{"id":6341,"date":"2025-04-01T19:28:15","date_gmt":"2025-04-01T17:28:15","guid":{"rendered":"https:\/\/opensight.indivontwikkelt.nl\/blog\/crowdstrikes-global-threat-report-2025\/"},"modified":"2025-04-03T10:40:46","modified_gmt":"2025-04-03T08:40:46","slug":"crowdstrikes-global-threat-report-2025","status":"publish","type":"post","link":"https:\/\/opensight.indivontwikkelt.nl\/en\/blog\/crowdstrikes-global-threat-report-2025\/","title":{"rendered":"Crowdstrike&#8217;s Global Threat report 2025"},"content":{"rendered":"<div class=\"wp-bootstrap-blocks-container container mb-2\">\n\t\n\n<div style=\"height:56px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<div class=\"wp-bootstrap-blocks-row row justify-content-center\">\n\t\n\n<div class=\"col-12 col-md-10\">\n\t\t\t\n\n<p>Our technology partner Crowdstrike annually publishes the Global Threat Report, which provides insight into key cybersecurity trends and developments. The 2025 report also provides essential insights and clear recommendations for an effective cybersecurity strategy. <\/p>\n\n\n\n<h2 class=\"wp-block-heading\">This year, some notable trends have been identified: <\/h2>\n\n\n\n<p><strong>Breakout time at historic low: <\/strong>The average time it takes attackers to move laterally within a network has decreased to a mere 48 minutes. In fact, the fastest breakout recorded was just 51 seconds. <\/p>\n\n\n\n<p><strong>Voice phishing is skyrocketing:<\/strong> Cybercriminals are increasingly using telephone contact to trick victims with convincing social engineering techniques. Between the first and second half of 2024, this form of cybercrime grew by a whopping 442%. <\/p>\n\n\n\n<p><strong>Growth of initial access as a service: <\/strong>Attacks aimed at gaining initial access have increased significantly. This now accounts for 52% of the vulnerabilities Crowdstrike observed last year. Cybercriminals are increasingly offering initial access &#8216;as a service&#8217;, with an annual increase in ads of around 50%.  <\/p>\n\n\n\n<p><strong>Increase in China-nexus cyber activity:<\/strong> Cyber attacks from China-related threat actors increased by 150% on average. Specific industries faced 200% to 300% more attacks. <\/p>\n\n\n\n<p><strong>Deployment of generative AI in cyber attacks:<\/strong> Generative AI technologies were actively deployed for advanced attacks and disinformation campaigns by China-, Russia- and Iran-linked threat actors, among others. For example, highly convincing fake job applicants were created to penetrate organizations. <\/p>\n\n\t<\/div>\n\n\n\n<div class=\"col-12 col-md-6\">\n\t\t\t\t<\/div>\n\n<\/div>\n\n\n\n<div style=\"height:56px\" aria-hidden=\"true\" class=\"wp-block-spacer d-none d-lg-block\"><\/div>\n\n\n<div class=\"wp-bootstrap-blocks-row row justify-content-center\">\n\t\n\n<div class=\"col-12 col-md-12 col-lg-5\">\n\t\t\t<div class=\"h-100 d-flex flex-column justify-content-center\">\n\t\t\t\n\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-1 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"667\" height=\"500\" data-id=\"6307\" src=\"https:\/\/opensight.indivontwikkelt.nl\/content\/crowdstrike_header-1-edited.png\" alt=\"\" class=\"wp-image-6307\" srcset=\"https:\/\/opensight.indivontwikkelt.nl\/content\/crowdstrike_header-1-edited.png 667w, https:\/\/opensight.indivontwikkelt.nl\/content\/crowdstrike_header-1-edited-300x225.png 300w\" sizes=\"auto, (max-width: 667px) 100vw, 667px\" \/><\/figure>\n<\/figure>\n\n\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\"col-12 col-md-12 col-lg-6 offset-lg-1\">\n\t\t\t\n\n<p>Crowdstrike offers 5 specific recommendations in the report: <\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Secure your entire identity ecosystem:<\/strong> use phishing-resistant MFA solutions such as hardware security keys.<\/li>\n\n\n\n<li><strong>Eliminate cross-domain gaps:<\/strong> deploy next-gen XDR and SIEM solutions to strengthen detection and response capabilities.<\/li>\n\n\n\n<li><strong>Protect your cloud infrastructure:<\/strong> deploy CNAPP solutions and implement strict access control and regular audits.<\/li>\n\n\n\n<li><strong>Prioritise vulnerabilities strategically: <\/strong>Patch and upgrade systems regularly and use tools like Falcon Exposure Management.<\/li>\n\n\n\n<li><strong>Use threat intelligence effectively: <\/strong>Know who your attackers are, how they operate, and adjust your security strategy accordingly.<\/li>\n<\/ol>\n\n\n\n<p>Download the full Crowdstrike Global Threat Report 2025 at the bottom of this page. <\/p>\n\n\t<\/div>\n\n<\/div>\n\n<\/div>\n<div class=\"wp-bootstrap-blocks-container container mb-2\">\n\t\n\n<div style=\"height:56px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<div class=\"wp-bootstrap-blocks-row row justify-content-center\">\n\t\n\n<div class=\"col-12 col-md-6\">\n\t\t\t\t<\/div>\n\n\n\n<div class=\"col-12 col-md-6\">\n\t\t\t\t<\/div>\n\n<\/div>\n\n\n\n<div style=\"height:56px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Commvault has announced that the Commvault Cloud Platform can be easily deployed from large cloud marketplaces using CIS-hardened images.<\/p>\n","protected":false},"author":11,"featured_media":6317,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_seopress_robots_primary_cat":"20","_seopress_titles_title":"Cyber threats 2025: insights from Crowdstrike's report","_seopress_titles_desc":"Read about the latest attack trends, GenAI threats and cybersecurity advice from the Crowdstrike Global Threat Report 2025.","_seopress_robots_index":"","footnotes":""},"categories":[45,14],"tags":[92,47,46],"class_list":["post-6341","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-current","category-security-en","tag-crowdstrike-en","tag-cyber-security-en","tag-cyber-security"],"acf":[],"_links":{"self":[{"href":"https:\/\/opensight.indivontwikkelt.nl\/en\/wp-json\/wp\/v2\/posts\/6341","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/opensight.indivontwikkelt.nl\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/opensight.indivontwikkelt.nl\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/opensight.indivontwikkelt.nl\/en\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/opensight.indivontwikkelt.nl\/en\/wp-json\/wp\/v2\/comments?post=6341"}],"version-history":[{"count":3,"href":"https:\/\/opensight.indivontwikkelt.nl\/en\/wp-json\/wp\/v2\/posts\/6341\/revisions"}],"predecessor-version":[{"id":6397,"href":"https:\/\/opensight.indivontwikkelt.nl\/en\/wp-json\/wp\/v2\/posts\/6341\/revisions\/6397"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/opensight.indivontwikkelt.nl\/en\/wp-json\/wp\/v2\/media\/6317"}],"wp:attachment":[{"href":"https:\/\/opensight.indivontwikkelt.nl\/en\/wp-json\/wp\/v2\/media?parent=6341"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/opensight.indivontwikkelt.nl\/en\/wp-json\/wp\/v2\/categories?post=6341"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/opensight.indivontwikkelt.nl\/en\/wp-json\/wp\/v2\/tags?post=6341"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}