Skip to content

Cyber Insurance News

The Leading Source for Cybersecurity Insurance News, Insights and Data

CrowdStrike Cybersecurity Report – Six Key Takeaways for 2025

Posted on February 28, 2025March 3, 2025 By Martin Hinton

It is billed as “the most anticipated cybersecurity report of the year.” It is the CrowdStrike 2025 Global Threat Report. The report reveals an alarming rise in cyber threats, with adversaries refining their strategies at an unprecedented pace. It highlights major trends shaping the global cybersecurity landscape, from China’s intensified cyber activities to generative AI-driven attacks. We picked six things to touch on from AI-powered cyberattacks to cloud security breaches.

1. China’s Cyber Operations Reach New Heights

The report notes a 150% surge in China-linked cyber activity in 2024. Alarmingly, some industries experienced 200-300% more attacks. China-nexus adversaries have become more sophisticated, prioritizing stealth and operational security while expanding their infrastructure for cyber espionage.

The report attributes this escalation to China’s long-term investments, a “Grand Strategy,” in its cyber workforce and offensive capabilities. Seven new China-nexus adversaries emerged, each demonstrating specialized targeting strategies, particularly in financial services, media, and manufacturing.

The findings suggest that China is pre-positioning itself in critical networks, likely in preparation for future geopolitical maneuvers.

2. Generative AI Becomes a Cyber Weapon

Cybercriminals are using AI-powered cyberattacks via generative AI (genAI) for social engineering, disinformation, and malware development. In 2024, nation-state actors from China, Russia, and North Korea used genAI to conduct highly convincing and successful phishing campaigns and even create deepfake job candidates to infiltrate organizations.

One striking case involved North Korean adversary FAMOUS CHOLLIMA, which used AI-generated fake profiles to secure remote IT jobs at global firms. These insiders then sent company-issued laptops to third parties running illicit “laptop farms” to maintain persistent access to corporate networks.

Not unlike AI’s adoption in every industry, criminal adversaries are only beginning to explore it’s full potential. Criminal use is likely to escalate in 2025.

3. Hands-On-Keyboard Attacks Rise Sharply

79% of cyber intrusions in 2024 were malware-free, marking a dramatic shift toward hands-on-keyboard attacks. Instead of deploying malware, attackers increasingly rely on legitimate remote tools and stolen credentials to blend in with normal user activity.

CrowdStrike identified a 35% increase in hands-on-keyboard attacks last year, with some adversaries breaking into networks and escalating privileges in under 51 seconds.

One particularly concerning case involved CURLY SPIDER, an e-crime adversary that used social engineering and remote desktop tools to gain access and deploy ransomware within minutes.

4. Access Brokers Fuel the Underground Cyber Economy

The sale of stolen network access is booming, with access broker advertisements increasing by 50% year-over-year. These brokers obtain and resell compromised credentials. Naturally, this added revenue stream fuels ransomware and espionage campaigns.

CrowdStrike found that 52% of vulnerabilities in 2024 were linked to initial access techniques, including vishing, callback phishing, and MFA bypass schemes.

The most alarming trend is the growth of identity-based attacks, where hackers exploit valid user accounts instead of deploying malware.

In 2024, 35% of cloud intrusions involved stolen login credentials, highlighting the urgent need for stronger identity protections.

5. Cloud-Based Attacks Are Growing Fast

Cloud security breaches remains a prominent weak spot. Cloud-based cyber intrusions rose 26% in 2024. Attackers increasingly target cloud environments, using valid credentials and exploiting misconfigured access controls to move laterally.

Among the most sophisticated cloud-conscious adversaries are China-nexus actors, who compromise cloud services to steal sensitive data. North Korean hackers have also exploited cloud vulnerabilities, using backdoored GitHub projects to infiltrate enterprise environments.

CrowdStrike warns that identity-based attacks and misconfigured cloud permissions remain the most significant threats that can result in cloud security breaches.

