Which cyber security trends will dominate 2025?

03/01/25 Wavenet
Cyber Security pad lock concept.

The world of cyber security is in constant flux, as hackers and cyber security professionals battle it out to stay one step ahead of one another. As technology continues to advance, so do the tactics of cyber criminals, who are exploiting vulnerabilities at an alarming rate. Organisations need to brace for a new wave of threats driven by advanced technologies and increasingly sophisticated attack vectors.

As cyber threats elevate, so do the financial complications for organisations. The 2024 IBM Cost of a Data Breach Report reveals that the global average cost of a breach has soared to a record £3.5 million, with sectors such as healthcare facing even steeper costs. It now takes more than 290 days to identify and contain a breach, leaving organisations exposed for extended periods. With such alarming statistics, the need for cyber security to evolve has never been clearer.

With this in mind, let’s take a look at the key trends our cyber security experts predict will dominate the cyber security landscape in 2025 and beyond, and how your organisation can prepare for these emerging threats.

1. Artificial Intelligence (AI) Driven Cyber Attacks to Grow, But Not Explode

Artificial Intelligence (AI) has been the buzzword of 2024. We’ve attended numerous events, exhibitions, and conferences throughout the year, and it’s consistently a key discussion point. But how is it impacting cyber security?

As AI and machine learning (ML) become more widespread, cyber criminals are leveraging them to automate cyber attacks, craft advanced phishing emails, and exploit vulnerabilities. This growth shows no sign of slowing.

That said, the game-changing explosion in AI powered cyber attacks feared by many experts seems unlikely to arrive in 2025. Cyber attacks are still ultimately human operated, with AI generally, at least in the near future, helping hackers but not leading attacks in a major way.

While AI in cyber security is nothing new – many Managed Detection and Response (MDR) solutions already use it to handle large volumes of data – we are continuing to see real growth in AI-led tools speeding up cyber security processes and helping to spot patterns in incident detection.

So, in 2025 expect to see AI-led changes on both sides of the struggle – a slow and steady growth in AI assisted cyber attacks as well as increasingly effective AI powered tools speeding up incident detection and response.

How to Strengthen Your Defences

Martyn Clews, Cyber Specialist at Wavenet: “To defend against AI-driven cyber attacks, organisations should use AI and machine learning in their security systems to detect and block threats in real time. Regular updates and patches are essential to fix vulnerabilities that attackers may exploit. User training should focus on recognising AI-generated phishing attempts, including deepfakes. Companies must also protect sensitive data from being exposed to unsecured AI platforms. By adopting a proactive, AI-enhanced defence strategy, organisations can stay ahead of evolving cyber threats.”

2. Supply Chain Attacks

Supply chain attacks will remain a significant security threat in 2025 due to the increasing complexity and interconnected nature of global supply chains. More and more organisations are relying on third-party vendors for critical services and software, and as a result, the attack surface expands, providing cyber criminals with more entry points to exploit.

These attacks are particularly dangerous because they target trusted relationships, allowing threat actors to bypass traditional security defences and gain access to sensitive systems across multiple organisations. With the rise of digital transformation, reliance on cloud services, and the continued use of open-source software, supply chain vulnerabilities will become even more attractive for attackers, making vendor risk management and monitoring an essential undertaking for organisations moving forward.

How to Strengthen Your Defences

Martin Lewis, Operational Resilience and Cyber Security Sales Manager at Wavenet states “As global supply chains grow increasingly complex, organisations must implement more advanced strategies to ensure resilience. With rising regulatory scrutiny and greater risks, the need for stronger risk management has never been more critical. By identifying key suppliers, establishing effective monitoring systems, and creating comprehensive contingency plans, businesses can minimise the risks tied to outsourcing, and safeguard operational continuity.

Proactively managing supply chain risks is not merely a best practice — it is essential for long-term success and maintaining supply chain resilience”.

3. Ransomware Evolution

Ransomware remains one of the most significant threats to organisations, showing no signs of slowing down. In fact, 66% of organisations were affected by a ransomware attack last year. Worse yet, these attacks are evolving, with a new trend: double extortion, and in some cases, even quadruple extortion. In double extortion, attackers first demand payment to unlock encrypted files or systems, followed by a second ransom to prevent the release of sensitive data online or on the dark web.

