6 Threat Intelligence Outlooks and Strategies for 2025

From Geopolitics to AI, 6 Key Threat Intelligence Trends for CISOs in 2025

As threat actors continually adopt new tactics — using everything from generative AI to popular SaaS applications to e-skimmer kits — CISOs and their teams need the latest and most in-depth threat intelligence to stay one step ahead. Explore Recorded Future’s top threat intelligence outlooks for 2025, as well as research and strategies to help you see threats before they disrupt your business.

Key Statistics

Outlook #1: Expanding the cyber battlefield will put infrastructure at risk.

Cyber attacks are becoming the weapon of choice for disrupting (or threatening disruption) in rival nations even outside of conflict zones. This not only impacts critical infrastructure directly, but also could lead to secondary disruptions at organizations that depend on that infrastructure.

Real-world threats:

Priority actions:

CISOs must understand how geopolitical events affect their security posture to manage risk and communicate with their boards effectively.

Outlook #2: SaaS will make it easier to weaponize stolen credentials.

Cybercriminals are increasingly targeting interconnected software-as-a-service (SaaS) applications to gain access to enterprise ecosystems. With the average organization now using approximately 371 SaaS apps, and with 77% of SaaS app attacks beginning with stolen credentials, it’s essential to prioritize identity security.

Credentials are frequently stolen by information-stealing malware, or infostealers, that are built to target a variety of operating systems and mobile devices. Per Recorded Future research, credential theft per device has risen 25% since 2021, increasing the risk of unlocking valuable corporate assets or credential stuffing attacks.

Real-world threats:

Priority actions:

Outlook #3: Generative AI will transform social engineering.

The reported 1,265% increase in phishing attacks between Q4 2022 and November 2023 has been attributed to the public release of LLMs like ChatGPT. Spear phishing attacks have become more dangerous now that threat actors can use generative AI to quickly create highly targeted and convincing messages as well as deepfake phone calls and videos (TechTarget).

In addition to phishing, the increasing availability of sophisticated faceswap and other deepfake technology means more threat actors will be able to produce believable impersonations of company executives, celebrities, and political figures, pulling off increasingly costly scams.

Real-world threats:

Priority actions:

Outlook #4: Regulatory demands and AI capabilities will push demand for safer code.

New regulations in both the US and EU are pushing software companies to prioritize security. One of the last Biden-era cyber executive orders requires software vendors selling to the US federal government to verify they are using secure software development practices. Meanwhile, the EU amended liability laws seek to hold software companies accountable for harm caused by their products.

Real-world threats:

Priority actions:

Outlook #5: Card fraud in 2025: digital deception will evolve.

Card fraud is a global, professional ecosystem where cybercriminals specialize in compromising and monetizing payment data through sophisticated digital channels. Attackers are shifting to more nuanced digital strategies that exploit authentication vulnerabilities and create seamless fraud infrastructure.

Real-world threats:

Priority actions:

Outlook #6: High-profile executives will be increasingly targeted.

With broad authority over their organizations’ data, IP, and money, senior business executives have become major targets of digital threats, cyberattacks, and privacy invasions. In fact, according to a survey of IT and cybersecurity professionals, 72% of senior executives in the US were targeted at least once in the 18 months prior to May 2024.

Real-world threats:

Priority actions: