Skip to main content
search
All BlogsCyber NewsZero Trust

2025 Cyber Threat Trends: What the Year Revealed

By January 9, 2026 No Comments

Celine Rosak, Director of Corporate Marketing & Brand, Xage Security

2025 was a defining year for cybersecurity. The volume, diversity, and impact of cyber incidents continued to grow, but more importantly, clear patterns emerged in how attackers operate, which sectors they prioritize, and where defensive strategies continue to fall short. From the rise of AI-powered cyber operations to sustained pressure on critical infrastructure, the year offered important signals about how the threat landscape is evolving.

This blog does not attempt to catalog every cyber incident or breach from 2025. Instead, it highlights a curated selection of events that best illustrate the dominant trends shaping cyber risk over the past year. These stories were chosen not for their scale alone, but for what they reveal about attacker tactics, systemic weaknesses, and the shifting balance between offense and defense.

Taken together, these examples provide a practical lens into the most consequential developments of 2025, helping security leaders understand where risks are concentrating, why traditional controls are struggling to keep pace, and what priorities should guide defensive strategy in the year ahead.

To jump ahead to any section, select from the following: 

The Rise of AI-Powered Cyber Attacks

There is no doubt that AI was the defining story of 2025. However, its role in enabling real-world cyberattacks unfolded gradually in the first part of the year before then accelerating rapidly in the latter half. The first major story of AI abuse emerged in May, when reports revealed that hundreds of North Korean IT operatives had successfully infiltrated Fortune 500 companies by posing as remote workers. What distinguished this campaign was the operational use of AI and deepfake technology, not merely as supporting tools but as core components of the intrusion strategy. Operatives relied on AI-generated responses to pass technical interviews and used deepfake video and manipulated identity documents to bypass hiring and identity verification controls.

A similar incident followed in July, when threat actors used AI-generated voice deepfakes to impersonate Secretary of State Marco Rubio. The attackers targeted diplomats in a relatively unsophisticated but alarming social engineering campaign, highlighting how quickly voice cloning had become accessible and weaponized.

July also brought the first widely reported example of AI failure without malicious intent. A San Francisco-based AI company, Replit AI, made headlines after one of its systems ignored explicit instructions to freeze code changes and instead deleted a live production database. The incident wiped data tied to more than 1,200 executives and nearly 1,200 companies. The AI then compounded the damage by fabricating thousands of fake user profiles, falsely claiming tests had passed and asserting that the data was irrecoverable. The system later admitted its behavior resulted from “panicking.” Read our blog on this cautionary tale. 

While not an attack, the event clearly demonstrated that guardrails alone are insufficient to ensure safe AI behavior. That lesson became increasingly evident as the year progressed. In August, Kaspersky reported a sharp rise in AI-generated phishing activity, blocking 142 million malicious clicks in Q2 2025, a 3.3 percent increase from the prior quarter. Unlike earlier phishing campaigns, these attacks featured highly convincing emails, messages, and websites with no obvious grammatical or stylistic errors, making them difficult to distinguish from legitimate communications.

Also in August, Anthropic published its Threat Intelligence Report, concluding that AI had moved beyond experimentation and was now an active enabler of cybercrime. Threat actors were embedding large language models (LLMs) across the entire attack lifecycle, from reconnaissance and victim profiling to malware development, extortion, and monetization. The report detailed several notable case studies, including a “vibe hacking” campaign that targeted 17 organizations across healthcare and government sectors. Rather than encrypting systems, attackers used AI to threaten the release of sensitive data. In other cases, attackers used Anthropic’s Claude for ransomware, automating data theft and draft ransom demands, and building AI-built ransomware variants that were sold on the dark web as no-code malware kits, dramatically lowering the barrier to entry for less skilled attackers.

Another AI-driven technique reported in August involved phishing schemes built around fake CAPTCHA pages that bypassed traditional defenses and tricked users into surrendering credentials. Given that stolen credentials already represent one of the most common attack vectors, AI-driven approaches significantly increase risk. In an AI-enabled threat landscape, enterprises must eliminate static credentials and privileges and shift toward just-in-time access models.

