By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
TechgoonduTechgoonduTechgoondu
  • Audio-visual
  • Enterprise
    • Software
    • Cybersecurity
  • Gaming
  • Imaging
  • Internet
  • Media
  • Mobile
    • Cellphones
    • Tablets
  • PC
  • Telecom
Search
© 2023 Goondu Media Pte Ltd. All Rights Reserved.
Reading: Disinformation, AI-powered attacks among cybersecurity trends to watch in 2025
Share
Font ResizerAa
TechgoonduTechgoondu
Font ResizerAa
  • Audio-visual
  • Enterprise
  • Gaming
  • Imaging
  • Internet
  • Media
  • Mobile
  • PC
  • Telecom
Search
  • Audio-visual
  • Enterprise
    • Software
    • Cybersecurity
  • Gaming
  • Imaging
  • Internet
  • Media
  • Mobile
    • Cellphones
    • Tablets
  • PC
  • Telecom
Follow US
© 2023 Goondu Media Pte Ltd. All Rights Reserved.
Techgoondu > Blog > Cybersecurity > Disinformation, AI-powered attacks among cybersecurity trends to watch in 2025
CybersecurityEnterprise

Disinformation, AI-powered attacks among cybersecurity trends to watch in 2025

Ai Lei Tao
Last updated: January 2, 2025 at 3:05 PM
Ai Lei Tao
Published: January 2, 2025
10 Min Read
SHARE
ILLUSTRATION: Getty Images via Unsplash

As cybersecurity threats grow in scale and sophistication, the way that businesses have to respond to them to protect their operations is also morphing rapidly.

In 2025, high-profile ransomware attacks, the proliferation of disinformation, and AI-powered cyber threats are expected to reshape the priorities of enterprise IT teams.

Understanding these cybersecurity trends is the first step towards a tougher posture against new threats. In the new year, experts say there needs to be a renewed focus on cyber-resiliency, disinformation security, and robust zero-trust security frameworks.

Zero-trust becomes a fundamental necessity

A zero-trust framework for cybersecurity has long been touted as the way forward, and in 2025, it will exit its buzzword era and become a cornerstone of cybersecurity strategies, said John Engates, field chief technology officer of Cloudflare, which offers improved performance and security for websites.

Operating on the principle of “never trust, always verify,” a zero-trust setup treats every digital interaction as a potential threat, requiring continuous validation.

“This methodology has become even more essential as traditional network boundaries disintegrate in our cloud-native, distributed work environments,” said Engates.

“We are entering an era where AI systems will battle AI systems, with human security teams orchestrating strategies to maintain the upper hand,” he noted.

“This shift underscores the need for continuous innovation in AI-driven security solutions, as static defenses become increasingly inadequate,” he added. 

AI will be a problem and a solution

“Attacks using Generative AI, in particular deepfakes are proving to be a major challenge for Asean organisations,” said Steven Scheurmann, regional vice-president for Asean for Palo Alto Networks, a cybersecurity firm.

“This, combined with the increased speed, scale and sophistication of threats will force ASEAN organisations to modernise their cybersecurity postures with a centralised, AI-driven, scalable, cloud-based approach, in 2025,” he predicted.

While AI presents transformative opportunities in cybersecurity, it also empowers threat actors with new tools for malicious purposes. They are likely to use AI to conduct more targeted reconnaissance, better identify vulnerabilities in systems, said Thio Tse Gan, Deloitte’s Southeast Asia cyber defence and resilience leader. 

AI will allow threat actors to bypass defences with greater precision, as they create adaptive malware more effectively, enhance their phishing attempts and produce convincing deepfakes. However, AI-powered threats are not limited to external attacks. 

“When organisations increasingly adopt AI models to aid in decision-making, criminals can also launch data poisoning attacks which degrade and manipulate these models into making warped decisions,” said Thio.

On the other hand, AI can be used in tools to improve security processes, monitoring, and risk management. These include using gen AI for data masking, incident response and automated policy generation to optimise cybersecurity responses, added Thio.

