Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    In memoriam: Brands we lost in 2025

    How marketers rank this year’s generative AI image, video tools

    Digiday’s comprehensive guide to what’s in and out for publishers in 2026

    Facebook X (Twitter) Instagram
    • Artificial Intelligence
    • Business Technology
    • Cryptocurrency
    • Gadgets
    • Gaming
    • Health
    • Software and Apps
    • Technology
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Tech AI Verse
    • Home
    • Artificial Intelligence

      AI has become the norm for students. Teachers are playing catch-up.

      December 23, 2025

      Trump signs executive order seeking to ban states from regulating AI companies

      December 13, 2025

      Apple’s AI chief abruptly steps down

      December 3, 2025

      The issue that’s scrambling both parties: From the Politics Desk

      December 3, 2025

      More of Silicon Valley is building on free Chinese AI

      December 1, 2025
    • Business

      Top 10 cloud computing stories of 2025

      December 22, 2025

      Saudia Arabia’s STC commits to five-year network upgrade programme with Ericsson

      December 18, 2025

      Zeroday Cloud hacking event awards $320,0000 for 11 zero days

      December 18, 2025

      Amazon: Ongoing cryptomining campaign uses hacked AWS accounts

      December 18, 2025

      Want to back up your iPhone securely without paying the Apple tax? There’s a hack for that, but it isn’t for everyone… yet

      December 16, 2025
    • Crypto

      HBAR Faces a 31% Breakdown Risk — Dip Buying Tries to Push Back

      December 29, 2025

      Ethereum Staking Entry Queue Surpasses Exit Queue After 3 Months — What’s Next for ETH?

      December 29, 2025

      3 Gold Market Signals That Suggest Bitcoin’s Price May Be Near a Bottom

      December 29, 2025

      3 Token Unlocks to Watch This Week

      December 29, 2025

      XRP at a Critical Juncture as On-Chain Data and Charts Tell Different Stories

      December 29, 2025
    • Technology

      In memoriam: Brands we lost in 2025

      December 29, 2025

      How marketers rank this year’s generative AI image, video tools

      December 29, 2025

      Digiday’s comprehensive guide to what’s in and out for publishers in 2026

      December 29, 2025

      How to watch the Sony Afeela CES 2026 press conference

      December 29, 2025

      The best iPhone accessories for 2026

      December 29, 2025
    • Others
      • Gadgets
      • Gaming
      • Health
      • Software and Apps
    Check BMI
    Tech AI Verse
    You are at:Home»Technology»Top 10 cyber security stories of 2025
    Technology

    Top 10 cyber security stories of 2025

    TechAiVerseBy TechAiVerseDecember 29, 2025No Comments8 Mins Read0 Views
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    Top 10 cyber security stories of 2025
    Share
    Facebook Twitter LinkedIn Pinterest WhatsApp Email

    Top 10 cyber security stories of 2025

    Artificial intelligence (AI) may have dominated wider tech headlines this year – and this held true in the cyber world as well – but at the same time, the security community’s concerns extend far beyond the risk implications of fully autonomous technology, as Computer Weekly’s annual top 10 round-up reflects.

    Five years after Covid-19, it’s fair to say that the pandemic remade security, turning it from a specialist subject into something on which everyone has an opinion, and some of the biggest themes to emerge from the dark days of lockdown – remote work and supply chain security – remained talking points in 2025, too.

    Another leitmotif was the emergence of quantum computing, and specifically the threat it poses to encryption, while in the US, radical shifts in policy under a new presidential administration had big ramifications for the industry.

    Here are Computer Weekly’s top 10 cyber security stories of 2025.

    1. US indicts five in fake North Korean IT contractor scandal

    We start with one of the more curious and long-running stories of the past year, the scandal surrounding North Korean operatives who obtained remote IT contractor positions with US companies to generate funds for the isolated regime. Towards the end of January, the US Department of Justice (DoJ) announced the indictment of five men – two North Koreans, a Mexican and two American citizens – in the case.

    The prevalence of remote workers, especially since the Covid-19 pandemic, has made virtual job interviews a fact of life, and despite even more organisations issuing return to office (RTO) orders, many continue to hire for fully remote positions where their employees may rarely, if ever, physically meet. Threat actors have been quick to spot this gaping loophole in enterprise security, and human resources departments have been scrambling to respond.

    2. NCSC proposes three-step plan to move to quantum-safe encryption

    The growth in speculation around the potential of quantum computing and its impact on the security world was a huge topic of conversation this year. In March, the UK’s National Cyber Security Centre (NCSC) published guidance to help support organisations as they get ready for quantum.

