Property & Casualty

Emerging Cyber Risks in 2025

Emerging Cyber Risks in 2025

The cybersecurity landscape continuously and rapidly evolves, presenting organizations with new and sophisticated challenges. Here are the top four emerging cyber risks as of January 2025.

1. AI-Powered Cyberattacks

Cybercriminals are increasingly leveraging artificial intelligence (AI) to enhance the sophistication and effectiveness of their attacks. AI enables the automation of complex tasks, making it easier to execute large-scale phishing campaigns, develop adaptive malware and conduct real-time network intrusions. This evolution results in more personalized and convincing social engineering attacks and malware capable of evading traditional security measures.1

2. Advanced Ransomware Tactics

Ransomware continues to evolve, with attackers employing more aggressive and targeted strategies. Recent trends include “double extortion,” where attackers encrypt data and exfiltrate sensitive information, threatening to publish it unless the ransom is paid. Additionally, ransomware-as-a-service (RaaS) models have lowered the barrier to entry, enabling less-skilled cybercriminals to launch sophisticated attacks.2

3. Supply Chain Vulnerabilities

As organizations integrate third-party services and software into their operations, the risk of supply chain attacks has grown. Cyber adversaries exploit vulnerabilities in suppliers’ systems to infiltrate larger targets, often bypassing traditional security defenses. These attacks can lead to widespread disruptions and data breaches, as seen in notable incidents involving software providers.3

4. Internet of Things (IoT) Security Risks

The proliferation of Internet of Things (IoT) devices expands the attack surface for cyber threats. Many IoT devices lack robust security features, making them attractive targets for attackers seeking to create botnets, disrupt services or gain unauthorized access to networks. The increasing interconnectivity of these devices amplifies the potential impact of security breaches.4

Organizations must adopt proactive and adaptive cybersecurity strategies to address these emerging risks.

*The Internet of Things (IoT) refers to a network of physical devices—such as sensors, appliances, vehicles, and industrial machines—that are connected to the internet and can collect, share, and analyze data. These devices communicate with each other and with central systems, enabling automation, remote monitoring, and smarter decision-making.

Cyber Team