Rise of quantum computing

The rise of quantum computing can enable stronger encryption methods, but can also present serious risks by potentially rendering today’s encryption standards, including public key infrastructure, obsolete. 

“[Quantum computing] is expected to be able to break today’s encryption in minutes,” said Yee May Leong, managing director of Equinix Singapore. 

“Nation-state actors are already harvesting encrypted sensitive data with the intention to decrypt it later when the technology is available, in so-called “harvest now, decrypt later” attacks,” she added.

Governments and cybersecurity authorities are beginning to respond. The U.S. National Institute of Standards and Technology (NIST) has issued post-quantum cryptography standards, and Singapore’s Cyber Security Agency will release guidelines starting in 2025 to help organisations prepare for quantum-enabled threats to current and stolen data, said Deloitte’s Thio.

Deloitte predicts that the number of companies working on implementing post-quantum cryptography solutions is expected to quadruple in 2025 compared with 2023, along with spending expected to quadruple.

Data protection becomes critical to cybersecurity strategies

The question for organisations is not “if” but “when” they will be attacked. This inevitability is pushing cybersecurity strategies in 2025 towards protecting data, ensuring swift recovery when breaches occur, said Matthew Oostveen, chief technology officer for Asia-Pacific and Japan at storage vendor Pure Storage.

“Proactive investment in advanced cybersecurity measures and recovery strategies will be crucial for survival in the face of these evolving threats,” he noted.

“Having a data protection strategy gives organisations a means of resuming business operations quickly in the event of an attack,” he added.

Phishing kits will get trickier

Phishing continues to be an effective method for identity-based attacks, but the tactics are becoming more advanced, said Brett Winterford, regional chief security officer, Asia-Pacific & Japan, Okta, which provides identity management services.

In 2025, phishing kits — virtual toolboxes of resources designed to make attacks much easier to launch and repeat, will evolve to make phishing even harder to detect, such as bypassing geographic location flags using residential proxies to mimic real user’s location.

To combat such tactics, Winterford suggests that organisations adopt phishing-resistant authentication and block requests from anonymising services.

Networks connect and now protect

As more devices and services get more interconnected, the risk and sophistication of attacks become greater, pushing the need for advanced and automated, machine-scale cybersecurity, said Tay Bee Kheng, president for Asean at network equipment maker Cisco.  

An example of the sophistication of threats is how social engineering attacks have become more accessible because of the vast data that people share online with different platforms.

Supply chain attacks also pose a problem, given the complicated web of technology suppliers that many businesses use in their operations. Quantum computing will introduce potential vulnerabilities that can render traditional encryption methods obsolete.

These factors highlight the need for cybersecurity systems that operate at machine scale, and are able to defend against advanced, high-speed threats, said Tay.

“The network will emerge as a crucial pillar in managing workloads and serving as both the first and last line of security defence,” she noted.

“This will become increasingly important as attackers conduct lateral movement attacks where they use one entry point to infiltrate the rest of the network to penetrate deeper into organisational systems,” she added.

Financial cyber threats shift to smartphones

Traditional financial malware targeting PCs is declining, but financial cyberthreats on mobile devices are surging, said Adrian Hia, managing director for APAC at cybersecurity vendor Kaspersky.

Resilience against these threats will require predictive analytics, continuous monitoring and a zero-trust mindset to safeguard critical data and operations, he added.

AI agents introduce cyber resilience and new risks

The emerging agentic AI market will transform cybersecurity, automating threat detection while enhancing the speed of response and resilience, said Arvind Nithrakashyap, co-founder and chief technology officer, Rubrik, a data security vendor.

For cloud-first organisations, agentic AI offers the opportunity to scale computing power and storage capacity to train and deploy complex AI models, to increase productivity, better customer experiences, and secure cloud applications.

However, agentic AI will also introduce new security vulnerabilities and potential data leaks. 

“Savvy business and IT leaders will not let these challenges hold them back from adopting agentic AI but establish guardrails, set up stringent data access policies, and clearly communicate organisational best practices,” said Nithrakashyap.

