{"id":7828,"date":"2025-12-12T16:43:28","date_gmt":"2025-12-12T15:43:28","guid":{"rendered":"https:\/\/www.opensight.nl\/blog\/cybersecurity-review-2025-the-most-important-developments\/"},"modified":"2025-12-22T07:17:49","modified_gmt":"2025-12-22T06:17:49","slug":"cybersecurity-review-2025-the-most-important-developments","status":"publish","type":"post","link":"https:\/\/www.opensight.nl\/en\/blog\/cybersecurity-review-2025-the-most-important-developments\/","title":{"rendered":"Cybersecurity review 2025: the most important developments"},"content":{"rendered":"<div class=\"wp-bootstrap-blocks-container container mb-2\">\n\t\n\n<div style=\"height:56px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<div class=\"wp-bootstrap-blocks-row row justify-content-center\">\n\t\n\n<div class=\"col-12 col-md-10\">\n\t\t\t\n\n<p>The year 2025 saw a rise in the level of professionalism of cyber threats. Attackers combined social manipulation, identity theft, cloud access and AI-driven automation to cause damage more quickly and in a more targeted way. Such developments necessitate greater visibility, stricter access control and clear frameworks for the use of technology.  <\/p>\n\n\n\n<p>Below is a brief overview of the most significant trends. You can read the full analysis in our white paper <em>Cybersecurity review 2025.<\/em> <\/p>\n\n\n\r\n<div class=\"indiv-block download-button-v2 is-preview\">\r\n  <button class=\"btn btn-custom\" data-bs-toggle=\"collapse\" data-bs-target=\"#collapseDownloadP8yoYHYH\">Download whitepaper<\/button>\r\n  <input type=\"hidden\" class=\"file-data w-100\" value='[{&quot;file&quot;:7847}]' \/>\r\n  <input type=\"hidden\" class=\"mail-title w-100\" value='Hier is de Cybersecurity Terugblik 2025' \/>\r\n  <input type=\"hidden\" class=\"mail-text w-100\" value='&lt;p data-start=&quot;441&quot; data-end=&quot;578&quot;&gt;Thank you for your interest in our white paper &lt;em data-start=&quot;486&quot; data-end=&quot;516&quot;&gt;&lt;a href=&quot;http:\/\/opensight.nl\/c\/mail\/terugblik2025\/&quot;&gt;Cybersecurity Review 2025.&lt;\/a&gt;&lt;\/em&gt;&lt;br data-start=&quot;517&quot; data-end=&quot;520&quot;&gt;As requested, please find the PDF attached.&lt;\/p&gt;\n&lt;p data-start=&quot;580&quot; data-end=&quot;953&quot;&gt;This white paper offers a concise and clear overview of the key cyber developments in 2025. These include social phishing, attacks on the manufacturing industry, the impact of generative AI and a shift towards identity- and cloud-focused threats. These insights are designed to help you evaluate your digital resilience and make informed decisions. &lt;\/p&gt;\n&lt;p data-start=&quot;955&quot; data-end=&quot;1077&quot;&gt;Please do not hesitate to contact us if you have any questions or require further clarification regarding the white paper.&lt;\/p&gt;\n&lt;p data-start=&quot;1079&quot; data-end=&quot;1118&quot;&gt;Kind regards,&lt;br data-start=&quot;1102&quot; data-end=&quot;1105&quot;&gt;&lt;strong data-start=&quot;1105&quot; data-end=&quot;1118&quot;&gt;OpenSight&lt;\/strong&gt;&lt;\/p&gt;\n' \/>\r\n\r\n  <div class=\"collapse\" id=\"collapseDownloadP8yoYHYH\">\r\n    <div class=\"form-wrapper mt-3\">\r\n      <form action=\"https:\/\/www.opensight.nl\/en\/wp-json\/ws-form\/v1\/submit\" class=\"wsf-form wsf-form-canvas\" id=\"ws-form-1\" data-id=\"20\" method=\"POST\" data-instance-id=\"1\"><\/form>    <\/div>\r\n  <\/div>\r\n<\/div>\n\n\n<div style=\"height:56px\" aria-hidden=\"true\" class=\"wp-block-spacer d-none d-lg-block\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">Social phishing as the main route for attackers<\/h3>\n\n\n\n<p>Social engineering has shifted from email to a combination of telephone, chat, and remote support. Attackers now use convincing stories and legitimate tools to gain access without using malware. This makes behavioral and identity-based detection more important than ever.  <\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Manufacturing companies increasingly targeted<\/h3>\n\n\n\n<p>Attacks on industrial organizations and their supply chains led to disruptions in production processes. The speed with which attackers move within networks necessitates a strict separation between IT and OT and clear chain agreements. <\/p>\n\n\t<\/div>\n\n\n\n<div class=\"col-12 col-md-6\">\n\t\t\t\t<\/div>\n\n<\/div>\n\n\n\n<div style=\"height:56px\" aria-hidden=\"true\" class=\"wp-block-spacer d-none d-lg-block\"><\/div>\n\n\n<div class=\"wp-bootstrap-blocks-row row justify-content-center\">\n\t\n\n<div class=\"col-12 col-md-12 col-lg-5\">\n\t\t\t<div class=\"h-100 d-flex flex-column justify-content-center\">\n\t\t\t\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"533\" src=\"https:\/\/www.opensight.nl\/content\/cybersecurity-recap-2025.webp\" alt=\"\" class=\"wp-image-7770\" srcset=\"https:\/\/www.opensight.nl\/content\/cybersecurity-recap-2025.webp 800w, https:\/\/www.opensight.nl\/content\/cybersecurity-recap-2025-300x200.webp 300w, https:\/\/www.opensight.nl\/content\/cybersecurity-recap-2025-768x512.webp 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/figure>\n\n\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\"col-12 col-md-12 col-lg-6 offset-lg-1\">\n\t\t\t\n\n<h3 class=\"wp-block-heading\">Explosive growth of Generative AI<\/h3>\n\n\n\n<p>The massive deployment of AI by companies has created new risks, such as uncontrolled data flows and shadow AI. Meanwhile, attackers are using the same technology to refine social engineering and automate processes. Effective governance and technical oversight are therefore essential.  <\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Identity and the cloud central targets in modern attacks<\/h3>\n\n\n\n<p>Many attacks began with valid accounts or misuse of cloud management tools. Strong authentication, least privilege, and visibility into cloud activities are crucial components of an effective defense. <\/p>\n\n\t<\/div>\n\n<\/div>\n\n\n\n<div style=\"height:56px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<\/div>\n<div class=\"wp-bootstrap-blocks-container container mb-2\">\n\t\n\n<div style=\"height:56px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<div class=\"wp-bootstrap-blocks-row row justify-content-center\">\n\t\n\n<div class=\"col-12 col-md-10\">\n\t\t\t\n\n<h3 class=\"wp-block-heading\">Why this matters to organizations<\/h3>\n\n\n\n<p>The 2025 cybersecurity landscape has been shaped by human behaviour, identity management, segmentation, and the controlled use of AI. OpenSight helps organizations put these principles into practice by identifying risks and translating the right measures into everyday routines. <\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Download the full white paper<\/h3>\n\n\n\n<p>Would you like to receive the complete analysis, including recommendations and practical examples?<\/p>\n\n\n\r\n<div class=\"indiv-block download-button-v2 is-preview\">\r\n  <button class=\"btn btn-custom\" data-bs-toggle=\"collapse\" data-bs-target=\"#collapseDownloadSufJl4vE\">Download whitepaper<\/button>\r\n  <input type=\"hidden\" class=\"file-data w-100\" value='[{&quot;file&quot;:7847}]' \/>\r\n  <input type=\"hidden\" class=\"mail-title w-100\" value='Hier is de Cybersecurity Terugblik 2025' \/>\r\n  <input type=\"hidden\" class=\"mail-text w-100\" value='&lt;p data-start=&quot;441&quot; data-end=&quot;578&quot;&gt;Thank you for your interest in our white paper &lt;em data-start=&quot;486&quot; data-end=&quot;516&quot;&gt;&lt;a href=&quot;http:\/\/opensight.nl\/c\/mail\/terugblik2025\/&quot;&gt;Cybersecurity Review 2025.