6. The Need for Proactive Defense Has Never Been Greater

With cyberattacks becoming faster, more complex, and harder to detect, CrowdStrike emphasizes the need for real-time threat detection, identity protection, and proactive threat hunting.

Security teams must adopt AI-powered defense strategies, enhance cloud security policies, and harden identity verification processes. I feel like I should just cut and paste this element of our summary to cybersecurity reports. Kidding aside, the consistency of concern warrants attention. As adversaries refine their techniques, organizations must stay ahead of the curve—or risk becoming their next victim.

Other News: Cybersecurity Vulnerability: Companies Risk Governance Woes Over Delayed Security Fixes(Opens in a new browser tab)

Martin Hinton

Martin Hinton is the Executive Editor and Publisher of Cyber Insurance News and Information. With over three decades of journalism experience across six continents, his work encompasses investigative reporting, documentaries, and coverage of cultural, political, and business news. To learn more about his career, click on his name to visit his LinkedIn page.

Cybersecurity, Cybersecurity Report Tags:access brokers, AI-driven cybercrime, AI-Powered Cyberattacks, China cyber espionage, Cloud Security, cloud security breaches, crowdstrike, CrowdStrike 2025 Global Threat Report, cyber intelligence, Cyber threats, Cybercrime, Cybersecurity, cybersecurity best practices, cybersecurity trends 2025, generative AI threats, hacking trends 2025, hands-on-keyboard attacks, identity-based attacks, malware-free attacks, MFA bypass, nation-state cyber threats, Network Security, phishing, proactive defense, Ransomware, social engineering

Post navigation

Previous Post: Third-Party Cyber Risk Drove Major Financial Losses in 2024, Resilience Finds
Next Post: What Does SEC’s New Cyber and Emerging Technologies Unit (CETU) Mean for Cyber Regulations?

Related Posts

  • N-able Boosts Data Protection with Enhanced Disaster Recovery Cybersecurity
  • AI-Powered Cyberattacks Surge in 2024: Ransomware Trends and 2025 Cybersecurity Predictions AI & Cyber Insurance
  • Accenture Acquires Cybersecurity Firm MNEMO Mexico Cybersecurity
  • Cyber Security Consulting Services Market to Reach $11.829 Billion by 2030 Cyber Insurance Jobs
  • Blumira Launches New Reseller Program, Appoints Marc Davis as Channel Development Leader Cybersecurity
  • AI Cybersecurity Threats: A Dominating Force in Arelion’s Latest Report Cyber Insurance

Get the Cyber Insurance Newsletter

Receive weekly updates on the top news on cyber insurance.

Cyber Insurance News

Cyber Insurance News
In this clip from our latest podcast episode, Dan Candee, CEO of Cork Protection, dives into a critical topic that hits close to home: Cybersecurity for Main Street businesses.

🛡️ With a background in enterprise-level cybersecurity on Wall Street and a personal connection to small business through his family, Dan shares why Cork focuses on protecting small and mid-sized businesses from rising cyber threats.

🚨 "The threat actors are getting better, and they're coming after Main Street more and more."

👉 Discover why Main Street is being underserved in today's digital threat landscape and how Cork is filling that gap with a unique value proposition.

🔗 Learn more about Cork: corkinc.com
🎧 Full Podcast Episode: www.youtube.com/@CyberInsuranceNews/podcasts

📣 Don't forget to LIKE, SUBSCRIBE, and hit the 🔔 notification bell so you never miss a powerful conversation.

#Cybersecurity #SmallBusiness #MainStreet #DanCandee #CorkProtection #TechForGood #SMBs #PodcastClip #CyberThreats #BusinessSecurity
Cybersecurity for Main Street: Dan Candee on Protecting Small Businesses | CEO of Cork Protection
SMB Cyber Threats - In this episode of the Cyber Insurance News Podcast, host Martin Hinton talks with Dan Candee, CEO of Cork Protection, about the rising tide of cyber threats targeting small and mid-sized businesses (SMBs). Dan shares his journey from Main Street entrepreneur to cybersecurity leader, offering real-world insight into the threat landscape, financial vulnerabilities, and how AI and managed service providers (MSPs) can help fortify business resilience.

