Menu
2025 Predictions
Current Cybersecurity Trends
The Threats of Today and Their Impact on Tomorrow
With ever-expanding AI capabilities, changes in the deep and dark web landscape, and growing geopolitical unrest, it can feel daunting deciding where to focus your cybersecurity efforts. Equip your team with the latest information from the experts at ZeroFox Intelligence. You'll learn how top cyber threats are expected to evolve, so you can plan for 2025 with confidence.

The deep and dark web (DDW) continues to be critical real estate, with compromised information and a plethora of othertools and servicesfor sale. However, law enforcement (LE) operations created waves in 2024 that will continue to change the environment.

Key Takeaways
Deep & Dark Web

Deep & Dark Web

Ransomware & Digital Extortion

Ransomware & Digital Extortion

Ransomwareand digital extortion still aren't going anywhere. Newas-a-service operationsmake these campaigns easier and faster for even less experienced threat actors to accomplish.

Key Takeaways
  • ZeroFox identified a 15% increase in ransomware and digital extortion monthly incidents in 2024 compared to 2023—which itself was a record-breaking year.
  • Ransomware targeting of North America-based organizations is likely to remain disproportionately high in 2025, having hit an all-time high of approximately 62% of global digital extortion activity at the time of reporting in Q4 2024.

Social engineeringwill remain one of the most common attack vectors across industries and regions in 2025, taking advantage of one of the most prominent security weaknesses at any organization: people.

Key Takeaways
Social Engineering

Social Engineering

Generative AI

Generative AI

Thegreatest impact from GenAIwill stem from threat actors leveraging tools to augment and optimize already-existing tactics, techniques, and procedures (TTPs). With a low barrier to entry, tools such as open-source LLMs and deepfake content can be used to perform nefarious activities.

Key Takeaways

The market for illicit network access surged in 2024, with record levels ofIAB salesidentified across DDW marketplaces. There’s a growing demand for unauthorized access to corporate networks, signaling that this threat will remain high for the foreseeable future.

Key Takeaways
  • The average purchase price of IAB sales in 2024 was under $5,000, which represents a substantial return on investment for a variety of threat actors.
  • North American organizations will likely continue to be the primary target for IABs, with the region accounting for approximately 45% of all access sales in 2024.
Initial Access Brokers

Initial Access Brokers

Geopolitical & Cyber Convergence

Geopolitical & Cyber Convergence

Many aspects of the geopolitical environment are significantly more dynamic and unpredictable than they have been in recent years. In 2025, threat actors will continue to operate with political partisanship, with cybercriminal collectives aligning themselves on either side of the geopolitical dispute.

Key Takeaways
  • In 2024, we sawcyber threats to major USandUK elections, as well as theParis Olympics, exemplifying the geopolitical and cyber convergence.
  • Growing tensions between nation-states as well as direct military conflicts could escalate the number of cyberattacks and sabotage aimed at influencing public opinion.

Top Actions to Take Now

01
Know yourself
Document and monitor your external attack surface with strong Digital Risk Protection and External Attack Surface Management programs. Additionally, identify and work with stakeholders to codify intelligence requirements to prioritize and focus your efforts.
02
Know your adversaries
Invest in intelligence to assess the adversaries most likely to have both the desire and capability to do you harm, including their TTPs, motives, and previous actions.
03
Know the shared terrain
Capitalize on intelligence to proactively understand the planning, facilitation, and execution of attacks within the DDW and open web. Implement security strategies that eliminate emergent and multi-channel threats when possible and compensate for threats that can only be managed.

External attacks are the

Leading cause of breaches.

Only unified external cybersecurity can protect
you beyond the perimeter.

Talk to us now.