In November, Anthropic disclosed a large-scale AI-assisted espionage campaign that marked a turning point in modern cyber operations. A nation-state threat actor successfully jailbroke Claude and used it to automate an entire breach lifecycle, including reconnaissance, vulnerability scanning, lateral movement, privilege escalation, and data exfiltration. The incident demonstrated how easily guardrails can be bypassed and reinforced the limits of policy-based controls alone. For a deeper look at the Anthropic incident, read our blog.

The AI Industry Tightens Guardrails in Response to Abuse

In response to these developments, AI vendors began mobilizing. In August, Anthropic updated its Claude policy to explicitly prohibit malicious use, including the creation of malware, DDoS tools, and vulnerability exploits. It also strengthened restrictions around weaponization by banning CBRN-related development and limiting certain high-risk capabilities to consumer contexts. The company expanded defensive measures by banning abusive accounts, deploying classifiers to detect misuse patterns, and sharing indicators of compromise with industry and government partners.

In December, OpenAI issued a warning that its upcoming, more capable models could significantly increase cybersecurity risk if misused. The company acknowledged that advanced models could enable more effective vulnerability discovery, exploit development, and large-scale social engineering. OpenAI stated it was preparing additional safeguards, internal risk reviews, and deeper engagement with governments, reflecting growing concern within the AI industry itself that offensive capabilities may advance faster than governance and controls.

The broader takeaway from 2025 is clear. AI has democratized access to sophisticated cyber capabilities, enabling even low-skill actors to execute complex attacks. For defenders, this reality underscores the urgency of adopting proactive Zero Trust controls to prevent data leakage, model jailbreaks, and other forms of AI abuse.

How Governments Responded to AI Risk in 2025

Governments also began taking more visible action in response to AI risks. AI capabilities are already lowering the barrier to entry for cybercrime, reinforcing concerns that offensive use may outpace governance. As models become more powerful, organizations must strengthen preventative controls to withstand the increased speed and scale of attacks. 

In the United States, the White House unveiled “America’s AI Action Plan” in July 2025 under an executive order. The plan outlines a national strategy to solidify U.S. leadership in artificial intelligence by accelerating innovation through reduced regulatory barriers, expanding federal AI adoption, and building critical infrastructure such as data centers, advanced chips, and energy capacity. It also emphasizes workforce development and international leadership, positioning AI safety and security as matters of national security. Together, these measures aim to drive rapid AI adoption across government and industry while reinforcing U.S. dominance in the global AI race. Read our full analysis. 

In August, India launched a six-month training program for cyber responders focused on AI-driven crimes, including deepfakes, automated phishing, identity spoofing, and algorithmic attacks. Developed in partnership with the defense science establishment, the program uses live simulations and was prompted by findings that AI is now involved in more than 83 percent of phishing campaigns.

That same month, China continued its top-down approach to AI security by treating safety as a prerequisite for innovation rather than a regulatory obstacle. AI risk was elevated to the highest levels of policymaking, with President Xi convening a Politburo session dedicated to the issue and formally integrating AI safety into national emergency planning. Regulators mandated pre-deployment safety assessments for generative AI, removed thousands of non-compliant products, and accelerated the release of national AI standards, issuing more in early 2025 than in the previous three years combined.

The Ongoing Risk at the Network Edge

In 2025, VPN and firewall-based attacks returned to the headlines again and again. While the attack vector itself was not new, the volume, consistency, and severity of incidents underscored a troubling reality: nation-state actors continue to exploit VPNs and firewalls as primary entry points, with no signs of slowing down.

The year began in January with the disclosure of two Ivanti VPN zero-day vulnerabilities, CVE-2025-0282 and CVE-2025-0283. According to Mandiant, CVE-2025-0282 was already being actively exploited by the China-linked espionage group UNC5221. The flaws reinforced a familiar pattern, where attackers rapidly weaponize edge vulnerabilities faster than organizations can patch them.

January also saw the resurfacing of a two-year-old breach involving FortiGate firewalls. Leaked configuration data and passwords, many stored in plaintext, reappeared publicly. While regular password rotation can mitigate some risk, FortiGate does not enforce this practice, leaving many organizations exposed to stale credentials. More concerning, unchanged firewall configurations provided attackers with detailed insights into internal network layouts. The leak included approximately 12,000 site-to-site IPsec VPN configurations, potentially granting direct access to internal networks.

In April, Ivanti VPNs made headlines again when Mandiant reported that a China-aligned threat actor was actively exploiting another critical flaw, CVE-2025-22457, in Ivanti Connect Secure appliances. Initially believed to be a low-risk denial-of-service issue, further analysis revealed the vulnerability could enable remote code execution on unpatched systems, dramatically increasing its impact.

That same month, CISA issued an alert warning of active exploitation targeting SonicWall Secure Mobile Access 100 VPN products tied to CVE-2021-20035, further reinforcing that legacy VPN appliances remained a favored target across the threat landscape.

These incidents reflect the same trends captured in Verizon’s 2025 Data Breach Investigations Report. The report found that exploitation of vulnerabilities, particularly in VPNs and edge devices, increased by 34 percent. Attacks targeting VPNs and edge infrastructure rose from 3 percent to 22 percent of vulnerability-driven breaches, representing nearly an eightfold increase.

However, the most consequential developments for VPN risk arrived in October, when CISA issued emergency directives addressing zero-day vulnerabilities in both F5 Networks BIG-IP and Cisco ASA and Firepower Threat Defense VPN platforms. Together, these incidents marked a major inflection point for network-edge security.

F5 disclosed that a state-backed threat actor had maintained long-term access to its corporate network, exfiltrating BIG-IP source code and internal vulnerability reports. CISA responded with Emergency Directive 26-01, ordering federal agencies to isolate or patch all affected F5 devices by late October. Because F5 appliances sit deep inside utilities, pipeline control networks, and transportation systems, the breach effectively grants adversaries a blueprint to exploit future zero-days. This was not merely a vendor compromise, but a software supply chain exposure embedded at the core of critical infrastructure. Read more on the F5 breach. 

Just weeks earlier, CISA had issued Emergency Directive 25-03 following active exploitation of Cisco ASA and Firepower Threat Defense VPN interfaces. Agencies were instructed to patch, triage, or disconnect affected systems showing signs of persistent access. As with the Ivanti incidents earlier in the year, the Cisco attacks demonstrated that even well-maintained perimeter VPNs become high-value targets once credentials or session tokens are compromised. Dive deeper into the Cisco VPN risks. 

Across Ivanti, Cisco, and F5, the same architectural weaknesses surfaced repeatedly:

  • Always-on, internet-facing VPN portals act as single points of failure
  • Flat internal networks enable rapid lateral movement after compromise
  • Centralized credential stores dramatically increase blast radius
  • Emergency patching and system rebuilds cause downtime that critical infrastructure operators cannot afford

These events should mark a turning point for defenders. Patching alone cannot outpace adversaries who increasingly target the management plane itself. The lesson of 2025 is clear: resilience depends on redesigning access architectures, not simply repairing them.

Organizations must move away from legacy VPNs and adopt Zero Trust, identity-based access models that broker secure, just-in-time connections on a per-user and per-asset basis. Replacing static VPN gateways with distributed, session-based access limits lateral movement, contains breaches, and allows operations to continue even during active exploitation.

The Rising Cost of Credential Abuse

In 2025, credential misuse remained a consistent and effective tactic across a wide range of cyber activity. Rather than relying solely on new exploits or disruptive malware, attackers increasingly focused on obtaining and reusing legitimate credentials to maintain access, move laterally, and blend into normal operations. This approach made intrusions harder to detect and extended their potential impact across both IT and operational technology environments.

This technique was reflected in two notable developments in February 2025. 

Microsoft reported that Sandworm, also known as Seashell Blizzard and responsible for the 2017 NotPetya attack, had expanded its ongoing “BadPilot” campaign beyond Eastern Europe and Asia to include targets in the United States, United Kingdom, and Australia. Active since at least 2021, the campaign relies heavily on credential collection as a means of persistence and lateral movement. According to Microsoft, the group uses opportunistic access techniques to harvest credentials, execute commands, and move through networks, enabling access to organizations across sectors such as energy, oil and gas, telecommunications, shipping, arms manufacturing, and government.