We explore:
• Why Main Street is more vulnerable than Wall Street
• Common SMB cybersecurity blind spots (like ACH fraud)
• The evolving role of managed service providers
• How Cork Protection blends cybersecurity and cyber insurance
• Real-world attack case studies and practical advice for SMBs

Whether you’re a small business owner, MSP, or cyber pro, this episode unpacks how to prepare, prevent, and protect your organization in today’s digital world.

📌 Topics: cybersecurity, cyber insurance, social engineering, SMB protection, ransomware, AI in security, MSPs

🎙 Guest: Dan Candee, CEO of Cork Protection
📢 Host: Martin Hinton, Executive Editor, Cyber Insurance News

👉 Don’t forget to like, comment, and subscribe for more insights on cyber insurance and digital defense!

#CyberSecurity #CyberInsurance #SMB #AI #CyberPodcast #BusinessResilience #smallbusiness #sme
00:00 Introduction - Dan Candee and Cork Protection
02:27 The Importance of Cybersecurity for Small Businesses
05:29 Understanding Cyber Threats and Their Impact
08:26 The Role of Managed Service Providers in Cybersecurity
11:24 24Financial Protection and Cyber Insurance Solutions
14:01 Leveraging AI in Cybersecurity
16:53 Navigating Cyber Insurance Policies
19:56 Empowering Small Businesses with Knowledge
21:52 The Future of Cybersecurity and Community Resilience
26:05 MSP/ MSSP The Lingo decoded
29:05 Finals Thoughts and a bit of Hope!
SMBs Are Cyber Targets | Dan Candee on Cyber Resilience & AI | Cyber Insurance News Podcast EP#6
Cyberattack on Small Business is on the rise—and AI is making it worse. In this episode of the Cyber Insurance News Podcast, host Martin Hinton sits down with William Altman of CyberCube to unpack how AI is enabling threat actors to more efficiently target and exploit small businesses.

🔐 From credential stuffing to brute force attacks, William explains how cybercriminals use AI to bypass login portals and MFA solutions—putting millions of small business owners at risk.

🎙️ Timestamps:
0:00 - Introduction
6:26 - William Altman on AI and threat actors
6:50 - Credential stuffing, brute force & reused credentials
10:00 - What small businesses can do right now
14:20 - The future of AI in cybercrime

🎧 Don’t miss this crucial update on the cybersecurity landscape for small businesses. Subscribe and stay informed.

#cyberattack #smallbusiness #AI #cybersecurity #CyberCube
Cyberattack on Small Business: How AI Supercharges Cyber Threats | William Altman @CyberCube"
Load More... Subscribe

