Cyber Threats in 2025: What Businesses Need to Know
Key contacts
The recently published CrowdStrike 2026 Global Threat Report reveals a stark reality: cyber adversaries are becoming faster, stealthier, and increasingly sophisticated. Understanding these threats is essential to maintaining robust defences.
Here are the main insights businesses should keep in mind.
1. The Rise of the Evasive Adversary
CrowdStrike notes a clear shift in attacker behaviour. Rather than targeting heavily monitored systems, adversaries increasingly focus on endpoints, identity systems, SaaS environments, and cloud infrastructure:
- The average eCrime breakout time (period between initial access and lateral movement onto another system) reduced to 29 minutes, a 65% increase in speed from 2024.
- The fastest observed breakout was 27 seconds.
- Malware was absent in 82% of detections, with attackers exploiting authorised pathways and trusted systems to disguise their intrusions as legitimate activity.
2. Artificial Intelligence (AI) Powered Attacks Are Accelerating
- Attacks by AI-enabled adversaries increased by 89%.
- 90+ organisations experienced breaches where adversaries weaponised legitimate generative AI platforms through malicious prompt injection to steal credentials and cryptocurrency.
3. Supply Chain and Zero-Day Vulnerabilities
- 2025 saw a surge in supply chain intrusions, with adversaries compromising upstream providers to access downstream targets.
- One such incident resulted in $1.46 billion USD worth of cryptocurrency theft, which is the largest single financial theft ever reported.
- Zero-day exploits increased by 42% year-over-year, demonstrating attackers’ growing ability to weaponise unknown vulnerabilities.
4. Adversary Groups and Deception Tactics
- CrowdStrike named 24 new adversary groups in 2025, bringing the total to over 281.
- Cloud-conscious intrusions, focusing on cloud infrastructure, rose by 37%.
- Social engineering techniques evolved, with a 563% increase in fake CAPTCHA lures and a 141% increase in spam emails.
The full report is available via the “Download report” link in the original source.
Key Considerations
This report underscores the urgent and growing importance of cybersecurity for all organisations, particularly of the threat to valued supply chains or cloud-based systems.
Businesses should consider the following key actions:
- Reviewing the security of AI systems and development pipelines, which now form a key part of the modern attack surface.
- Enhancing visibility across network perimeters, especially edge devices such as VPN appliances, firewalls, and gateways.
- Regularly testing and refining incident response plans, given the vastly accelerated pace of modern attacks.