Skip to main content

THE STATE OF CYBER SECURITY & COMPUTING IN 2025: KEY CHALLENGES AND REAL THREATS

 The technology landscape is evolving fast and so are the threats. From AI-powered attacks to supply chain intrusions, the cyber domain is facing some of its toughest challenges yet. In this post, we'll dig into a few of the most urgent issues in Cybersecurity and computing today, back them with real-world evidence and suggest what individuals and organizations should watch out for.



AI Powered attacks & weaponization of AI 

Attackers are using artificial intelligence to automate and amplify their attacks generating phishing emails, crafting malware and launching social engineering campaigns at scale. Security leaders expect AI-driven threat activity to become a daily occurrence. Deepfake scams and AI voice cloning are increasingly being used to socially engineer employees into granting access or approving transactions. However, traditional detections systems struggle to keep up and organizations must now secure their AI itself protecting training data and locking down models. 



Proliferation of Unpatched & Outdated Software

Many cyberattacks exploit known vulnerabilities in unpatched or outdated software. Studies show about 32% of attacks exploit unpatched vulnerability is public, exploits often follow quickly, making patching critical.



Supply Chain & Third party Risks

Attackers increasingly target vendors and third-party providers that serve many clients, then lift access into their clients environments. High-profile breaches in 2025 affected UK nurseries, Harrods and even Co-op retail operations costing millions in damages and exposing sensitive data.

CNN news side








Identify & Credential Risk: 'Identity as the New Perimeter'.

Stolen credentials remain one of the most common entry points for cyberattacks. Reports show a 42% spike in stolen credentials year-over-year, with RDP being the most common method of lateral movement inside networks. This makes identify-first security and MFA adoption critical to modern defence strategies.


Critical Infrastructure & Nation Scale Attacks

Cyberattacks are increasing targeting critical infrastructure like aviation, energy and transportation networks. Nation-states and organized groups are large-scale attacks with potentially devastating consequences for public safety and national security.

Quantum Threats & Cryptography Obsolescence (Emerging)

Quantum computing, though not yet at scale, poses a risk to current encryption methods (RSA,ECC). Data encrypted today could be harvested and decrypted later when quantum capabilities mature. Organizations are beginning to plane for post- quantum cryptography and crypto-agility.


Comments

Popular posts from this blog

Welcome to my Cyber Security Blog!

       Hello and welcome! I'm Sajinthavi Navarajah, a computing and Engineering student with a strong passion for cyber security and ethical technology. This blog is part of an academic assignment where I explore a critical topic in modern IT: Cyber security. 💡  Why I chose this topic  With the increasing reliance on the internet for education, communication, finance and healthcare, cyber security is no longer optional it's essential. I've witnessed first hand how people lose access to accounts and suffer data breaches due to weak security awareness. This blog is my effort to education and spread practical, research based knowledge about digital safety. 👩  Something about me I enjoy researching technology trends and understanding the deeper"why" behind digital issues. I'm especially interested in ethical hacking and how attackers think because understanding that is key to defending systems. 🚨 What inspires me A friend once lost access to all of her ...

Exploring Cyber Security Research at De- Montfort University.

 Exploring Cyber Security Research at DMU by Sajinthavi Navarajah , Computing and Engineering Student at De Montfort University. As a Computing student at De Montfort University, I've had the opportunity to explore the evolving world of cyber security through high quality research, expert teaching and industry collaboration. DMU has established itself as a leading institution for cyber security research in the UK, and this post aims to highlight the extensive resources and academic excellence available to students like myself . Cyber Technology Institute (CT) At the core of DMU's cyber security research is the Cyber Technology Institute (CT) a nationally recognized center for excellence. the CTI has been designated as an Academic Research (ACE- CSR) by the National Cyber Security Center (NCSC), a division of GCHQ. Key research areas: Malware and threat detection. Digital forensics and incident response Cyber crime and societal impact Industrial and infrastructure security Artif...

Cyber Security Case Study

 Real - World Cyber security case study - The NHS Ransomware attack What happened? In May 2017 , the UK's National Health Service (NHS) was hit by a global ransomware attack known as WannaCry. This cyber security affected over 200,000 computers across 150 countries, including key NHS systems in England and Scotland. The ransomware encrypted files and demanded payment in Bitcoin for access restoration. Many NHS services were disrupted: surgeries were cancelled, ambulances were diverted and sensitive patient data was temporarily inaccessible. Why it mattered Healthcare systems handle sensitive and life-critical data  The NHS was not targeted directly it was affected because it was running outdated Windows systems The attack exposed major weaknesses in legacy infrastructure and incident response planning. What Caused IT? Lack of timely system updates (many systems were running Windows XP) No centralized patch management or vulnerability scanning Insufficient training for staff ...