Barracuda's security team has analyzed how cyber threats have evolved over the past year and identified four trends that are expected to shape cybersecurity in 2025. One of these threats is highlighted as particularly difficult to manage.
– For Swedish companies, the unknown threat will be particularly challenging next year. It concerns threats that are difficult to predict and require proactivity, flexibility and AI-based solutions to be detected and managed, says Peter Graymon, Nordic Head of Barracuda Networks.

Four threats expected to dominate 2025:
- AI-based attacks become faster and more personal
AI technology continues to evolve cyberattacks, making them both harder to detect and more targeted. Through automation, attackers can carry out large-scale attacks that systematically exploit vulnerabilities in software and systems. - Increased sophistication to bypass security systems
Cybercriminals are increasingly devoting resources to evading and sabotaging security solutions. New advanced methods, such as the so-called “EDR killer” (to disrupt detection of threats in devices) and sophisticated phishing methods are expected to become more common. - Multi-channel and multi-stage attacks escalates
Attackers are increasingly using multiple attack methods at the same timeAttacks can start via email or collaboration tools and then spread to other platforms. Vulnerabilities in connected devices and identity-based gaps become particularly vulnerable. - The the unknown threat – a growing uncertainty
Hidden security holes, new attack methods and unintended threats in The supply chain is causing great concern. Attackers become more skilled at using innovative tools to infiltrate systems, steal data and sabotage infrastructure – often without triggering any warning signals.
– The unknown threat means you don't know where the security gaps are until it's too late. Organizations are right to invest in cybersecurity platforms. OutMANno one will know what you actually have that needs to be protected. They need a complete and updated asset list to ensure that the security solution has been implemented on all devices, says Eric Russo, Head of SOC Defensive Security, Barracuda Networks.
– Unprotected devices connected to the network is a prime target for attackers. Ensuring full coverage of security controls is therefore crucial to a successful cybersecurity program, concludes Eric Russo.
Read more here"