Connect with us

Hi, what are you looking for?

HEADLINES

Fortinet unveils threat trends to watch out for in 2025 and beyond

As the year 2024 draws to a close, cybersecurity solutions provider Fortinet unveiled predictions that expect hackers will leverage as well as trends that can be expected to emerge in 2025 and beyond.

As cyber adversaries continue to evolve their approach using a range of tactics to improve cyber attacks, businesses and organizations face challenges posed by more ambitious, sophisticated, and destructive techniques such as Artificial Intelligence (AI)-driven attacks, and the adoption of Cybercrime-as-a-Service (CaaS), and other emerging threats and strategies that can be used to execute attacks.

As the year 2024 draws to a close, cybersecurity solutions provider Fortinet unveiled predictions that expect hackers will leverage as well as trends that can be expected to emerge in 2025 and beyond. These include the emergence of more attack expertise, more cloud-specific vulnerabilities being leveraged by attackers, automated hacking tools will be available in the Dark Web, playbooks expand to include real-life threats, and the expansion of anti-adversary frameworks.

The coming years will see a shift from the classic tactics to innovative attacks. Although the traditional methods of cyber attacks will still be used, threat actors will focus more on innovative ones that can carry out targeted attacks quickly and more precisely. It is expected that CaaS groups will increasingly embrace specialization, with many groups focusing on providing offerings that home in on just one segment of the attack chain.

Another emerging trend to watch out for is the seemingly endless number of attack vectors and associated code such as phishing kits, Ransomware-as-a-Service, DDoS-as-a-Service, and more, are now available through the CaaS market. This trend is expected to flourish and anticipate attackers to use the automated output from LLMs to power CaaS offerings and grow the market such as taking social media reconnaissance and automating that intelligence into neatly packaged phishing kits.

Advertisement. Scroll to continue reading.

It is also predicted that advancements in playbooks will make attacks more aggressive and destructive. Cybercriminals will expand their playbooks to combine cyber attacks with physical, real-life threats, exposing to harm organization’s executives and employees in some instances and anticipate that this will become a regular part of many playbooks. Transnational crimes such as drug trafficking, smuggling people or goods, and more, are anticipated to become a component of more sophisticated playbooks.

The cybersecurity community will enhance its capability to detect and respond as attackers continually evolve their tactics. This is done by pursuing global collaborations, creating public-private partnerships, and developing frameworks to counter threats. Many related efforts, like the World Economic Forum Cybercrime Atlas initiative, of which Fortinet is a founding member, are already underway. It is also anticipated that more collaborative initiatives will emerge to curb or disrupt cybercrime.

“As cybercriminals adopt more sophisticated and impactful methods to execute attacks, the role of AI in cybersecurity becomes increasingly vital. AI enhances defenses by automating threat detection and response while streamlining operations for security teams. Fortinet’s AI-driven cybersecurity platform empowers organizations to be protected against both current and emerging threats, enhance their security posture, and build resilience in a constantly evolving threat landscape. Advancing public-private partnerships and adopting robust cybersecurity practices are also essential to countering cybercrime. Together these measures can enable organizations to safeguard critical assets and remain protected against future risks,” said Alan Reyes, country manager at Fortinet Philippines.

Advertisement
Advertisement
Advertisement

Like Us On Facebook

You May Also Like

HEADLINES

Smart and its value brand TNT do not send text messages with clickable links. If you receive one—even if it looks like it’s from...

White Papers

n the Philippines, industry players are taking a more proactive approach to building a security framework for digital resilience.

HEADLINES

This marks the company’s first participation in the region’s premier tech event, where it will showcase its groundbreaking cybersecurity solutions to industry leaders, innovators,...

HEADLINES

A report found that the primary way attackers gained initial access to networks (56% of all cases across MDR and IR) was by exploiting...

White Papers

The Department of Information and Communications Technology (DICT) reports that government agencies, academic institutions, and telecommunications companies remain prime targets for cyber criminals, with...

HEADLINES

The exploit, discovered by Kaspersky’s Global Research and Analysis Team (GReAT), required no user interaction beyond clicking a malicious link and demonstrated exceptional technical...

HEADLINES

At the end of 2023, Sophos X-Ops noted a significant increase in ‘remote encryption’ attacks – where ransomware attackers breach a compromised and often...

HEADLINES

With the launch of KATA 7.0, organizations can now benefit from enhanced Network Detection and Response (NDR) capabilities with deeper network visibility, internal threats...

Advertisement