Operational tech under attack, deepfake phishing and learning to use passkeys -- cybersecurity predictions for 2025


With a constant power struggle between attackers and defenders cybersecurity is a fast-moving area. That makes it notoriously hard to predict what might happen, but that doesn't stop us trying. Here are what some industry experts think the cybersecurity world has in store for 2025.
Sasha Gohman, VP, research at Cymulate, thinks ransomware will become obsolete. "Ransomware may become obsolete due to the fact that decrypting your important files may become a feasible task with quantum computing. On the other hand, ransomware operators may then choose to encrypt your important files with quantum-resilient encryption."
Europe's move toward cybersecurity sovereignty [Q&A]


Governments around the world are increasingly legislating for cybersecurity and privacy. But regions often have differing views on how this should be achieved.
We spoke to Christian Have, CTO of Logpoint, to get insight into how US surveillance laws could serve as a catalyst for Europe to take greater control over its data, pushing forward the concept of digital sovereignty.
New investment, state legislation and more penalties -- privacy predictions for 2025

Decentralized solutions, knowing your developer and AI apprentices -- development predictions for 2025


In the past year economic and business pressures, the rise of AI technologies talent shortages and more have put a strain on code pipelines and increased demands on developer teams. This in turn leads to fears around developer strain, product launch timescales and cybersecurity risks.
So what might 2025 have in store for developers? Here's what some industry experts think.
Threat actors spoof email security providers


A new report from phishing defense company Cofense highlights increasingly sophisticated phishing attacks that are exploiting trusted email security companies such as Proofpoint, Mimecast and Virtru to trick users into disclosing sensitive credentials.
The attacks make use of fake email attachments, phishing links and credential-harvesting tactics to compromise sensitive data. By mimicking well-known brands, threat actors boost the likelihood that the recipients will trust the emails and engage with harmful content, leading to them exposing critical information.
Credential phishing attacks up over 700 percent


Phishing remains one of the most significant cyber threats impacting organizations worldwide and a new report shows credential theft attacks surged dramatically in the second half of 2024, rising by 703 percent.
The report from SlashNext shows that overall, email-based threats rose by 202 percent over the same period, with individual users receiving at least one advanced phishing link per week capable of bypassing traditional network security controls.
More task focus, the rise of AI whisperers and improved observability -- AI predictions for 2025

Data breach trends -- progress, challenges, and what's next [Q&A]


Despite organizations putting in place better security controls the pace of data breaches shows no signs of slowing down.
We spoke to Jon Fielding, managing director, EMEA at Apricorn, to discuss the latest data breach trends, the progress that's been made and where more work is needed to address security threats.
More complexity, more non-human IDs and shifting strategies -- identity predictions for 2025


Identity is at the root of most cyberattacks, but although we're seeing greater adoption of things like biometrics we still rely heavily on passwords.
There's added complication in the form of soaring numbers of machine identities too. Here's what some industry leaders think the identity landscape has in store for 2025.
Enterprises struggle to deliver AI agents but new tool could help


Businesses are often under pressure to deliver AI agents, but development teams are struggling with siloed tools, fragmented governance and limited functionality that makes promising prototypes unfeasible in production.
According to a survey of over 1,000 enterprise technology leaders released today by Tray.ai, 42 percent of respondents need access to eight or more data sources to deploy AI agents successfully -- which is impossible when SaaS app agents are restricted in scope by the integrations to which their host applications have access.
Newly launched APIs found by attackers in under 30 seconds


Organizations rely on APIs to make their systems easily accessible across platforms. However, new APIs are typically less protected and less secure. New research from Wallarm shows the average time for a new API to be found by attackers is just 29 seconds.
The research used a honeypot to look at API activity and in its first 20 days in November the lngest time taken for a new API to be discovered was 34 seconds.
Easier payments, robot assistants and improved accessibility -- fintech predictions for 2025

Access tokens and service accounts next target for cyberattacks


New research shows 88 percent of security leaders believe machine identities, specifically access tokens and their connected service accounts, are the next big target for attackers.
The survey from Venafi of 800 security and IT decision-makers from large organizations across the US, UK, France and Germany, finds 56 percent have experienced a security incident related to machine identities using service accounts in the last year.
Social media deepfake scams push fraudulent investment schemes


Social media has seen a 335 percent boom in new scams using deepfake videos and company-branded posts to lure victims into fraudulent investment schemes.
The latest threat report from ESET tracks these as HTML/Nomani, the countries with the most detections being Japan, Slovakia, Canada, Spain, and Czechia.
Building trust in telemetry data [Q&A]


With the increasing importance of observability in digital operations, businesses need to ensure the reliability and relevance of their telemetry data in order to maintain system and application performance, debug, troubleshoot, respond to incidents and keep their systems secure.
We spoke to Tucker Callaway, CEO of Mezmo, to discuss the strategic considerations and concerns enterprises face in managing and optimizing their telemetry data.
Ian's Bio
Ian spent almost 20 years working with computers before he discovered that writing about them was easier than fixing them. Since then he's written for a number of computer magazines and is a former editor of PC Utilities. Follow him on Mastodon
© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.