    While its possibilities appear fantastic, in the medium term the dawn of quantum computing will render current encryption methods used to protect sensitive data obsolete, and the race is now on to develop effective post-quantum cryptography, or PQC. According to the NCSC, organisations should already be planning for PQC, ahead of technical upgrades in the early 2030s. The cyber agency wants the UK’s most at-risk organisations to have fully migrated to PQC by 2035 at the latest.

    3. NHS asks suppliers to sign up to cyber covenant

    Supply chain security has become a fixture in the cyber world over the past few years, and the topic still dominated headlines in 2025. In May, the NHS’s digital chiefs wrote to their suppliers asking them to sign up to a cyber covenant.

    The NHS has a long and troubled history of cyber attacks and data breaches – with attacks on partners such as OneAdvanced and Synnovis disrupting services and demonstrating the supply chain risks faced by healthcare organisations. The health service asked suppliers to commit to higher standards around supporting and patching systems, deploy multifactor authentication (MFA), always-on cyber monitoring and critical infrastructure logging, and immutable backups, among other things.

    4. US cyber agency CISA faces stiff budget cuts

    Even though it was established during his first administration, the US Cybersecurity and Infrastructure Security Agency (CISA) was not immune to the deep and sweeping cuts enacted by president Donald Trump as his second term kicked into high gear.

    With longstanding officials ousted, budget cuts abounding, and threats to the long-running CVE programme that identifies and classifies dangerous vulnerabilities, the US cyber establishment was rocked to the core in 2025, with knock-on effects spreading beyond America’s borders.

    5. Brits clinging to Windows 10 face heightened risk, says NCSC

    With Microsoft’s longest-lived operating system, Windows 10, finally falling out of support in October, there were warnings for users across the UK during the summer of 2025 – prepare to upgrade now, or put your security at risk.

    The NCSC’s chief technology officer, Ollie Whitehouse, said that not upgrading was akin to “incurring a debt at a high interest with the threat of forced repayment at a later date” as he implored organisations to upgrade their PC estates. The agency warned that, in addition to the difficulties users will see from being out of support, outdated and now unpatched Windows 10 systems will be prime targets for threat actors – harking back to the WannaCry incident in 2017, which exploited unpatched versions of Windows XP.

    6. UK government to bring in ransomware payment ban

    The UK government made progress on its Cyber Security and Resilience Bill in 2025, and was finally able to lay it before Parliament in November. Ahead of this, the usual round of consultations, debates and evidence-gathering sessions took place, and in July, the Home Office announced that a legal ban on making ransomware payments – covering hospitals and other public health bodies, public sector organisations such as councils and schools, and operators of critical national infrastructure (CNI), including datacentres – would be included.

    Enacting a ransomware payment ban has broad support nationally – the majority of responses to a consultation on the matter supported it – but the subject remains a controversial one, with some sceptical that the ban will make critical UK organisations less attractive targets for cyber criminals and may actually make it harder for some to recover if and when they get hit.

    7. Attacker could defeat Dell firmware flaws with a vegetable

    The annual Black Hat cyber fair in Las Vegas brings together security professionals and hackers of all kinds, and always throws up a few oddities. This year, Cisco Talos researchers revealed a series of vulnerabilities – dubbed ReVault – affecting the security firmware and associated application programming interfaces (APIs) in Dell laptops.

    During the course of their research, the Talos team discovered that if a vulnerable system was configured to accept a biometric fingerprint login, it was possible to tamper with the firmware so that the fingerprint reader would accept a non-human physical input. In what was surely a first for the security industry, the researchers posted a video online in which they defeated a laptop’s biometric security measures using a spring onion.

    8. Microsoft starts including PQC algorithms in cyber foundations

    Back in the quantum realm, two years after the debut of its Quantum Safe Programme (QSP), Microsoft reported steady progress on incorporating PQC algorithms into some of the foundational components underpinning the security of its product suite in August.

    For a tech company as ubiquitous as Microsoft, quantum security is a non-negotiable – getting it wrong could lead to disaster – so Redmond wants to move fast and hopes to have its core services secured before the end of the 2020s. Its overall strategy rests on three core pillars: updating Microsoft’s own and third-party services, supply chain and ecosystem to be quantum-safe; supporting its customers, partners and ecosystems in this goal; and promoting global research, standards and services around quantum security.