By emphasizing credential reuse over more aggressive exploitation, the campaign reduces operational noise while allowing attackers to sustain access over time. Compromised credentials can be leveraged for privilege escalation and cross-environment movement, increasing risk in environments where access controls are overly permissive or poorly monitored.

Also in February, reports indicated that hundreds of compromised credentials associated with U.S. Department of Defense agencies and defense contractors were being offered for sale online. Some of the stolen data reportedly included active session cookies, which could allow attackers to bypass multi-factor authentication. The incident highlights the importance of credential hygiene, particularly in environments where credentials are long-lived or insufficiently scoped.

Taken together, these events reinforce the need for organizations to treat credential risk as a core security consideration. Enforcing least privilege, eliminating standing access, rotating credentials, and monitoring authentication activity across enterprise, cloud, and OT environments can significantly reduce the impact of credential compromise when it occurs. 

What Changed in Ransomware in 2025

The year opened with cautiously positive signals. According to February reporting from blockchain analysis firm Chainalysis, global ransomware payments declined by 35 percent in 2024 compared to the prior year, falling from $1.25 billion in 2023 to $813.55 million. The reduction was attributed to increased law enforcement action, improved disruption of ransomware infrastructure, and a growing number of victims refusing to pay.

That optimism proved short-lived. In the same month, Mandiant reported a notable shift in the threat landscape as state-sponsored espionage groups, particularly from Russia and North Korea, increasingly applied their technical capabilities to financially motivated cybercrime. In 2024, Mandiant responded to four times as many financially driven intrusions as traditional espionage operations. This trend raised broader national security concerns, particularly as ransomware activity continued to concentrate on sectors with low tolerance for downtime.

In April, Verizon’s 2025 Data Breach Investigations Report reported a 37 percent year-over-year increase in ransomware incidents

The impact was even more pronounced in industrial environments. The Dragos OT Cybersecurity Report, published in late February, found an 87 percent increase in ransomware activity targeting industrial organizations. Manufacturing bore the brunt of these attacks, as adversaries focused on environments where operational disruption carries immediate financial consequences.

Dragos reported that ransomware incidents in industrial settings resulted in operational impact in every observed case, with 25 percent leading to full shutdowns and 75 percent causing partial disruptions. Even short periods of downtime produced significant financial and logistical effects. Remote access exploitation emerged as a key attack vector, accounting for 20 percent of incidents. Many breaches stemmed from insecure remote access configurations, including default credentials, unpatched VPNs, and exposed RDP services.

Ransomware techniques also continued to evolve. In March, CISA and the FBI issued a joint advisory on the Medusa ransomware-as-a-service operation, which has affected more than 300 critical infrastructure organizations. Medusa employs a double extortion model that combines data theft with encryption. The advisory also warned of an emerging triple extortion tactic, in which victims who had already paid a ransom were later contacted by a second affiliated actor claiming the original payment had been stolen and demanding additional funds.

Despite shifting tactics, core defensive guidance remained consistent. Organizations were urged not to pay ransoms and to prioritize preventative controls. Zero Trust access policies, network segmentation, and continuous monitoring remain essential to reducing attack surface and limiting adversary leverage.

The UK’s Ransomware Surge

The impact of ransomware was particularly visible in the United Kingdom throughout 2025. High-profile incidents began in May, when a wave of attacks disrupted the retail and grocery sectors. The Scattered Spider group claimed responsibility for attacks on Marks & Spencer, Harrods, and Co-op, highlighting a deliberate focus on large consumer-facing organizations and critical supply chains.

Marks & Spencer disclosed projected losses exceeding $400 million following the encryption of key systems and the theft of customer data, including names, contact information, and partial payment details. The breach was traced to Tata Consultancy Services, reinforcing persistent supply chain vulnerabilities. Around the same time, Co-op experienced a ransomware attack that disrupted logistics systems and temporarily halted store resupply in regions such as the Scottish islands.

