Understanding the implications of data for cybersecurity defenders

Apr 6, 2026 | Threat Intelligence Research

Evolving Cyber Threats: Insights from Cisco Talos’ 2025 Year in Review

TL;DR
Cisco Talos identifies a notable increase in the speed of attacks, highlighting identity-related threats as a primary focus for attackers. The analysis also emphasizes the risks associated with outdated infrastructure and growing AI capabilities in malicious activities.

Main Analysis
The 2025 Year in Review by Cisco Talos reveals that attackers are not only accelerating their operations but also exploiting both legacy vulnerabilities and newly discovered flaws. The report notes a dramatic rise in the targeting of vulnerabilities like React2Shell, which quickly gained traction shortly after its disclosure. In contrast, older vulnerabilities remain prevalent in the exploit landscape, largely due to organizations’ reliance on outdated systems. This dual approach indicates that while attackers harness innovative strategies, they continue to capitalize on known weaknesses that are easier to exploit, reflecting a concerning trend in the threat landscape.

Identity has emerged as a primary target in cyber operations, with a significant increase in fraudulent device registrations tied to social engineering tactics such as vishing. Attackers specifically focus on administrator-level accounts, allowing them to gain extensive access with less effort compared to breaching user accounts. The usage of internal phishing tactics further complicates defenses. Organizations must develop stronger monitoring capabilities to detect abnormal user activities, such as unusual email patterns or access to sensitive data.

The integration of AI in attack methodologies has transformed the speed and efficiency of threat actors. AI not only automates established attack techniques but also accelerates the development cycle of sophisticated malware. The risks associated with AI are becoming evident, prompting organizations to implement protective measures around its use in their operations. Early examples of AI-enhanced malware also indicate a worrying trend in mobile environments, signaling that existing defenses must adapt quickly to this evolving threat landscape.

Defensive Context
Organizations, particularly those managing critical infrastructure or sensitive data, should be particularly vigilant. The growing utilization of identity attacks and the persistent exploitation of outdated devices pose substantial operational risks. Those who rely on legacy systems or have not prioritized comprehensive identity management are at increased risk.

Why This Matters
The real-world risk is pronounced for enterprises with aging infrastructure or inadequate identity governance. Organizations that do not prioritize patching or upgrading their systems may find themselves increasingly vulnerable, especially given that many attacks exploit long-known flaws as well as emerging threats.

Defender Considerations
Organizations should focus on enhancing visibility into user behaviors and strengthening identity management protocols. They need mechanisms that promote continuous monitoring for abnormal actions and adaptive risk management in real-time.

Environment Exposure
The threat landscape presented is relevant for any organization reliant on digital systems, particularly those utilizing legacy applications or infrastructure. Exploitation of identity systems and unpatched devices is likely to occur when organizations lack comprehensive oversight and timely upgrades.

Click here for the full article

Try our Intelligence today!

Streamline your security operations with a free Q-Feeds trial and see the difference.

Other articles