2025: what have been the biggest cyber security challenges so far (part 1)?
27th May 2025
In a year that has seen the continued improvement and implementation of AI, what are the biggest threats that you should be aware of moving forward?
Unbelievably, we are almost halfway through the year already! At this point, we wanted to look at the cyber security issues that have been plaguing users so far in 2025, so that we can all be better prepared going into the rest of the year.
In no particular order, here are the first five – check out our second blog for the next five!
1. AI-powered attacks: as AI becomes more sophisticated, it gives cyber criminals the ability to make their malware more versatile, able to adapt to defensive measures faster. However, it also allows security defences to be upgrading using the same technology, helping to even the odds.
2. Ransomware evolving: attacks have become more targeted, with hackers demanding higher ransoms and using double extortion tactics. The cost of these attacks goes beyond financial: reputations can be damaged if customer data is lost.
3. Supply chain vulnerabilities: weak links in supply chains have been exploited to help criminals attack bigger organisations. This emphasises that cyber security only works if every element of a network is just as secure.
4. IoT security: Internet of Things (IoT) devices like smart heating systems or smart televisions have allowed cyber criminals a different way to infiltrate, as they often don’t have the same security measures in place. Again, this conveys that the whole network needs to be covered, even the devices you might not immediately remember!
5. Cloud security: more organisations are moving to using cloud, meaning that attacks are increasing. Cloud servers need the same level of security as traditional onsite ones, as they still hold the same important information.
There are our first five cyber security challenges we’ve seen on the rise in 2025 so far: do you agree with our findings? If there is something you think we’ve missed, check in for part two, it may be on that list!
If you’d like any guidance regarding your cyber security, please contact Interfuture Security.