    9. US government shutdown stalls cyber intel sharing

    In October, political chaos in Washington DC overflowed into the security realm when the federal government was forced to shut down after temporary funding measures failed to get through a deeply divided Congress. Unfortunately, this stalled progress on extending or replacing an Obama-era threat data sharing law, CISA 2015, which expired at the end of September.

    CISA 2015 set out a framework for information sharing and offered liability protections to organisations sharing threat data and cyber intelligence in the public interest. Experts feared its absence would not only hurt collaboration between the public and private sectors, but also reduce the US’s ability to act as an effective counterweight to cyber criminals and other threat actors on the world stage. Although CISA 2015 has now been extended, the possibility of another shutdown in early 2026 could cause this story to rear its head again very soon.

    10. Cyber agencies co-sign Exchange Server security guide

    Security professionals need only look at the monthly Patch Tuesday alerts to see how Microsoft’s technological dominance puts it at the centre of so many cyber security stories, and the firm frequently comes in for flak from those who think it is not doing enough to fulfil its security obligations. Such voices were in full flood at the end of 2025 when the Australian, Canadian and American cyber intelligence agencies took the step of co-signing an emergency alert and issuing a guide to securing Microsoft Exchange server instances, a key vector in many of history’s most impactful cyber incidents.

    The document laid out several proactive protection techniques to be applied to on-premise Exchange Servers as part of hybrid environments, and the Americans described it as a “critical resource” for Microsoft users. But one observer, a former White House cyber policy expert, said that the fact a multilateral coalition felt obligated to produce such a resource was a “devastating commentary on Microsoft’s security posture”.

    Share. Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Telegram Email
    Previous ArticleTop 10 Post Office scandal stories of 2025
    Next Article Ubisoft is rolling back Rainbow Six Siege servers after being forced to shut them down
    TechAiVerse
    • Website

    Jonathan is a tech enthusiast and the mind behind Tech AI Verse. With a passion for artificial intelligence, consumer tech, and emerging innovations, he deliver clear, insightful content to keep readers informed. From cutting-edge gadgets to AI advancements and cryptocurrency trends, Jonathan breaks down complex topics to make technology accessible to all.

    Related Posts

    In memoriam: Brands we lost in 2025

    December 29, 2025

    How marketers rank this year’s generative AI image, video tools

    December 29, 2025

    Digiday’s comprehensive guide to what’s in and out for publishers in 2026

    December 29, 2025
    Leave A Reply Cancel Reply

    Top Posts

    Ping, You’ve Got Whale: AI detection system alerts ships of whales in their path

    April 22, 2025556 Views

    Lumo vs. Duck AI: Which AI is Better for Your Privacy?

    July 31, 2025203 Views

    6.7 Cummins Lifter Failure: What Years Are Affected (And Possible Fixes)

    April 14, 2025104 Views

    6 Best MagSafe Phone Grips (2025), Tested and Reviewed

    April 6, 202592 Views
    Don't Miss
    Technology December 29, 2025

    In memoriam: Brands we lost in 2025

    In memoriam: Brands we lost in 2025 By Digiday Editors  •  December 29, 2025  •…

    How marketers rank this year’s generative AI image, video tools

    Digiday’s comprehensive guide to what’s in and out for publishers in 2026

    How game storytelling needs to be done differently in VR

    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    About Us
    About Us

    Welcome to Tech AI Verse, your go-to destination for everything technology! We bring you the latest news, trends, and insights from the ever-evolving world of tech. Our coverage spans across global technology industry updates, artificial intelligence advancements, machine learning ethics, and automation innovations. Stay connected with us as we explore the limitless possibilities of technology!

    Facebook X (Twitter) Pinterest YouTube WhatsApp
    Our Picks

    In memoriam: Brands we lost in 2025

    December 29, 20250 Views

    How marketers rank this year’s generative AI image, video tools

    December 29, 20250 Views

    Digiday’s comprehensive guide to what’s in and out for publishers in 2026

    December 29, 20250 Views
    Most Popular

    What to Know and Where to Find Apple Intelligence Summaries on iPhone

    March 12, 20250 Views

    A Team of Female Founders Is Launching Cloud Security Tech That Could Overhaul AI Protection

    March 12, 20250 Views

    Senua’s Saga: Hellblade 2 leads BAFTA Game Awards 2025 nominations

    March 12, 20250 Views
    © 2025 TechAiVerse. Designed by Divya Tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms & Conditions

    Type above and press Enter to search. Press Esc to cancel.