Legacy systems become a cybercrime goldmine

The increasing integration between IT, IoT, and operational technology (OT) devices is expanding the threat landscape. Strategic custom malware – such as those for perimeter devices – has become a threat to critical infrastructure, said Daniel dos Santos, head of research at Forescout Research’s Vedere Labs. 

Many legacy OT systems remain unmanaged and exposed, especially in sectors like water management, he noted. 

Once these vulnerabilities are breached, they can serve as a gateway to broader critical infrastructure, amplifying the potential impact of an attack, he added.

The ongoing Russia-Ukraine conflict, he pointed out, underscores the urgency for proactive vulnerability management to safeguard these systems against exploitation.

Hijacking supply chains with “invisible” firmware threats

Nation-state actors are increasingly turning to firmware-level supply chain attacks, embedding malicious code during the manufacturing process to create “invisible” threats that bridge the gap between cyber and physical warfare. 

The recent compromise of communication devices by Israel demonstrates how firmware-level threats can have real-world impact, said Rik Ferguson, vice president of security intelligence, Forescout.

“Traditional defenses, including Software Bill of Materials (SBOMs), often fail to provide the necessary visibility and detection capabilities for these sophisticated implants,” he noted.

“As IoT adoption accelerates, the risks associated with supply chain compromises grow exponentially,” he added. Securing every step of the production and distribution process is becoming imperative.”

Worried about cost, Southeast Asian organisations turn to Java alternatives
Tibbr customers: Building a social enterprise
Q&A: Data centres need better cooling for Southeast Asia AI boom, says Vertiv
Q&A: Against new online threats, strengthen defence perimeter and boost cyber hygiene education, says NTT
Vostro 5460 promises to be Dell’s thinnest and lightest 14-inch laptop
TAGGED:AI agentsAseancybersecurity trendsgenerative AIoperational technologyphishing kitsquantum computingsupply chain

Sign up for the TG newsletter

Never miss anything again. Get the latest news and analysis in your inbox.

By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Whatsapp Whatsapp LinkedIn Copy Link Print
Avatar photo
ByAi Lei Tao
Ai Lei is a writer who has covered the technology scene for more than 20 years. She was previously the editor of Asia Computer Weekly (ACW), the only regional IT weekly in Asia. She has also written for TechTarget's ComputerWeekly, and was editor of CMPnetAsia and Associate Editor at Computerworld Singapore.
Previous Article At decades-old Singapore facility, Micron continues to assemble flash memory modules
Next Article CES 2025: Goodbye XPS laptops as Dell rebrands PCs, monitors in big revamp
Leave a Comment

Leave a ReplyCancel reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Stay Connected

FacebookLike
XFollow

Latest News

Scammers are so successful they even accidentally scam themselves now
Cybersecurity Internet
June 10, 2025
Doom: The Dark Ages review: Future fantastic demon slaying
Gaming
June 10, 2025
Plaud NotePin review: Note-taking made easy with AI
Internet Mobile
June 9, 2025
Can smart grocery carts, biometric payments boost retailers like FairPrice?
Enterprise Internet
June 6, 2025

Techgoondu.com is published by Goondu Media Pte Ltd, a company registered and based in Singapore.

.

Started in June 2008 by technology journalists and ex-journalists in Singapore who share a common love for all things geeky and digital, the site now includes segments on personal computing, enterprise IT and Internet culture.

banner banner
Everyday DIY
PC needs fixing? Get your hands on with the latest tech tips
READ ON
banner banner
Leaders Q&A
What tomorrow looks like to those at the leading edge today
FIND OUT
banner banner
Advertise with us
Discover unique access and impact with TG custom content
SHOW ME

 

 

POWERED BY READYSPACE
The Techgoondu website is powered by and managed by Readyspace Web Hosting.

TechgoonduTechgoondu
© 2024 Goondu Media Pte Ltd. All Rights Reserved | Privacy | Terms of Use | Advertise | About Us | Contact
Join Us!
Never miss anything again. Get the latest news and analysis in your inbox.

Zero spam, Unsubscribe at any time.
 

Loading Comments...
 

    Welcome Back!

    Sign in to your account

    Username or Email Address
    Password

    Lost your password?