In this issue:

  • 2025 Cybersecurity: The Top Threats We All Face
  • Cybersecurity shorts
  • Software updates


2025 Cybersecurity: The Top Threats We All Face

As technology evolves, so do cybercriminals' tactics. In 2025, artificial intelligence (AI) will transform the cybersecurity landscape, creating more sophisticated threats that can be harder to detect. Here are the top cybersecurity threats you must watch out for and how to protect yourself.

Ai-powered social engineering: The human touch that isn't human

Imagine receiving an email that sounds exactly like your boss, mentioning your recent project and using their typical writing style. Or getting a phone call from your "bank" where the representative knows details about your recent transactions. In 2025, AI-powered social engineering attacks make these scenarios increasingly common.

These attacks use AI to create compelling communications that mimic real people or organizations. The AI analyzes patterns in language, timing, and personal details to craft messages that are remarkably authentic.

How to protect yourself:

  • Always verify unexpected requests through a different communication channel
  • Be wary of urgent demands, especially those involving money or sensitive information
  • Enable multi-factor authentication on all your accounts
  • Remember that legitimate organizations won't ask for passwords or sensitive details via email or phone

Deepfakes and synthetic media: Seeing isn't always believing

The rise of sophisticated deepfake technology means that fraudsters can now create convincing video and audio of people saying or doing things they never did. These synthetic media tools can make it appear as if a trusted figure is making announcements or requests, potentially leading to fraud or identity theft.

How to protect yourself:

  • Verify important information through official channels, especially for financial requests
  • Be skeptical of video calls or voice messages from unfamiliar sources
  • Use video call passwords and waiting rooms for business meetings
  • Keep your social media privacy settings strict to limit available personal content

AI-enhanced malware: The shape-shifting threat

Traditional malware follows predictable patterns, making it easier to detect. But in 2025, AI-powered malware can adapt its behavior in real-time, making it harder for security software to identify and block. These programs can learn from failed attempts and adjust their tactics accordingly.

How to protect yourself:

  • Keep all software and operating systems updated
  • Use reputable antivirus software with AI detection capabilities
  • Back up important data regularly
  • Avoid downloading software from unofficial sources

Targeted spear-phishing: When attackers know you too well

Unlike traditional phishing that casts a wide net, spear-phishing attacks use AI to gather and analyze your digital footprint, creating highly personalized attacks. These might reference your recent purchases, workplace activities, or personal interests gathered from social media.

How to protect yourself:

  • Regularly review and limit your social media visibility
  • Be cautious of emails that reference personal details or recent activities
  • Use unique, strong passwords for each account
  • Consider using a password manager and email filtering service

Looking forward

While these AI-enhanced threats may seem daunting, maintaining good cybersecurity habits and staying informed can significantly reduce your risk. Remember that technology is just a tool – criminals still rely on human psychology to succeed. By staying vigilant and following basic security practices, you can protect yourself against most cyber threats, even as they become more sophisticated.

Cybersecurity shorts

The Double-Edged Sword: Generative AI's growing role in cybersecurity. Organizations are rapidly integrating generative AI into their security operations to enhance automation and productivity, with applications ranging from intrusion detection to anti-fraud systems. While AI has been present in security tools for over a decade through natural language processing and machine learning, the emergence of generative AI represents a significant leap forward in capabilities and potential applications. However, despite its promising applications in areas like log management and security analysis, cybersecurity professionals and research firms like IDC emphasize the need for cautious implementation as concerns about rapid adoption persist. You can read more about it AI’s role in cybersecurity here.

Navigating cybersecurity policy changes in Trump's second term. The anticipated Trump administration is expected to reject key elements of Biden's 2023 National Cybersecurity Strategy, particularly regarding industry regulation and software company liability measures. However, certain bipartisan cybersecurity priorities are likely to continue, including the "defend forward" operations that protect against foreign cyber threats, as demonstrated during Trump's first term. The urgency of maintaining robust cybersecurity measures is highlighted by recent incidents like the Chinese Salt Typhoon telecom hack, which Deputy National Security Advisor Anne Neuberger confirmed has compromised at least eight U.S. telecommunications carriers, underscoring the persistent nature of cyber threats across administrations.

Senators demand action following major telecom security breach. Senators Ron Wyden (D-OR) and Eric Schmitt (R-MO) have called for an investigation into the Department of Defense's cybersecurity practices following the Chinese "Salt Typhoon" hack that compromised multiple U.S. telecommunications companies. In their bipartisan letter to the DOD Inspector General, the senators criticized the Pentagon's $2.67 billion wireless contracts with major carriers, highlighting the department's failure to use its purchasing power to require stronger cyber defenses from providers. The senators particularly emphasized DOD's continued use of unencrypted communications despite known vulnerabilities, suggesting the department should consider not renewing contracts with carriers unless they implement more robust security measures to protect against foreign surveillance.

Mobile Security Alert: CISA issues critical protection guidelines for high-risk officials. In response to the recent Salt Typhoon telecom breach that affected high-profile targets including President-elect Trump, CISA has released comprehensive mobile security guidelines targeting government and political leadership. The guidance emphasizes the critical importance of end-to-end encrypted messaging apps like Signal and recommends FIDO authentication over traditional SMS-based security measures. While designed for high-value targets, these best practices offer universal protection strategies, including the use of password managers, regular software updates, and platform-specific security features such as iPhone's Lockdown Mode.

Bridging the Cybersecurity Gap: Berkeley study advocates for nonprofit protection. A new UC Berkeley study highlights the critical vulnerability of nonprofit organizations to cyber-attacks, identifying them as the second-most-targeted sector after government agencies, despite having limited resources for cybersecurity. Led by researcher Sarah Powazek at the Berkeley Center for Long-Term Cybersecurity, the study of 68 local nonprofits recommends that local governments extend their cybersecurity resources to protect these organizations, with San Francisco already taking steps to implement this approach. The initiative, supported by Craigslist founder Craig Newmark, proposes several solutions including a free cybersecurity helpline, professional consulting services, and internship programs, addressing the concerning statistic that more than half of surveyed nonprofits lack full-time IT staff while facing sophisticated cyber threats that could contribute to an estimated $24 trillion in cybercrime costs by 2027.

Software updates

Adobe: Adobe released 16 security patches this month for Acrobat, Reader, InDesign, and others. You should check your programs for updates but you can learn more here.

Microsoft: Over 70 security holes were patched in this month's Microsoft update. One vulnerability is currently being exploited in the wild. Your devices should prompt you to update automatically. You can learn more about the updates here.