&lt;\/a&gt;&lt;\/em&gt;&lt;br data-start=&quot;517&quot; data-end=&quot;520&quot;&gt;As requested, please find the PDF attached.&lt;\/p&gt;\n&lt;p data-start=&quot;580&quot; data-end=&quot;953&quot;&gt;This white paper offers a concise and clear overview of the key cyber developments in 2025. These include social phishing, attacks on the manufacturing industry, the impact of generative AI and a shift towards identity- and cloud-focused threats. These insights are designed to help you evaluate your digital resilience and make informed decisions. &lt;\/p&gt;\n&lt;p data-start=&quot;955&quot; data-end=&quot;1077&quot;&gt;Please do not hesitate to contact us if you have any questions or require further clarification regarding the white paper.&lt;\/p&gt;\n&lt;p data-start=&quot;1079&quot; data-end=&quot;1118&quot;&gt;Kind regards,&lt;br data-start=&quot;1102&quot; data-end=&quot;1105&quot;&gt;&lt;strong data-start=&quot;1105&quot; data-end=&quot;1118&quot;&gt;OpenSight&lt;\/strong&gt;&lt;\/p&gt;\n' \/>\r\n\r\n  <div class=\"collapse\" id=\"collapseDownloadSufJl4vE\">\r\n    <div class=\"form-wrapper mt-3\">\r\n      <form action=\"https:\/\/www.opensight.nl\/en\/wp-json\/ws-form\/v1\/submit\" class=\"wsf-form wsf-form-canvas\" id=\"ws-form-2\" data-id=\"20\" method=\"POST\" data-instance-id=\"2\"><\/form>    <\/div>\r\n  <\/div>\r\n<\/div>\n\t<\/div>\n\n\n\n<div class=\"col-12 col-md-6\">\n\t\t\t\t<\/div>\n\n<\/div>\n\n\n\n<div style=\"height:56px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Discover the key trends in cybersecurity in 2025, from social phishing to AI and cloud risks. Read the article and download the full white paper for in-depth insight. <\/p>\n","protected":false},"author":9,"featured_media":7769,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_seopress_robots_primary_cat":"20","_seopress_titles_title":"Cybersecurity terugblik 2025: belangrijkste trends en inzichten","_seopress_titles_desc":"Ontdek de kerntrends in cybersecurity in 2025, van social phishing tot AI en cloudrisico\u2019s. Lees het artikel en download de volledige whitepaper voor diepgaand inzicht.","_seopress_robots_index":"","footnotes":""},"categories":[45,14],"tags":[46,47],"class_list":["post-7828","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-current","category-security-en","tag-cyber-security","tag-cyber-security-en"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.opensight.nl\/en\/wp-json\/wp\/v2\/posts\/7828","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.opensight.nl\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.opensight.nl\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.opensight.nl\/en\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.opensight.nl\/en\/wp-json\/wp\/v2\/comments?post=7828"}],"version-history":[{"count":4,"href":"https:\/\/www.opensight.nl\/en\/wp-json\/wp\/v2\/posts\/7828\/revisions"}],"predecessor-version":[{"id":7849,"href":"https:\/\/www.opensight.nl\/en\/wp-json\/wp\/v2\/posts\/7828\/revisions\/7849"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.opensight.nl\/en\/wp-json\/wp\/v2\/media\/7769"}],"wp:attachment":[{"href":"https:\/\/www.opensight.nl\/en\/wp-json\/wp\/v2\/media?parent=7828"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.opensight.nl\/en\/wp-json\/wp\/v2\/categories?post=7828"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.opensight.nl\/en\/wp-json\/wp\/v2\/tags?post=7828"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}