We also expect Ransomware-as-a-Service (RaaS) platforms to continue to grow, enabling less-skilled criminals to carry out sophisticated attacks. The use of AI-driven encryption and more advanced payload delivery methods will make ransomware even more effective and harder to defend against.

How to Strengthen Your Defences

Jack Howey, Testing Service Director at Wavenet shares his thoughts: “Facing a ransomware attack is a nightmare scenario, but with the right preparation and response strategy, it can also be an opportunity for improvement. Ensuring you have a reliable incident response plan, adequate backups, and additional IT resources on standby can make the difference between a catastrophic loss and a successful recovery”.

4. Insider Threats

We’ve been warning our customers about the rising risks of insider threats since the shift to hybrid working, and we believe they will remain a significant concern in 2025 as organisations continue to adapt to hybrid models, increased cloud adoption, and reliance on third-party contractors. With more employees and contractors accessing sensitive data and systems remotely, the risk of both malicious and accidental insider breaches will only grow.

Insider threats can lead to malware, data corruption, theft, financial fraud, and identity theft, causing reputational damage, lost business, fines, and legal action. Disgruntled or careless employees will continue to pose risks, with insider attacks often going undetected for long periods and resulting in significant financial and operational damage.

How to Strengthen Your Defences

Lucy Sharp, Cyber Operations Director at Wavenet “To address this, organisations must strengthen monitoring, access control measures, and training. Insider threat detection will increasingly rely on behavioural analytics and anomaly detection to identify risks early. Real-time detection, swift investigation, and strong prevention measures, such as VPNs and enforcing security policies, are essential to minimising these threats.”

5. Application Programming Interface (API) Security Risks

In 2024 we’ve seen a significant increase in the use of API interfaces. Of course this is nothing new, for years APIs have been the bedrock of the modern digital world, but increasingly their ubiquity in today’s interconnected world has made them prime targets for hackers.

The increasing reliance on APIs exposes a larger attack surface. Hackers exploit misconfigured, poorly secured, or overly permissive APIs to steal data, infiltrate systems, and disrupt services. APIs often serve as direct conduits to sensitive information, such as user credentials, financial data, and proprietary algorithms, making them lucrative targets.

Many organisations adopt APIs at scale without robust security practices, prioritizing speed over safeguards. Insufficient authentication, unencrypted transmissions, and lack of proper rate limiting are common vulnerabilities. Additionally, APIs most vulnerability scanners overlook APIs, leaving networks dangerously exposed to attack.

This issue refers back to our earlier point on the risks inherent in supply chains. As the complexity of our online operations grows and more and more technologies and organisations are involved, it becomes increasingly hard to stay abreast of the associated risks.

How to Strengthen Your Defences

Jack Howey, Testing Service Director at Wavenet: “The key here is to be aware of how and where you are using APIs and being sure to include them in any testing and vulnerability scanning you carry out. Similarly, as ever it’s crucial you stay informed on APIs used in external software and applications your organisation is using.”

6. Board-level Cyber Representation

Historically cyber has not always had a fair hearing in the boardroom. Only a few years ago, it was commonly seen as part of the remit of the IT department and not a significant enough issue to be discussed by those at the top of an organisation. This often led to disastrous consequences, with no reporting, senior oversight, or incorporation into strategic objectives.

Thankfully, we are now seeing active engagement from those at C-level, often driven by aligned cyber risk committees, and a push for a high ESG rating. We expect this trend to continue to grow in 2025 and beyond.

How to Strengthen Your Defences

Paul McLatchie, Security Strategy Consultant at Wavenet: “Embedding cyber security into board-level discussions isn’t just about mitigating risk—it’s about enabling growth and resilience in a digital-first world. When leaders prioritise security, they empower their organisations to innovate with confidence, knowing that risks are identified, managed, and addressed at the highest level.”

Conclusion  

One key takeaway is the importance of preparing for future cyber threats. Research continuously shows that organisations with proactive security strategies consistently prevent more attacks, detect issues faster, suffer fewer breaches, and minimise the damage of incidents more effectively than those that reactively handle security challenges.

In the coming years, being proactive will mean adapting to the evolving threat landscape, including AI-driven cyber attacks, insider threats, and supply chain and API vulnerabilities. With attackers increasingly able to bypass traditional defences, identity security, cloud vulnerabilities, and ransomware evolution will become critical focus areas. Organisations must stay ahead by strengthening monitoring, access controls, and threat detection.

To build a resilient cyber security posture for 2025 and beyond, reaching out to one of our cyber security specialists is an excellent starting point.

Next steps...

To find out more information on our Cyber Security services click the button below:

 

To make an enquiry or request a call back:

 

Backup & Recovery, AI, Cyber Security, Ransomware, MDR

Latest blogs

See all posts
A happy house tenant is using an app on her phone to report a home issue to her housing provider
From risk to resolution: how Active Assessor helps you stay ahead of Awaab's Law

What does Awaab's Law mean and why does it matter? Damp and mould aren’t just inconvenient maintenance problems - they’re serious risks to tenant health, regulatory compliance, and the reputation of housing providers. Nearly 1 in 7 social homes in England failed to meet the Decent Homes Standard in 2023¹. On top of that, the NHS is estimated to spend £1.4 billion a year treating health issues related to cold, damp housing². And yet, more than half of tenants experiencing condensation, damp or mould don’t report it. Often, they don’t recognise the early signs, or they simply don’t believe they’ll be taken seriously. This silence leaves landlords in the dark and turns small, fixable issues into expensive, high-risk problems. The tragic death of Awaab Ishak in 2020 brought national attention to the dangers of mould in social housing. In response, Awaab’s Law was introduced in 2023, significantly raising the bar for housing providers. Under the new legislation, social landlords must investigate hazards like damp and mould within 14 days, begin necessary repairs within 7 days, and complete the work within 21 days. This has turned what was once a service expectation into a legal requirement. But with so many issues going unreported, housing providers are left vulnerable. Failing to detect or act on early signs doesn’t just put tenants at risk—it can now result in legal and reputational consequences. The Challenge: Strained Teams & Outdated Systems Most housing providers care deeply about tenant safety. The problem isn’t willingness—it’s capacity. Maintenance teams, IT departments, and customer contact centres are already stretched thin. Spotting early-stage issues requires tools they simply don’t have. Traditional, manual inspections are expensive and slow. Reactive workflows leave little room to get ahead of problems. And despite growing demand for proactive service, only 13% of customers actually receive it. The systems many teams rely on today are fragmented, outdated, and not fit for the pressures of a post-Awaab world. The Solution: Active Assessor by 8x8

Read more
Placeholder thumbnail
There's more to the PSTN switch-off than meets the eye

What is the PSTN switch-off? The impending PSTN (Public Switched Telephone Network) switch-off isn’t just about replacing traditional lines. It’s a seismic shift that impacts far more than most realise – and if you’re not prepared, it could cost your business dearly. Most companies are aware that traditional analogue lines and ISDN systems for calls and broadband are being phased out by January 2027. But what many don’t see is the vast ripple effect of this transition – touching everything from lifts to life-critical systems, cash machines, and even traffic lights. What does the PSTN switch-off mean in simple terms? When it comes to the PSTN switch-off, it’s easy to think that it is just about phone lines. But the truth is, it’s much more complex. Here is what’s at stake: Life-saving systems: fire alarms, major medical and safety devices, emergency alarms in care homes, emergency pendants, telemetry services monitoring boiler rooms, dams, sluice gates, and substations. Public infrastructure: traffic lights, bus stops, speed cameras, and traffic management systems. Business-critical devices: PDQ and payment terminals, ATMS, CCTV, video surveillance, door entry, security systems, and remote access points. Transport & emergency services: roadside AA/RAC recovery alerts and devices, and emergency phone lines in hazardous environments. Telecommunications & internet: leased lines, private networking facilities, dial-up lines, broadband DSL services, and international leased lines. Community & public services: emergency teams and vehicles, payphones, modems, industrial control, public alerts, and more. If every one of these vital systems suddenly loses connectivity – chaos, downtime, and danger could follow. The possible business impact of the PSTN switch-off could be financial losses, public safety risks and erosion of customer trust. The PSTN switch-off is a vital business resilience issue – the time to act is now Unlike many providers who may focus on the obvious, we see what others miss. Our team dives beneath the surface, examining your entire network ecosystem to identify what’s at risk when the PSTN switches off. We have mapped out the hidden web of critical systems that rely on legacy infrastructure – and yes, we’ve prepared solutions for each one. Check out our iceberg infographic to see a quick glance of the PSTN switch-off picture. The switch-off is just the tip of the iceberg. Without planning, your operations could face catastrophic disruption. Don’t let your business be caught unaware. Reach out today for an in-depth assessment, and explore solutions tailored to your critical systems. Because when it comes to the PSTN switch-off, we see beyond the iceberg – and help your business stay afloat.

Read more
Placeholder thumbnail
What will happen to businesses when landlines go digital?

Preparing your business for the WLR switch-off and ensuring a smooth transition Most businesses currently rely on traditional analogue lines, ISDN, or broadband connected through Wholesale Line Rental (WLR) – the infrastructure powering your calls, data, security systems, and more. But the truth is, the WLR switch-off is on the horizon – and it’s affecting businesses in ways they might not be expecting. It’s not just about telephony! Do you really know what your WLR lines are powering? And what your options are? The countdown is on - Openreach’s deadline to shut down traditional analogue phone lines, ISDN, broadband, and other vital WLR-connected services is January 2027 (or even sooner). If you’re not fully prepared, your business could face serious disruption: Your phones may stop ringing, cutting off essential customer contact Lifts and critical facilities could cease functioning Broadband and internet services might go offline unexpectedly Your customers’ access to your services could be lost What exactly are your WLR lines powering? Many businesses don’t realise just how much relies on their existing WLR lines and traditional networks. The PSTN and WLR include more than just voice calls; they power card payment terminals, security alarms, lift controls, entry systems, CCTV, emergency systems, and many other critical business operations. Without a clear understanding of which lines are used for what, you risk missing vital services during the switch-over. Managing large estates or multiple sites makes this even trickier – you may be unaware of what lines you have, what they’re used for, where they’re located, or what they are connected to, creating a significant business risk. What do you do when landlines go digital? Don’t wait until disruption strikes. The earlier you identify your current setup and plan your migration, the smoother and more secure your transition will be. Download our free WLR Audit Factsheet – a straightforward guide to show you how we can help. Stay ahead of the clock. Take control now to ensure your business’s ongoing communications and critical services remain unaffected. Visit wavenet.co.uk/pstn-switch-off  for more information. 

Read more
Placeholder thumbnail
What is the WLR switch-off?

The WLR switch-off roadmap The countdown has begun – are you prepared? The WLF (Wholesale Line Rental) switch-off is already underway, and by January 2027, all traditional PSTN and ISDN lines will be switched off. Doing nothing isn’t an option anymore. Without action, your vital communications could face disruption, affecting your business operations and customer service. Why act now for the WLR switch-off? This isn’t just a technical upgrade – it’s a chance to transform your communication infrastructure into a reliable, feature-rich, all-IP network. Moving to an all-IP network unlocks better reliability, feature-rich communication, and future-proof capabilities that keep your business connected and competitive in a digital-first world. Your WLR switch-off migration journey starts here Switching to an all-IP solution is easier than you think. We help you assess your current setup and craft a tailored plan for a smooth, seamless migration. Options include: FTTP & SOGEA: Super-fast dedicated internet for unbeatable connectivity IP Voice & Hosted Voice: Flexible, scalable telephony solutions for modern communication UC Applications: Boost collaboration across your team, anywhere, anytime SIP Trunking: Cost-effective, reliable connectivity that scales with your needs Future-proof your business today Migrating early minimises disruption and unlocks new operational efficiencies. An all-IP network offers smoother communication, advanced features, and easier management, so you stay ahead in today’s digital economy. Be prepared for the WLR switch-off Ready to make the switch? We’ve got the perfect resource to help you stay ahead: our visual quick guide on the Openreach switch-off schedule. It’s a simple, clear, and easy-to-follow overview that helps you understand the timeline and plan your migration effectively. Download the WLR Switch-off Guide now and get your WLR migration plan on track. Be proactive and secure your business’s future communications today! Visit wavenet.co.uk/pstn-switch-off for more information.

Read more

Stay service-savvy

Get all the latest news and insights straight to your inbox.