition to inviting viewers and listeners to connect with Galactic Advisors for more tailored guidance on their organization’s security hygiene, Kretzinger highlighted the work of the Illinois Cyber Foundation, where he serves as executive director. The Illinois Cyber Foundation is a nonprofit organization dedicated to educating youth, the elderly, and other vulnerable individuals on the scams they may encounter online, and empowering them with the skills, resources, and mentorship they need to thrive in today’s cyberthreat landscape.

To engage with Cody Kretzinger and explore more insights on cybersecurity, connect with him on LinkedIn. Don’t miss upcoming episodes of Channel Insider: Partner POV on YouTube or your podcasting platform of choice for more industry insights and expert interviews. Like, follow, and subscribe to stay informed!

thumbnail Jacob Edson

Jacob Edson is Managing Editor of Channel Insider. He has over 6 years of experience connecting audiences to the best B2B tech brands through informative, engaging content that provides direct, actionable advice and helps IT decision makers, small business owners, and end users make the best purchasing decisions for their business needs.

Recommended for you...

Video: Q2 2025 Channel Insights and Trends with the Channel Insider Editorial Team

A fast-paced editorial recap of Q2 2025 in the IT channel covering leadership shakeups at Kaseya, layoffs at Intel, federal obstacles pausing major acquisitions, AI adoption slowdowns, quantum security threats, evolving partner programs, and global economic tensions.

Katie Bavoso
Jul 17, 2025
XTIUM CEO and EMEA Leader on Global Business Opportunities

Global MSP XTIUM formally expands into EMEA with HQ in the Netherlands, unifying services for regional growth and global IT support.

Video: Inside MSP Owners Group: Juan Fernandez’s Vision for MSP 5.0, Rollups, and Employee Ownership

Juan Fernandez shares why he started the newly formed MSP Owners Group and what makes his rollup MSP different from others.

Katie Bavoso
Jul 2, 2025
Video: How Servix Solved Brado’s Remote Logistics IT Challenges with Scale Computing Edge Clusters

Discover how Servix and Brado tackled remote IT infrastructure challenges using Scale Computing edge solutions.

Katie Bavoso
Jul 1, 2025
Channel Insider Logo

Channel Insider combines news and technology recommendations to keep channel partners, value-added resellers, IT solution providers, MSPs, and SaaS providers informed on the changing IT landscape. These resources provide product comparisons, in-depth analysis of vendors, and interviews with subject matter experts to provide vendors with critical information for their operations.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.