Although Scattered Spider did not claim responsibility, Peter Green Chilled, a logistics provider serving major UK supermarkets, was also hit by ransomware. While transportation operations continued, order processing was disrupted, adding further strain to the UK’s food distribution network. The timing suggested a broader increase in attacks against food and logistics providers, even when attribution remained unclear.

Scattered Spider activity was also linked to incidents in the United States. Google researchers reported that the group exploited help desks and IT support channels to gain initial access, blending social engineering with ransomware and extortion tactics. Erie Insurance disclosed a disruptive cyber incident consistent with the group’s methods, and Aflac confirmed a breach believed to be linked to Scattered Spider, with attackers potentially accessing highly sensitive personal and health data.

The most significant ransomware incident of the year occurred in September, when Jaguar Land Rover (JLR) disclosed an active cyberattack and made the decision to shut down IT and production systems worldwide. Analysts described the response as necessary to prevent lateral movement across JLR’s global infrastructure, but the operational and financial consequences were substantial.

The attack on JLR is widely reported to be the most costly cyber incident in UK history, with estimated losses of approximately $2.5 billion (£1.9 billion). The five-week shutdown disrupted operations across more than 5,000 businesses in JLR’s supply chain, with full recovery not expected until January 2026. The incident underscored that ransomware attacks extend far beyond data encryption, with the ability to halt physical production and ripple across national economies.

JLR’s experience reinforced the need for Zero Trust security architectures, including identity-based access controls, strong segmentation, and phishing-resistant multi-factor authentication. These measures are critical not only for preventing ransomware infections, but for limiting attacker movement and reducing operational downtime when incidents occur.

Read our full analysis of the JLR attack →

Critical Infrastructure Under Sustained Pressure

Ransomware was not the only threat facing critical infrastructure in 2025. A July report from Cyble highlighted a growing trend in hacktivist operations targeting industrial control systems and access-based infrastructure. These campaigns accounted for 31 percent of all attacks in Q2 2025, up from 29 percent in Q1. While often ideologically motivated, hacktivist groups increasingly adopted more coordinated and impactful techniques, raising concerns about potential physical consequences.

This trend persisted throughout the year. In December, a multinational advisory warned that hacktivist groups were actively targeting water utilities, energy providers, and food and agriculture systems. Although these actors typically lack advanced tooling, they frequently exploit exposed remote access services, particularly VNC, along with weak authentication and poor network segmentation. In several cases, these relatively simple techniques resulted in real operational disruption, demonstrating how even low-skill actors can generate meaningful impact in poorly secured OT environments.

The advisory reinforced a consistent theme: insecure remote access remains one of the most common and avoidable sources of risk in critical infrastructure. Legacy access solutions introduce unnecessary exposure and make credential abuse and lateral movement far easier than they should be. As a result, critical infrastructure operators are increasingly encouraged to move away from these systems and adopt Zero Trust approaches that tightly control access and limit blast radius.

Similar findings appeared in November, when the Canadian Centre for Cyber Security released anonymized reporting on recent OT intrusions affecting power generation, water utilities, manufacturing, and transportation. Many incidents stemmed from internet-accessible OT assets, weak authentication mechanisms, and inadequate segmentation, highlighting systemic challenges across aging industrial environments.

As remote access tools, IIoT devices, and cloud-connected industrial equipment continue to proliferate, the identity and access attack surface has expanded beyond the reach of traditional IT security controls. Hacktivists are no longer confined to web defacements or denial-of-service activity. They are increasingly abusing exposed ICS environments, making publicly reachable OT systems a viable target for a much broader range of threat actors.

The financial incentives driving these attacks remain significant. A joint Dragos and Marsh McLennan report estimated that a catastrophic OT-focused cyber event could cost $330 billion annually, with $172 billion attributed to business interruption alone. In July, reporting also revealed that the Iranian-linked ransomware group Pay2Key.I2P offered affiliates up to 80 percent of ransom proceeds for attacks targeting U.S. and Israeli organizations, generating approximately $4 million since February. These developments reflect a growing alignment between financially motivated actors and state-linked interests, increasing both scale and impact.

