{"id":450083,"date":"2025-12-26T13:24:40","date_gmt":"2025-12-26T10:24:40","guid":{"rendered":"https:\/\/menatech.net\/en\/?p=450083"},"modified":"2025-12-30T19:17:38","modified_gmt":"2025-12-30T16:17:38","slug":"2025-year-in-review-cybersecurity","status":"publish","type":"post","link":"https:\/\/menatech.net\/en\/2025-year-in-review-cybersecurity\/","title":{"rendered":"2025 Year in Review: Cybersecurity"},"content":{"rendered":"<p>&nbsp;<\/p>\n<p>Individual breaches or isolated incidents are no longer the defining feature of the cybersecurity landscape in 2025. Now, systemic risk is front and center. As governments, cities, and enterprises deepen their reliance on interconnected digital infrastructure, the consequences of failure have become far more visible and far more disruptive.<\/p>\n<p>From ransomware crippling public services to the growing concentration of core internet functions within a handful of platforms, today\u2019s threat landscape extends beyond traditional security concerns. It raises questions about resilience, redundancy, and governance at a global scale. The incidents that defined this year illustrate how cybersecurity has evolved into a matter of societal stability, not just technical defense.<\/p>\n<h2><span style=\"font-weight: 400;\">Infrastructure Is Under Attack<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">A concerning trend has emerged in recent years, marked by a rise in cyberattacks on critical infrastructure worldwide. As more cities depend on connected, digital systems to manage essential functions, they expose themselves to malicious actors who can target infrastructure, causing significant damage and potentially transforming this into an offensive strategy in conflicts.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In August 2025, the U.S. city of Saint Paul, Minnesota, experienced a ransomware attack that disabled its systems. The attack lasted nearly two weeks and mainly targeted public buildings. Meanwhile, across the Atlantic, a more serious threat affected a dam in Norway, allowing attackers to take control and open its floodgates. The dam was used for fish farming, so the incident caused only minor damage, but it raised serious security concerns.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Internet Centralization<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">On October 20th, users worldwide experienced one of the most significant internet outages in recent memory. Many of the world\u2019s biggest services were either offline or facing serious performance issues for most of the day. The outage was resolved within the same day, but it raised many questions about how such a large-scale problem could happen.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Soon, the fog lifted when AWS identified a problem with a DNS management service as the cause.\u00a0By then, Amazon was already working to fix the root of the issue to prevent similar incidents in the future. Still, the outage sparked many discussions about software centralization and the importance of redundancy in critical services.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Ransomware Getting Worse<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Modern attacks are increasingly combining traditional ransomware encryption with data exfiltration and public extortion. In the first half of 2025 alone, more than half of cyber incidents in the Middle East involved extortion and data theft. A notable incident occurred in April 2025, when Marks &amp; Spencer warned that a ransomware breach had disrupted its operations and likely resulted in the theft of customer data, with estimated losses of around \u00a3300 million.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">What\u2019s new is the \u201cdouble-extortion\u201d pattern \u2014 attackers encrypt files\u00a0<\/span><b>and<\/b><span style=\"font-weight: 400;\">\u00a0threaten to publish stolen data, turning the victim\u2019s reputation and compliance risks into additional pressure. Cyber defenders now must guard against not only system encryption but also unseen data exfiltration paths and the risk of public disclosure.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; Individual breaches or isolated incidents are no longer the defining feature of the cybersecurity landscape in 2025. Now, systemic risk is front and center. As governments, cities, and enterprises deepen their reliance on interconnected digital infrastructure, the consequences of failure have become far more visible and far more disruptive. From ransomware crippling public services [&hellip;]<\/p>\n","protected":false},"author":254,"featured_media":450084,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":[],"meta":{"_acf_changed":false,"_breakdance_hide_in_design_set":false,"_breakdance_tags":"","footnotes":""},"categories":[29330],"tags":[29380,29444],"audience-intent":[],"content-types":[],"country":[],"entity":[],"persona":[],"class_list":["post-450083","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-business","tag-cybersecurity","tag-year-in-review"],"acf":[],"_links":{"self":[{"href":"https:\/\/menatech.net\/en\/wp-json\/wp\/v2\/posts\/450083","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/menatech.net\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/menatech.net\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/menatech.net\/en\/wp-json\/wp\/v2\/users\/254"}],"replies":[{"embeddable":true,"href":"https:\/\/menatech.net\/en\/wp-json\/wp\/v2\/comments?post=450083"}],"version-history":[{"count":0,"href":"https:\/\/menatech.net\/en\/wp-json\/wp\/v2\/posts\/450083\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/menatech.net\/en\/wp-json\/wp\/v2\/media\/450084"}],"wp:attachment":[{"href":"https:\/\/menatech.net\/en\/wp-json\/wp\/v2\/media?parent=450083"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/menatech.net\/en\/wp-json\/wp\/v2\/categories?post=450083"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/menatech.net\/en\/wp-json\/wp\/v2\/tags?post=450083"},{"taxonomy":"audience-intent","embeddable":true,"href":"https:\/\/menatech.net\/en\/wp-json\/wp\/v2\/audience-intent?post=450083"},{"taxonomy":"content-types","embeddable":true,"href":"https:\/\/menatech.net\/en\/wp-json\/wp\/v2\/content-types?post=450083"},{"taxonomy":"country","embeddable":true,"href":"https:\/\/menatech.net\/en\/wp-json\/wp\/v2\/country?post=450083"},{"taxonomy":"entity","embeddable":true,"href":"https:\/\/menatech.net\/en\/wp-json\/wp\/v2\/entity?post=450083"},{"taxonomy":"format","embeddable":true,"href":"https:\/\/menatech.net\/en\/wp-json\/wp\/v2\/format?post=450083"},{"taxonomy":"persona","embeddable":true,"href":"https:\/\/menatech.net\/en\/wp-json\/wp\/v2\/persona?post=450083"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}