Categories

  • 8-K
  • AI & Cyber Insurance
  • AI & Cybersecurity
  • Critical Infrastructure cyber insurance and security
  • Cyber Cat Bonds/Cyber Catastrophe Bonds
  • Cyber Insurance
  • Cyber Insurance APAC
  • Cyber Insurance Best Practices
  • Cyber Insurance Captive
  • Cyber Insurance Carriers & Brokers
  • Cyber Insurance Claims
  • Cyber Insurance EU
  • Cyber Insurance Financial Institutions
  • Cyber Insurance for Government
  • Cyber Insurance for Healthcare
  • Cyber Insurance for Schools
  • Cyber Insurance for SMEs/SMBs
  • Cyber Insurance For Startups
  • Cyber Insurance for Utilities
  • Cyber Insurance Geographic Markets
  • Cyber Insurance Industry Groups
  • Cyber Insurance Investments and M&A
  • Cyber Insurance Jobs
  • Cyber Insurance Laws & Regulations
  • Cyber Insurance Litigation
  • Cyber Insurance Market Size
  • Cyber Insurance MENA
  • Cyber Insurance News & Information Podcst
  • Cyber Insurance People
  • Cyber Insurance Policies & Strategies
  • Cyber Insurance Premiums
  • Cyber Insurance Reports
  • Cyber Insurance Settlements
  • Cyber Insurance Sunday – Upload
  • Cyber Insurance Systemic Risks
  • Cyber Insurance Tech
  • Cyber Insurance Threats
  • Cyber Insurance UK
  • Cyber Insurance Underwriting
  • Cyber Insurance Wholesaler
  • Cyber Regulations
  • Cyber War Exclusions
  • Cybersecurity
  • Cybersecurity and Credit Ratings
  • Cybersecurity for SMBs
  • Cybersecurity in Education
  • Cybersecurity Investment
  • cybersecurity jobs
  • cybersecurity M&A
  • Cybersecurity people
  • Cybersecurity Report
  • Cybersecurity Training
  • Department of Homeland Security
  • EU Cybersecurity
  • Insurance Linked Securities/ILS
  • Insurance Loss Warranty contract/ILW
  • Managed Service Providers
  • National Association of Insurance Commissioners' (NAIC) model cybersecurity law
  • Non-criminal Claims/Non-Malicious Claims
  • Opinion/Commentary
  • Personal Cyber Insurance
  • Personal CyberSecurity
  • Ransomware Insurance
  • Reinsurance
  • Risk Modeling
  • SEC Cyber Disclosure Rule
  • Small Business
  • Supply Chain Cybersecurity And Insurance

Send Ideas, Requests & Comments




    Tags

    AI AI in Cybersecurity Artificial Intelligence At-Bay Beazley CFC Chubb Cloud Security Coalition Corvus Cowbell Cowbell Cyber crowdstrike cyber attack Cybercrime CyberCube cyber insurace cyber insurance cyberinsurance cyber insurance for small businesses Cyber Insurance Market Cyber liability Insruance cyber liability insurance cyberliabilityinsurance Cyber Resilience Cyber Risk Cyber Risk Management cyber security Cybersecurity cybersecurity insurance Cyber threats Data Breach Data Breaches Howden Lloyds Marsh Microsoft personal cyber insurance phishing Ransomware Ransomware Insurance Resilience Risk Management SecurityScorecard small business
    • Cyber Insurance Books
    • Cyber Insurance Reports & Documents
    • Cyber Insurance Acronyms/Terms
    • Cyber Insurance Companies: Carriers, Brokers & Vendors
    • Industry Response: Potential Federal Insurance Response to Catastrophic Cyber Incidents
    • Ransomware Insurance
    • How Much Is Cyber Insurance?
    • Considerations for Buying Cyber Insurance
    • Cyber Liability Insurance Near Me
    • Cyber Insurance Quote
    • Newsletter
    • Legal Analysis & Full Text of 2023 SEC Rule: Cybersecurity Risk Management, Strategy, Governance, and Incident Disclosure
    • Glossary
    • About Cyber Insurance News
    • Privacy Policy

    • Onda Teams Up with Panorays to Streamline Cyber Insurance Underwriting Cyber Insurance
    • Marsh Launches Global Data Center Insurance and Risk Services Critical Infrastructure cyber insurance and security
    • Beyond Social Media’s Risks: Identity Theft Targets Kids Online Cyber Insurance
    • “Physical” Cyber Attacks to Vex Insured and Insurers  Cyber Insurance Best Practices
    • Cyber Risk Tops Business Concerns as Threats Surge, Travelers Report Finds Cybersecurity
    • Cyber Insurance Sunday – Labor Day Edition Cyber Insurance
    • New Cyber Claims Guide from Aon & Crawford  Cyber Insurance Best Practices
    • Scam-Yourself Attacks: How Cybercriminals Turn Victims Into Their Own Hackers Cybersecurity

    Related Cybersecurity Sites

    http://www.whatiscyberliability.com

    https://www.whatiscyberinsurance.com

    http://www.ddosattacktutorial.com

    http://www.ransomwareremovaltool.com

    Our Privacy Policy: https://cyberinsurancenews.org/privacy-policy/

    Copyright © 2024 Cyber Insurance News.

    Powered by PressBook Premium theme