Transportation Sector Disruptions

The transportation sector experienced notable disruption in 2025. According to a report from Proofpoint, logistics and transportation organizations saw a surge in cyber-enabled cargo theft, with losses estimated at more than $35 billion annually. Threat actors infiltrated logistics platforms, compromised fleet management systems, and manipulated digital freight marketplaces to redirect shipments and conduct double-brokering scams. Organized theft groups increasingly blended cyber intrusion, social engineering, and physical supply chain manipulation, operating at global scale.

In September, a ransomware attack on Collins Aerospace’s check-in systems forced major airports, including Brussels and London Heathrow, to cancel dozens of flights and delay many others while reverting to manual processes. The incident illustrated how third-party system failures can quickly cascade across transportation infrastructure.

Attack techniques also grew more advanced. In the Middle East, a new ransomware variant known as Charon employed DLL sideloading techniques typically associated with advanced persistent threats, targeting aviation and public sector organizations. The shift reflects continued technical crossover between criminal and state-aligned operations.

Telecommunications Remains a Strategic Target

Telecommunications infrastructure faced persistent pressure throughout 2025. In April, reporting by The Wall Street Journal revealed that Chinese officials privately acknowledged government involvement in the Volt Typhoon campaign, which targeted U.S. telecom networks. The admission underscored the strategic value of telecommunications infrastructure in espionage operations.

China-linked activity continued in May, when U.S. satellite communications provider Viasat was identified as a victim of the Salt Typhoon espionage campaign. Other targeted organizations included Verizon, AT&T, and Lumen. The campaign emphasized credential harvesting and device compromise to establish long-term surveillance access. While Viasat reported no customer data loss, the focus on metadata collection and persistence highlighted the strategic objectives behind the operation.

Globally, telecom providers faced disruption as well. In the United Kingdom, Colt Telecom was hit by the WarLock ransomware group, disrupting services across 30 countries and exposing sensitive corporate data. In South Korea, SK Telecom confirmed a breach involving SIM-related data, raising concerns about SIM swap fraud and prompting the company to offer free SIM replacements to its 23 million subscribers. In South Africa, a major telecom provider suffered a data leak attributed to the RansomHouse group, which relies on data exposure rather than encryption to pressure victims.

Healthcare Systems Under Sustained Attack

Healthcare remained a primary target. According to the HIPAA Journal, the number of individuals affected by healthcare data breaches increased by 64 percent in 2024 compared to 2023, reflecting the continued appeal of ransomware and extortion tactics in highly sensitive environments.

In April, DaVita, one of the largest dialysis providers in the United States, disclosed a ransomware attack that disrupted portions of its network. The company maintained patient care by isolating affected systems and implementing interim operational measures.

The same month, Yale New Haven Health System reported unauthorized access affecting data belonging to 5.5 million patients. Although core electronic medical record systems were not impacted, exposed information included Social Security numbers, medical record identifiers, and demographic data. Frederick Health Medical Group in Maryland also reported a ransomware-related breach affecting nearly one million patients.

These incidents were part of a broader pattern. In June, Kettering Health in Ohio continued recovery weeks after an Interlock ransomware attack disrupted systems and led to data leakage. Internationally, the American Hospital in Dubai was targeted by the Gunra group, which claimed to have stolen hundreds of millions of patient records. Hospitals across Maine and New Hampshire affiliated with Covenant Health experienced prolonged outages from a separate ransomware campaign, reflecting sustained global pressure on healthcare infrastructure.

Energy Infrastructure Faces Expanding Risk

The energy sector also saw heightened activity. In Pakistan, state-owned Pakistan Petroleum reported an attempted breach linked to the emerging Blue Locker ransomware strain. More broadly, ransomware targeting oil and gas surged by 935 percent year over year, driven by digital transformation and expanding connectivity.

A scan of 21 major U.S. energy providers identified more than 5,750 vulnerabilities, nearly 380 of which were already under active exploitation. For OT devices, patching is often impractical, leaving organizations exposed for extended periods without compensating controls.

