Check Point Software's 2025 Security Report Reveals 44% Surge in Cyber-Attacks and Growing AI Threats

2 Sources

Share

Check Point Software's annual report highlights a significant increase in cyber-attacks, the rising role of AI in cybercrime, and provides key insights for cybersecurity professionals to navigate the evolving threat landscape.

News article

Alarming Increase in Cyber-Attacks

Check Point Software Technologies Ltd., a global leader in cybersecurity solutions, has released its annual report, "The State of Global Cyber Security 2025," revealing a startling 44% increase in global cyber-attacks year-over-year

1

2

. This significant surge underscores the rapidly evolving nature of cyber threats and the pressing need for enhanced security measures across industries.

The Rising Role of AI in Cybercrime

The report highlights 2024 as a pivotal year marked by the increasing use of generative AI (GenAI) in cyber-attacks. Threat actors leveraged GenAI for various malicious purposes, including:

  1. Accelerating cyber-attacks
  2. Stealing money
  3. Influencing public opinion through disinformation campaigns
  4. Creating deepfake videos

This trend signals a new era in cybersecurity challenges, where AI-powered threats require equally sophisticated defense mechanisms

1

2

.

Key Findings and Trends

  1. Infostealer Attacks: A 58% surge in Infostealer attacks was observed, indicating a maturing cyber ecosystem

    1

    2

    .

  2. Personal Device Vulnerabilities: Over 70% of infected devices were personal, highlighting the risks associated with bring-your-own-device (BYOD) environments in corporate settings

    1

    2

    .

  3. Evolving Cyber Warfare: Nation-states are shifting from acute attacks to chronic campaigns aimed at eroding trust and destabilizing systems. AI-powered disinformation and influence campaigns targeted one-third of global elections between September 2023 and February 2024

    2

    .

  4. Ransomware Tactics Shift: Data exfiltration and extortion have overtaken encryption-based attacks as the primary ransomware tactic, simplifying operations and maximizing payouts

    2

    .

  5. Healthcare Industry at Risk: The healthcare sector became the second most targeted industry, experiencing a 47% increase in attacks year-over-year

    2

    .

  6. Device Exploitation: Compromised routers, VPNs, and other edge devices served as key entry points for attackers, with over 200,000 devices controlled by advanced botnets like Raptor Train

    2

    .

Recommendations for CISOs

Check Point Software's report offers actionable guidance for Chief Information Security Officers (CISOs) to navigate the changing landscape:

  1. Strengthen BYOD Security: Implement strict policies and deploy endpoint protection to mitigate risks from personal devices accessing corporate resources

    2

    .

  2. Leverage AI-driven Threat Intelligence: Utilize AI-powered tools to monitor and preempt disinformation campaigns and emerging threats

    2

    .

  3. Prioritize Patch Management: Address known vulnerabilities proactively to limit exposure to widespread exploits

    2

    .

  4. Secure Edge Devices: Implement robust security measures for routers, VPNs, and IoT devices to prevent them from becoming operational relay boxes for attackers

    2

    .

  5. Focus on Resilience: Prepare for persistent threats with comprehensive incident response plans and continuous monitoring

    2

    .

Industry Impact and Future Outlook

Maya Horowitz, VP of Research at Check Point Software, emphasized the broader implications of these findings: "Cyber security in 2025 is not only about protecting networks; it's about safeguarding trust in our systems and institutions"

1

2

. This statement underscores the critical role of cybersecurity in maintaining the integrity of digital infrastructure and societal trust.

As cyber threats continue to evolve, the cybersecurity industry faces the ongoing challenge of staying ahead of sophisticated attackers. The integration of AI in both offensive and defensive strategies is likely to shape the future of cybersecurity, requiring continuous innovation and adaptation from security professionals and organizations alike.

TheOutpost.ai

Your Daily Dose of Curated AI News

Don’t drown in AI news. We cut through the noise - filtering, ranking and summarizing the most important AI news, breakthroughs and research daily. Spend less time searching for the latest in AI and get straight to action.

© 2025 Triveous Technologies Private Limited
Instagram logo
LinkedIn logo