2025 Cybersecurity and AI predictions
December 2024 by cyber security experts
As 2024 comes to an end, the cyber threat landscape has become increasingly sophisticated, defined by AI-powered attacks, the evolving tactics of ransomware, vulnerabilities within supply chains, and the growing use of deepfake technology for fraud. Critical infrastructure faces heightened threats, while geopolitical hacking campaigns are more prevalent than ever.
This article delves into the anticipated rise in the complexity of cyberattacks in 2025 and outlines the steps organisations need to take to navigate the ever-shifting threat landscape securely.
The escalating complexity of cyberattacks
Sam Kirkman, Director of Services, EMEA, NetSPI says: “The rise of highly strategic cyber-attacks is reshaping the threat landscape, with these sophisticated breaches becoming both more frequent and more visible. These are no longer opportunistic or random; they are calculated, precise, and often carried out by well-resourced state actors. A notable example from earlier this year was the stealth attack on XZ Utils, a critical component of global computing infrastructure, which went almost entirely undetected. It was only discovered by a single Microsoft engineer who noticed an unusual slowdown on their device, ultimately tracing the issue to a suspected operation by Russia’s foreign intelligence agency. This incident highlights the alarming potential for unseen vulnerabilities. Looking ahead, we can expect cyber-attacks to become even more methodical and goal-oriented, with attackers using advanced tools to target critical infrastructure, financial institutions, and key supply chains.”
Sohail Iqbal, VP and CISO, Veracode adds: “In 2025, open-source-based vulnerabilities will be increasingly targeted and exploited. This is particularly concerning, as it highlights a key vulnerability in modern software ecosystems. Open-source components are widely used due to their accessibility and cost-effectiveness, but this also makes them prime targets for attackers. The increasing reliance on open-source code across industries means that attackers can cast a broader net, targeting widely adopted but potentially insecure components. Meanwhile, companies struggle to keep up with the necessary pace of patching and remediation. In turn, this creates a growing security gap where vulnerabilities persist longer than they should, adding to security debt and putting organisations at risk.”
Derek Manky, Chief Security Strategist and Global VP Threat Intelligence, Fortinet agrees: “In recent years, cybercriminals have been spending more time “left of boom” on the reconnaissance and weaponisation phases of the cyber kill chain. As a result, threat actors can carry out targeted attacks quickly and more precisely. In the past, we’ve observed many CaaS providers serving as jacks of all trades – offering buyers everything needed to execute an attack, from phishing kits to payloads. However, we expect that CaaS groups will increasingly embrace specialisation, with many groups focusing on providing offerings that home in on just one segment of the attack chain.”
Entering the New Year: Regulations focus on bolstering organisational cybersecurity
Adam Preis, Director of Product Solution Marketing, Ping Identity explains: “NIS2 compliance has been on the CISO agenda for a while, but in 2025, its influence will be impossible to ignore. The Directive’s scope will affect more than just financial services in the EU, demanding compliance from sectors like research, public administration, waste management, postal services, and IT services, via investment that genuinely strengthens and future-proofs cybersecurity resilience at both organisational and critical infrastructure levels. Failure to comply won’t just be a regulatory setback, it could result in hefty fines, reputational damage and leave organisations vulnerable in an increasingly threat-laden landscape. As implementation deadline approaches in January 2025, I predict CISOs will need to reevaluate their security policies across risk analysis, incident management, business continuity planning, and crisis recovery management.”
Stuart Fuller, CCO, Com Laude adds: “In 2025, securing your brand’s online presence is more critical than ever. With the digital landscape continuing to evolve and threats like phishing and AI-driven fraud seeing a rise of as much as 25% during peak times like Black Friday, businesses must prioritise the integrity of their online identity. A verified, trustworthy online presence not only builds consumer confidence but also protects your reputation, keeping your brand and your customers one step ahead of the cyber criminals. The domain landscape is evolving, with new TLD options like .brand, industry-specific extensions like .tech and .fashion, and geographic domains like .london and .nyc. By securing key domains, including defensive registrations across relevant extensions, you prevent bad actors from exploiting your brand through cybersquatting.”
Bri Frost, Director of Curriculum, Cybersecurity and IT Ops Pluralsight highlights: “As the threat landscape becomes more sophisticated, and bad actors further hone their craft, organisations must have skilled threat intelligence teams to defend themselves. Traditionally, the security story has played out with defences being improved and attackers thwarting them, and then this pattern repeats itself. Organisations need to completely shift this scenario by focusing more on red teams testing their own environments against the most sophisticated threats to identify and assess vulnerabilities. Pen testing is one of the most effective ways to thwart threats and prevent attacks proactively. Simply deploying an out-of-the-box vendor product to keep an enterprise secure is not enough.”
Time-tested security: The role of multi-factor authentication in enhancing defences
Dan Schiappa, CPO, Arctic Wolf states: “In 2025, leaders must continue to master the basics of security hygiene to combat evolving cybersecurity threats. The reality is that attack types like ransomware and social engineering will continue to dominate the threat landscape because, unfortunately, bad actors have seen success with them in the past. To mitigate their success in 2025, organisations should adhere to tried-and-true measures like multi-factor authentication and identity access management tools while encouraging open communication about potential threats, regularly updating security protocols, and conducting simulated attacks.”
Len Noe, Technical Evangelist and White Hat Hacker, CyberArk supports this, saying: “As deep fakes become more widespread, we will see startups crop up in 2025 that offer identity validation-as-a-service. These services will take multi-factor authentication further by adding additional layers. They will use a combination of government-issued documents like passports, biometric data like signatures, fingerprints and face scans, and behavioural pattern analysis that looks at how a user interacts with a device or website, to verify that individuals are who they say they are for all kinds of transactions and interactions online.”
Laurent Quérel, Distinguished Engineer, F5 Field CISO, F5 explains: “As AI agents reshape the internet, we will see the development of agent-specific browsing infrastructure, designed to facilitate secure and efficient interactions with websites. This shift could disrupt industries like e-commerce by automating complex web tasks, leading to more personalised and interactive online experiences. However, as these agents become more integrated into daily life, new security protocols and regulations will be essential to manage concerns related to AI authentication, data privacy, and potential misuse. By 2028, it is expected that a significant portion of enterprise software will incorporate AI agents, transforming work processes and enabling real-time decision-making through faster token generation in iterative workflows. This evolution will also lead to the creation of new tools and platforms for agent-driven web development, marking a significant milestone in the digital landscape.”
Throughout 2024, the threat landscape has been influenced by a rise in AI-powered attacks, advancements in ransomware techniques, increasing supply chain vulnerabilities, and the surge of deepfake technology. Critical infrastructure has been a primary target for cybercriminals, while geopolitical tensions have driven a notable increase in state-backed hacking activities.
As we move into the New Year, attacks are set to become even more complex and relentless, making defence more challenging. This emphasises the need for robust and flexible defence measures to safeguard against the continuously evolving threat landscape.