In May, a cyberattack on Nova Scotia Power disrupted customer-facing systems, halting new service activations and limiting support despite uninterrupted power generation. The incident demonstrated how IT-layer vulnerabilities can still have operational consequences for critical services.

Investigations into U.S. solar infrastructure uncovered undocumented “kill switches” in Chinese-made power inverters widely deployed across solar farms. These embedded cellular radios raised concerns about potential remote disruption and highlighted the risks introduced by opaque supply chains within energy infrastructure.

Public Sector Impact and Response

Public sector organizations also faced major incidents. In August, the U.S. federal judiciary disclosed a breach of its electronic case filing system, including access to sealed and highly sensitive materials. In St. Paul, Minnesota, a separate cyberattack disrupted city systems so severely that the governor activated the National Guard to assist recovery efforts.

Internationally, the scale of impact was significant. A September survey by Bitkom estimated that cybercrime cost the German economy nearly €300 billion in 2024. Panama’s Ministry of Economy and Finance lost 1.5 terabytes of sensitive data, while Vietnam experienced a breach involving 160 million records. Even smaller municipalities felt the strain, with St. Joseph, Missouri spending more than $1 million on cybersecurity improvements following a cyber incident.

These events underscored that cyber incidents do more than disrupt services. They strain budgets, divert public resources, and erode trust.

Regulation, Standards, and Governance Accelerate

The fallout from the Salt Typhoon espionage campaign continued into regulatory action. Additional breached telecom providers were identified, prompting the U.S. Federal Communications Commission (FCC) to issue mandates in January requiring telecom operators to implement robust cybersecurity risk management plans and submit annual compliance certifications.

Japan’s Ministry of Economy, Trade and Industry released new OT security guidelines for semiconductor manufacturing, emphasizing identity management, segmentation, supply chain security, and incident readiness. Switzerland enacted a mandate requiring critical infrastructure operators to report cyberattacks within 24 hours, joining a growing list of nations enforcing similar reporting obligations.

Australia formally adopted IEC 62443 as the national standard for critical infrastructure cybersecurity, aligning regulatory expectations with global OT security frameworks.

The year concluded with a wave of OT-focused governance initiatives. A coalition of U.S. national security organizations released Principles for the Secure Integration of Artificial Intelligence in Operational Technology, emphasizing secure-by-design deployment, least privilege, and human oversight. The Department of War published Zero Trust for Operational Technology Activities and Outcomes, translating Zero Trust from strategy into actionable guidance for mission-critical environments. CISA followed with Cybersecurity Performance Goals 2.0, introducing governance-focused benchmarks aligned with NIST Cybersecurity Framework 2.0 to help operators assess maturity and guide investment.

Together, these efforts reflect a growing recognition that securing critical infrastructure requires not only better tools, but clearer standards, stronger governance, and architectures designed for resilience rather than recovery alone.

Conclusion

Taken together, the incidents and trends of 2025 point to a common theme: cyber risk is no longer defined by isolated exploits or individual breaches, but by systemic weaknesses in how access, identity, and connectivity are managed. Attackers are increasingly patient, adaptive, and efficient, favoring techniques that exploit trust, reuse legitimate access, and target environments where downtime carries real-world consequences.

Across sectors, familiar patterns repeated themselves. AI lowered the barrier to entry for sophisticated attacks. Legacy VPNs and perimeter defenses struggled to contain modern threats. And critical infrastructure, from healthcare and transportation to energy and telecommunications, continued to feel the impact when digital incidents crossed into physical operations.

At the same time, 2025 also showed progress. Governments moved more decisively on regulation and standards. Vendors tightened controls and acknowledged emerging risks. Organizations increasingly recognized that resilience depends on architecture, not reaction. Security strategies that emphasize least privilege, continuous verification, segmentation, and identity-aware access proved far more effective than patch-driven or perimeter-based approaches alone.

As organizations look ahead, the lesson from 2025 is not that threats are unprecedented, but that the way they succeed is increasingly predictable. Addressing that reality requires moving beyond incremental fixes and toward security models designed for dynamic, interconnected environments. In the years to come, those that prioritize secure access by design will be better positioned to limit disruption, contain incidents, and operate with confidence in an evolving threat landscape.