Network Security

Report: Cybersecurity confidence dips as attack volume grows

The 2025 State of Cyber Security report from Check Point paints a sobering picture: Cybersecurity professionals are losing confidence as the threat landscape grows more aggressive, sophisticated, and persistent.

While technical defenses have advanced, adversaries are evolving faster—exploiting misconfigurations, leveraging AI, and sidestepping traditional defenses with ease. The result is a widening gap between attack sophistication and defensive readiness.

Key findings

The report highlights a 58% surge in infostealer attacks, emphasizing how cybercriminals increasingly favor stealing credentials over brute-force methods. This trend marks a shift in tactics: Rather than seeking immediate access, attackers are building patient, persistent campaigns using stolen credentials and session tokens to quietly infiltrate networks.

Ransomware remains the top threat to businesses, but the tactics have shifted dramatically. Groups are moving away from encryption toward data exfiltration-only extortion (DXF), a quieter, faster method with fewer technical hurdles. This shift has made attacks harder to detect and easier to replicate. Alarmingly, the healthcare sector—previously considered off-limits by some criminal groups—has become the second most targeted industry, underscoring the erosion of even informal “ethical” lines in cybercrime.

In parallel, cloud infrastructure and edge devices are now prime targets. Threat actors are exploiting hybrid networks, leveraging lateral movement between on-premise and cloud environments to bypass segmentation. Vulnerabilities in routers, VPNs, and IoT devices create easy access points, particularly when default configurations or outdated firmware are left unaddressed.

The gathering disinformation storm

Adding to the complexity is the global surge in disinformation campaigns. AI-powered influence operations interfered with one-third of major elections worldwide between late 2023 and early 2024.

These campaigns—backed by nation-states like China, Iran, and Russia—blur the lines between cyber warfare and psychological operations, using deepfakes, bot networks, and social engineering to destabilize democratic institutions and sow mistrust.

Under-resourced and overwhelmed

The report also notes a growing sense of urgency among CISOs and security leaders. Many feel under-resourced and overwhelmed, particularly as attacks grow more targeted and regulatory scrutiny intensifies. Despite law enforcement successes, such as the takedowns of LockBit and ALPHV ransomware groups, the broader ecosystem remains resilient. Dozens of new groups have quickly filled the void, adapting operations and accelerating campaigns with alarming speed.

What’s clear is that conventional security strategies are no longer sufficient. The growing volume and velocity of attacks—combined with evolving threat tactics—demand a renewed focus on visibility, detection speed, and incident response readiness. The report recommends a shift toward proactive security models that leverage threat intelligence, AI-driven detection, and cross-domain integration to close critical gaps.

For security practitioners, the message is clear: 2025 isn’t about preparing for the future of cyber threats—it’s about surviving the present.

An In-Depth Guide to Network Security

Get essential knowledge and practical strategies to fortify your network security.
Bill Brenner

InfoSec content strategist, researcher, director, tech writer, blogger and community builder. Senior Vice President of Audience Content Strategy at CyberRisk Alliance.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms of Use and Privacy Policy.

You can skip this ad in 5 seconds