Connect with us

Hi, what are you looking for?

HEADLINES

Fortinet unveils threat trends to watch out for in 2025 and beyond

As the year 2024 draws to a close, cybersecurity solutions provider Fortinet unveiled predictions that expect hackers will leverage as well as trends that can be expected to emerge in 2025 and beyond.

As cyber adversaries continue to evolve their approach using a range of tactics to improve cyber attacks, businesses and organizations face challenges posed by more ambitious, sophisticated, and destructive techniques such as Artificial Intelligence (AI)-driven attacks, and the adoption of Cybercrime-as-a-Service (CaaS), and other emerging threats and strategies that can be used to execute attacks.

As the year 2024 draws to a close, cybersecurity solutions provider Fortinet unveiled predictions that expect hackers will leverage as well as trends that can be expected to emerge in 2025 and beyond. These include the emergence of more attack expertise, more cloud-specific vulnerabilities being leveraged by attackers, automated hacking tools will be available in the Dark Web, playbooks expand to include real-life threats, and the expansion of anti-adversary frameworks.

The coming years will see a shift from the classic tactics to innovative attacks. Although the traditional methods of cyber attacks will still be used, threat actors will focus more on innovative ones that can carry out targeted attacks quickly and more precisely. It is expected that CaaS groups will increasingly embrace specialization, with many groups focusing on providing offerings that home in on just one segment of the attack chain.

Another emerging trend to watch out for is the seemingly endless number of attack vectors and associated code such as phishing kits, Ransomware-as-a-Service, DDoS-as-a-Service, and more, are now available through the CaaS market. This trend is expected to flourish and anticipate attackers to use the automated output from LLMs to power CaaS offerings and grow the market such as taking social media reconnaissance and automating that intelligence into neatly packaged phishing kits.

Advertisement. Scroll to continue reading.

It is also predicted that advancements in playbooks will make attacks more aggressive and destructive. Cybercriminals will expand their playbooks to combine cyber attacks with physical, real-life threats, exposing to harm organization’s executives and employees in some instances and anticipate that this will become a regular part of many playbooks. Transnational crimes such as drug trafficking, smuggling people or goods, and more, are anticipated to become a component of more sophisticated playbooks.

The cybersecurity community will enhance its capability to detect and respond as attackers continually evolve their tactics. This is done by pursuing global collaborations, creating public-private partnerships, and developing frameworks to counter threats. Many related efforts, like the World Economic Forum Cybercrime Atlas initiative, of which Fortinet is a founding member, are already underway. It is also anticipated that more collaborative initiatives will emerge to curb or disrupt cybercrime.

“As cybercriminals adopt more sophisticated and impactful methods to execute attacks, the role of AI in cybersecurity becomes increasingly vital. AI enhances defenses by automating threat detection and response while streamlining operations for security teams. Fortinet’s AI-driven cybersecurity platform empowers organizations to be protected against both current and emerging threats, enhance their security posture, and build resilience in a constantly evolving threat landscape. Advancing public-private partnerships and adopting robust cybersecurity practices are also essential to countering cybercrime. Together these measures can enable organizations to safeguard critical assets and remain protected against future risks,” said Alan Reyes, country manager at Fortinet Philippines.

Advertisement
Advertisement
Advertisement

Like Us On Facebook

You May Also Like

HEADLINES

A bruteforce attack is a method employed by cybercriminals to guess login info, encryption keys, or find a hidden web page by systematically attempting...

HEADLINES

The rise of online shopping, digital payments and holiday planning has transformed consumer behavior in the Philippines but has also introduced new risks.

HEADLINES

Smart also sounds the alarm on criminals using ‘fake cell towers’ to bypass network defenses. The Philippine National Police had earlier called on the...

HEADLINES

According to a report, downtime and lost productivity are the most concerning business problems caused by ineffective IT security, an opinion expressed by 38%...

HEADLINES

Companies plan to increase their IT security budgets by up to 9%. The median cybersecurity budgets for large enterprises were US $5.7M with US...

HEADLINES

Globe has been a consistent advocate for a safer and more responsible digital space

HEADLINES

The attackers used a series of campaigns with novel exploits and customized malware to embed tools to conduct surveillance, sabotage and cyberespionage as well...

HEADLINES

Financial phishing attacks are rapidly increasing in the country as cybercriminals continuously evolve and adapt their tactics, making them sophisticated. The number of attacks...

Advertisement