
Cyberthreat predictions for 2025 from Barracuda’s security frontline
Predicting the future isn’t easy, but you can anticipate what is likely to happen by looking at how things have evolved over the past year. This year again, Barracuda asked colleagues who work on the security frontlines about the things they witnessed in 2024 and expect to see in 2025.
According to their insight, 2025 will be the year when:
- Threat actors will invest more time and resources in evading or disabling security measures. They will leverage novel, complex, and sophisticated techniques, such as the endpoint detection ‘EDR killer’ and advanced phishing methods.
- More attacks will feature multiple approaches. There will be a rise in multichannel, multistage attacks. This will include attacks that infiltrate one platform, such as email, messaging, or collaboration platforms, and then expand laterally to others. More attacks will leverage vulnerabilities in interconnected devices and exploit identity-based vulnerabilities.
- AI-powered attacks will continue to evolve, making attacks increasingly personalized, faster, and harder to detect. They will use automation to execute large-scale attacks and target vulnerabilities in software and systems across organizations.
- Organizations will worry most about the “unknown” — undetected security gaps, new attack methods, accidental supply chain threats, or an attack occurring without their knowledge — as threat actors increasingly leverage novel tools and techniques to help them breach systems, exfiltrate data, or compromise infrastructure without triggering any immediate alarms.
What most surprised you in 2024 that will shape the cybersecurity landscape in 2025?





What is the biggest cybersecurity concern on customers’ and partners’ minds as we approach 2025?


ER: The unknown. For example, not knowing where their security gaps are until it's too late. Organizations are doing the right thing by investing in cybersecurity platforms. The challenge then becomes knowing what your organization has out there that needs protecting. They need a complete, updated asset inventory to ensure all devices have endpoint security deployed. Unprotected devices connected to the network are prime targets for attackers. Ensuring full coverage of cybersecurity controls is crucial to a successful cybersecurity program.
SH: Evolving phishing threats and the effectiveness of their current defenses. They are also increasingly concerned with the convergence of cyberthreats across email, messaging, and collaboration platforms. Threat vectors now span multiple communication channels.
YB: Managing the constant increase in data while dealing with increasingly sophisticated attacks. Many organizations struggle to keep up with complex threats due to limited staff or expertise.
JC: In one word: TRUST. Security incidents resulting from human error highlight the need to optimize a cybersecurity strategy based on zero-trust architectures. Customers and partners are becoming more cautious about the security measures implemented by their supply chain and the risks inherent in the daily behavior of their employees.
How do you expect cyberthreats to evolve in 2025?
ER: I expect threat actors to be even more persistent. In the past we would see threat actors disengage when encountering a security control preventing them from pressing forward. I now expect threat actors to continue to focus on developing tactics to attempt to bypass security measures, and the advancement of AI will certainly help facilitate threat actors in these efforts.
SH: We expect to see an uptick in multichannel, multistage attacks, where threat actors infiltrate one platform, such as email, and expand laterally to others. Expect more attacks targeting IoT and remote work infrastructure, leveraging vulnerabilities in interconnected devices. Additionally, attackers may increasingly exploit identity-based vulnerabilities.
MK: In 2025, we expect to see more AI-driven cyberthreats designed to evade detection, including more advanced evasion techniques bypassing endpoint detection and response (EDR), known as EDR killers, and traditional defenses. Attackers may use legitimate applications like PowerShell and remote access tools to deploy ransomware, making detection harder for standard security solutions. AI-enhanced threats will take many forms, from phishing emails generated with flawless grammar and personal details to highly adaptive malware that can learn and evade detection systems.
YB: Cybersecurity is an ongoing struggle, where each new, sophisticated attack is met with ever-evolving solutions designed to detect and protect against them.
In 2025, we can expect cyberthreats to become even more targeted, adaptive, and automated. Attacks will likely be orchestrated at scale, with AI enabling attackers to create diversions and carry out highly automated and sophisticated operations. A major concern for organizations will be the fear that an attack could occur without their knowledge — threat actors may breach systems, exfiltrate data, or compromise infrastructure without triggering any immediate alarms.
JC: I believe cybercriminals will leverage AI- and machine learning-based attacks to target vectors in ever more tailored and faster ways, making it easier to bypass traditional security measures, and using automation to execute large-scale attacks more efficiently, targeting vulnerabilities in software and systems across organizations.
Cybercriminals may use hijacked IoT devices to build larger botnets, leading to more significant distributed denial-of-service (DDoS) attacks.
We are likely to see governments responding to increasing cyberthreats with new regulations and demanding stricter compliance from organizations. This may create challenges for businesses trying to keep up with the changing landscape.
ML: Cyberthreats will become more automated and evasive, leveraging AI to bypass traditional defenses. Attacks on critical infrastructure and cloud services will likely increase, demanding more robust resilience measures.
MC: In 2025, we can expect a rise in targeted attacks on critical infrastructure and small-to-medium enterprises, which often lack the robust security resources of larger organizations. Cybercriminals will likely continue exploiting vulnerabilities in outdated systems and supply chains, making it crucial for companies to invest in stronger, more adaptive security frameworks.

The Ransomware Insights Report 2025
Key findings about the experience and impact of ransomware on organizations worldwide
Subscribe to the Barracuda Blog.
Sign up to receive threat spotlights, industry commentary, and more.

Managed Vulnerability Security: Faster remediation, fewer risks, easier compliance
See how easy it can be to find the vulnerabilities cybercriminals want to exploit