1. AI-powered phishing and social engineering
AI is changing the cybercrime game. Attackers are now using AI to write personalised phishing emails and messages that mimic trusted contacts or executives. These hyper-targeted scams are difficult to detect and can trick even vigilant employees into sharing credentials or transferring funds.
The rise of groups like Scattered Spider, a collective of English-speaking hackers using social engineering and SIM swapping, has shown how effective these tactics can be. Recent attacks on major retailers, including Marks & Spencer and Adidas, have highlighted the devastating financial and reputational impact of such breaches.
Mitigation tips:
- Implement multi-factor authentication (MFA) across all systems.
- Regularly train staff to recognise phishing attempts and verify unusual requests.
- Deploy AI-based email filtering and behavioural analytics tools.
2. Supply chain attacks
As businesses increasingly rely on third-party vendors and cloud services, supply chain attacks have surged. Cybercriminals target less-secure partners to infiltrate larger organisations. The World Economic Forum reports that 45% of organisations expect to face significant cyber-attacks on their supply chains by this year; and this report was written months before the recent wave of high profile attacks.
3. Ransomware-as-a-Service (RaaS) and data extortion
Ransomware attacks have evolved into a service model, enabling even low-skilled hackers to launch devastating attacks. Groups like LockBit offer RaaS platforms, allowing affiliates to deploy ransomware and share in the profits.
These attacks often involve not just data encryption but also threats to leak sensitive information, increasing pressure on victims to pay ransoms.
Mitigation tips:
- Maintain regular, secure backups of critical data.
- Implement endpoint protection and intrusion detection systems.
- Develop and regularly update an incident response plan.
4. Deepfake technology
Deepfake audio and video are emerging as powerful tools for cybercriminals. These convincing forgeries can be used to impersonate executives, authorise fraudulent transactions or spread disinformation. According to Pinar Alpay, "three years ago, deepfake attacks were only 0.1% of all fraud attempts we detected, but today, they represent around 6.5%, or 1 in 15 cases. This represents an increase of 2137% in the last three years.”
As deepfake technology becomes more accessible, businesses must be vigilant against this sophisticated form of social engineering.
5. Insider threats and human error
Despite technological advancements, human error remains a leading cause of data breaches. Insider threats, whether malicious or accidental, pose significant risks. A large proportion of data breaches are due to human error. According to this article by InfoSecurity magazine, human error contributed to 95% of data breaches in 2024.
The M&S incident, where attackers deceived IT staff into resetting passwords, highlights the vulnerability of human factors in cybersecurity.
Mitigation tips:
- Implement strict access controls and the principle of least privilege.
- Conduct regular security awareness training for all employees.
- Monitor user activity for unusual behaviour.
6. Regulatory compliance: navigating new requirements
The UK's proposed Cyber Security and Resilience Bill aims to strengthen national cyber defences by expanding regulatory requirements for businesses. The legislation will introduce mandatory compliance with established cybersecurity standards and practices to ensure essential cyber safety measures are being implemented.
Organisations will need to demonstrate adherence to these standards through regular audits and reporting.
7. Cloud security challenges
The widespread adoption of cloud services introduces new cybersecurity challenges. Misconfigurations, weak credentials and lack of visibility can expose sensitive data to threats.
According to CrowdStrike’s 2024 Global Threat Report, a 75% increase in cloud intrusions was observed during 2023, mostly rooted in weak credentials and misconfigurations.
Mitigation tips:
- Implement strong authentication and encryption for cloud services.
- Regularly audit cloud configurations and access permissions.
- Use cloud security posture management tools to detect and remediate vulnerabilities.
Cyber threats in 2025 are more sophisticated and pervasive than ever. By understanding these risks and implementing proactive measures, businesses can enhance their resilience and protect their assets. Investing in cybersecurity is not just a defensive strategy, it’s a commitment to the trust and confidence of customers and partners. One of the easiest and most proactive ways to achieve this is through training. To find out more about getting trained in cybersecurity, check out our range of courses.
Related Articles
Cyber SecurityReflecting on the top 5 global cyber-attacks of 2025 – the growing need for skilled cyber professionals
We take the time to reflect on some of the most news-worthy cyber-attacks, how they happened, and what it says about the global cyber skills gap.
Read More
Cyber SecurityLearning People's Security+ Training is Now Recognised by the UK Cyber Security Council
As a trusted and globally-recognised provider of Cyber Security training, we are delighted to announce that our Security+ course syllabus is now fully mapped to the Associate level of the UKCSC’s Standard of Professional Competency & Commitment.
Read More
Cyber Security49% of UK businesses have a cyber security skills gap, according to Gov report
The UK is in dire need of certified cyber security professionals to protect businesses according to the UK Government
Read More
AIHow AI is shaping the future of cyber security
Learn the importance of data visualisations when telling compelling data stories, along with the common pitfalls faced by Business Analysts and Data Analysts.
Read More

