When you purchase through links on our site, we may earn an affiliate commission.Heres how it works.
CEO and Founder ofX-PHY, a Flexxon brand.
What can we expect from ransomware gangs in 2025?
Ransomware gangs have a way of coming back in one form or another.
Its only a matter of time.
Elsewhere, RansomHub, Play and DragonForce are among several new ransomware groups quickly gaining notoriety within thecybersecurityindustry.
These new gangs share a common characteristic of attacking critical infrastructure.
Ransomware gangs old and new chiefly rely on double extortion tactics, exploiting supply chain weaknesses andDDoSattacks.
Organizations that continue to rely on reactive defenses or behavior-based detection are vulnerable to these tactics.
Software defenses by themselves are too easily evaded.
Reliance onsecurity softwareby itself depends on continual updates and vigilance.
This is worrying given that human error persists as the leading cause of security lapses.
Whats more, AI has greatly improved the social engineering capabilities of ransomware gangs.
Previously, phishing emails could be detected by tells such as poor spelling or unnatural phrasing.
We need to remove humans from the equation which just isnt possible when relying on software alone.
Its time for businesses to change this narrative and embrace multi-layer security solutions.
Rethinking zero trust from hardware up
Hardware-based solutions should be a non-negotiable for modern cybersecurity.
Hardware security can also incorporate proactive security driven by AI.
Moving from reactive to proactive defenses will be a critical step towards stopping ransomware gangs in their tracks.
Humans must put together the underlying IT infrastructure and make judgements where an exception may be needed.
This brings us back to the innate risk of relying on human beings.
The way to build true zero trust is to incorporate new tools that are embedded within endpoint hardware.
To further mitigate human error, AI-driven policy engines can be used to enhance hardware-based security.
AI analyses data from trusted hardware components to enforce zero trust.
Theres no time to wait
Ransomware gangs show no signs of slowing down.
We feature the best endpoint protection software.
The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc.