Menu
Blog Header shape Blog Header shape

Crowdstrike’s Global Threat report 2025

Commvault has announced that the Commvault Cloud Platform can be easily deployed from large cloud marketplaces using CIS-hardened images.
Download report

Our technology partner Crowdstrike annually publishes the Global Threat Report, which provides insight into key cybersecurity trends and developments. The 2025 report also provides essential insights and clear recommendations for an effective cybersecurity strategy.

This year, some notable trends have been identified:

Breakout time at historic low: The average time it takes attackers to move laterally within a network has decreased to a mere 48 minutes. In fact, the fastest breakout recorded was just 51 seconds.

Voice phishing is skyrocketing: Cybercriminals are increasingly using telephone contact to trick victims with convincing social engineering techniques. Between the first and second half of 2024, this form of cybercrime grew by a whopping 442%.

Growth of initial access as a service: Attacks aimed at gaining initial access have increased significantly. This now accounts for 52% of the vulnerabilities Crowdstrike observed last year. Cybercriminals are increasingly offering initial access ‘as a service’, with an annual increase in ads of around 50%.

Increase in China-nexus cyber activity: Cyber attacks from China-related threat actors increased by 150% on average. Specific industries faced 200% to 300% more attacks.

Deployment of generative AI in cyber attacks: Generative AI technologies were actively deployed for advanced attacks and disinformation campaigns by China-, Russia- and Iran-linked threat actors, among others. For example, highly convincing fake job applicants were created to penetrate organizations.

Crowdstrike offers 5 specific recommendations in the report:

  1. Secure your entire identity ecosystem: use phishing-resistant MFA solutions such as hardware security keys.
  2. Eliminate cross-domain gaps: deploy next-gen XDR and SIEM solutions to strengthen detection and response capabilities.
  3. Protect your cloud infrastructure: deploy CNAPP solutions and implement strict access control and regular audits.
  4. Prioritise vulnerabilities strategically: Patch and upgrade systems regularly and use tools like Falcon Exposure Management.
  5. Use threat intelligence effectively: Know who your attackers are, how they operate, and adjust your security strategy accordingly.

Download the full Crowdstrike Global Threat Report 2025 at the bottom of this page.

Deze website maakt gebruik van cookies

Er worden cookies gebruikt om functionaliteiten op de website mogelijk te maken, statistieken bij te houden, gebruikersvoorkeuren op te slaan en voor marketingdoeleinden.

Bekijk hier onze privacyverklaring
ALLES ACCEPTEREN
ALLES WEIGEREN
WIJZIGEN

Deze cookies zijn noodzakelijk om de website te laten functioneren en kunnen daarom niet worden uitgeschakeld.

Deze cookies verzamelen anonieme data waarmee we statistieken kunnen analyseren en de website kunnen verbeteren.

Deze cookies bewaren persoonlijke voorkeuren zoals taal of regio om het gedrag en design van de website op af te stemmen.

Deze cookies maken het mogelijk om (gepersonaliseerde) advertenties te tonen.

OPSLAAN