
Security Intelligence
The future of cybersecurity is notoriously hard to predict. After all, every aspect of the industry changes continuously. Cyber threats evolve and the tools that defend against them mirror those changes, evolving in their own right to better defend increasingly complex networks.
We’ve explored how cybersecurity has changed in past years, threats to keep an eye on, and security trends small businesses should watch for. Now it’s time to look further ahead.
In this blog, our experienced analysts share their thoughts on the future of cybersecurity.
Certain cyberattack tactics are bound to stick around—and that’s because they've proven to work. As such, these are the threats that our experts believe still pose a serious cybersecurity risk.
The malware threat continued to evolve in 2024, becoming more pervasive and specialized. As the number of threat actors increased, so did the frequency, scope, and sophistication of malware attacks.
A key shift was the growing adoption of modular malware designs, enabling threat actors to adapt attacks to new environments and targets quickly. At the forefront of this trend was the rise of malware-as-a-service (MaaS) platforms. These platforms have significantly lowered the skill barrier for launching advanced attacks, allowing even inexperienced cybercriminals to deploy devastating malware.
For instance, the Redline Stealer MaaS, available on dark web forums, enables attackers to extract credentials and payment information from infected systems. With that information, the hacking opportunities are endless.
Download a copy of the 2025 State of Cybersecurity eBook for an even closer look at:
This commoditization of malware lowers the barrier to entry for cybercriminal activities, requiring better security measures and user education to defend against such threats. Organizations need to adopt behavior-based detection and response tools to counteract increasingly undetectable malware variants.
We mentioned social engineering last year and it stands true still. Since social engineering relies on human error, it can effectively target even well-secured organizations, making it a persistent and challenging threat to mitigate.
Users can and will continue making mistakes that lead to data loss. We’ll continue to see social engineering and phishing attacks, but we’ll likely see more complexity there as social engineers make greater use of AI and similar technologies.
After all, social engineering requires crafting messages and sending legitimate-sounding emails that lure victims into clicking on a link. Instead of the typical “password reset” or “mailbox full” scams, AI will allow threat actors to become more sophisticated with their messages.
Our cybersecurity analysts continuously research, investigate, and uncover emerging threats and attack tactics. Here are some key cybersecurity trends we've observed recently that we may continue to see.
Advanced persistent threats (APTs) are highly sophisticated, well-funded groups—often state-sponsored—that target specific organizations or sectors to gather intelligence or disrupt operations.
In 2024, APTs demonstrated an increased use of proximity-based and infrastructure-specific attack methods. For instance, the "nearest neighbor attack" saw APT 28 breaching Wi-Fi networks by targeting devices physically close to their high-value targets. This physical closeness allowed the attackers to bypass certain technical security measures, essentially focusing on exploiting an environmental vulnerability.
Organizations should consider non-digital attack vectors and implement zero-trust architectures that extend to physical environments. This approach will be especially critical in sectors such as energy, finance, and government.
In 2024, Field Effect reported on a new adversary-in-the-middle (AiTM) attack which allowed threat actors to intercept and manipulate communications between two parties, often without detection, to capture credentials and session tokens.
This interception allowed attackers to bypass multi-factor authentication and gain unauthorized access to accounts.
During our investigation, we identified a campaign where attackers used Axios-based lookalike M365 login pages to harvest credentials. Victims were directed to these fraudulent pages, which proxied authentication requests, capturing passwords and MFA codes. The attackers then used the Axios HTTP client to log into M365 accounts, effectively bypassing MFA.
Additionally, the rise of platforms like the Mamba MFA Phishing Kit, a phishing-as-a-service tool, made it easier for cybercriminals to replicate AiTM attacks. For a small subscription fee, threat actors could capture authentication tokens, circumvent MFA, and compromise M365 accounts.
The cyber insurance market has faced many challenges, most notably the difficulty of assessing and pricing cyber risk due to the lack of historical data, the dynamic and evolving nature of cyber threats, and the potential for systemic and catastrophic losses.
To ease this burden, we expect cyber insurance providers to require or incentivize their clients to undergo cybersecurity assessments as part of the underwriting process or the policy conditions. This could help the insurers evaluate the risk profile and premium of the clients, and provide recommendations and guidance for improving their cybersecurity.
These assessments can demonstrate a client’s compliance with the cyber insurance policy requirements or lower their premiums by showing their security maturity and use of best practices.
In 2024, attackers shifted their initial access focus from endpoint devices to critical network infrastructure, such as routers, firewalls, and VPN gateways.
There are a couple of reasons that this might be the case:
The ArcaneDoor campaign, in which state-sponsored cyber actors targeted perimeter network devices from several vendors, is just one example of this increase. Targeting edge devices such as firewalls, switches, and routers are popular among threat actors seeking initial access to targets of interest.
Control of these devices could allow threat actors to monitor and reroute traffic, obtain credentials that could provide access to more sensitive systems and accounts, or launch Adversary-in-the-Middle attacks.
Armed with The 2025 Employee Cybersecurity Handbook, your team can be a strong first line of defense.
Threat actors know this, and we expect to see an increase in the targeting of these services, especially those handling high-value data that can be used for extortion or to facilitate financial fraud.
We can’t talk about 2024, 2025, and beyond without highlighting AI.
It has been a huge year for artificial intelligence with tools like ChatGPT and DALL E enjoying more mainstream use with integrations into powerhouse ecosystems like Microsoft’s Copilot.
It's clear that threat actors use AI in their cyberattacks, but defenders rely on this new technology too. Here are just a few ways AI is improving cybersecurity for the future:
AI models, built from vast amounts of data, will help to identify patterns and anomalies associated with cyber threats. Learning from this and historical attack information, AI will help to detect new quickly and precisely.
Defenders will use AI to study user and system behavior and establish baselines. Deviations from these baselines will help trigger cybersecurity alerts, detecting potentially malicious behavior earlier than before.
AI models will predict potential vulnerabilities and attack vectors. By analyzing historical data, they will forecast emerging threats and recommend proactive security measures. These predictive analytics will aid in the prioritization of patch management and vulnerability assessments.
Field Effect MDR combines sophisticated technology and a team of cybersecurity experts to detect and respond to known and unknown cyber threats, keeping you safe from tomorrow's attacks today.
NLP-based AI systems that analyze textual data such as emails, chat logs, and social media will help identify phishing attempts, malicious URLs, and suspicious content. This data will then be used to improve email filtering tools, DNS firewall products, and user awareness materials.
AI-driven authentication systems will assess user behavior during login attempts. If the behavior deviates from what's considered the norm, this will trigger additional authentication steps, enhancing security without causing inconvenience to legitimate users.
AI will help identify zero-day vulnerabilities by analyzing code and system behavior, learning from known vulnerabilities and predicting potential weaknesses. We expect AI-driven efficiencies in quality assurance testing to help discover and remediate vulnerabilities before software is released.
It’s tricky to look at the calendar and predict what the future holds, especially in an industry as complex and fast-paced as cybersecurity. That said, we see the same patterns again and again. If threat actors are finding success by doing things one way, they’ll continue to.
Take the time now to build up your cybersecurity knowledge to set your business up for lasting success as changes arise and new threats emerge.
Find out what’s in store for cybersecurity—including emerging trends, insights, and predictions from the experts at Field Effect—in our eBook, The State of Cybersecurity: Your Guide to this Year and Beyond.