Table of contents
- Key cyber security events in 2024
- Emerging cyber security Trends for 2025
As the year ends, it’s time to take stock. The year 2024 proved to be crucial for cyber security, marked by events that redefined digital defense strategies.
This article analyzes the major cyber security events of 2024 and anticipates the trends that will define cyber security in 2025, offering practical insights on how to navigate an increasingly complex and ever-evolving field of information security.
Key cyber security events in 2024
The year 2024 was a critical period for cyber security, featuring significant incidents that highlighted the growing complexity of cyber threats.
The attacks and vulnerabilities that surfaced impacted not only companies and governments but also emphasized the need for more robust security strategies. Below is an overview of the most notable events:
Security issues with CrowdStrike on Linux
One of the most discussed events was a faulty CrowdStrike update for Linux, which caused disruptions in several popular distributions like Red Hat, Debian, and Rocky. This incident in April underscored the importance of thorough testing in security software designed for critical systems.
As a cornerstone of critical infrastructure and enterprise systems, Linux showed vulnerability not just to external cyber risks but also to internal issues arising from misconfigurations.
Attack on the XZ Library: the SSH Backdoor incident
In March, the open-source XZ project became the target of a sophisticated attack, leading to the installation of an SSH Backdoor on numerous servers globally.
Polyfill.io compromise: a large-scale supply chain attack
Another significant event was the supply chain attack on Polyfill.io, a JavaScript library used by over 385,000 websites, including major companies like Warner Bros and Mercedes-Benz. After its domain acquisition, the script was altered to redirect users to malicious sites.
Satellite and submarine cable attacks: threats to global connectivity
In 2024, attacks on satellites and submarine cables highlighted the risks associated with global communication infrastructure. Two submarine cables in the Baltic Sea were damaged, temporarily disrupting connectivity in parts of Northern Europe.
Concurrently, some communication satellites became targets of cyberattacks.
Vulnerability in Fortinet systems
In October 2024, a critical vulnerability in Fortinet products exposed over 87,000 systems to potential attacks. Widely used in key sectors like government and healthcare, this vulnerability was particularly severe.
RegreSSHion: critical OpenSSH vulnerability
Another key event was the identification of a vulnerability called “RegreSSHion” in OpenSSH. This flaw allowed hackers to gain root privileges on vulnerable servers, although exploiting it required substantial resources.

Emerging cyber security Trends for 2025
The events of 2024 serve as a call to action for businesses and governments. With the continued rise of sophisticated attacks and the introduction of advanced technologies, cyber security professionals and Chief Information Security Officers (CISOs) must anticipate risks and adopt innovative approaches.
Artificial intelligence: a tool and a threat
The use of artificial intelligence will continue to grow in cyber security. On the one hand, AI models improve anomaly detection and automate incident responses, enabling security teams to act quickly.
On the other hand, technological innovation, particularly AI, is becoming a tool for cybercriminals, aiding in sophisticated phishing attacks, malware creation, and data breaches.
Companies must address these challenges by:
- Implementing resilient artificial intelligence systems resistant to manipulation;
- Using controlled machine learning models to prevent misuse of sensitive data;
- Diversifying AI vendors to mitigate risks associated with reliance on a single technology.
Expansion of the Zero Trust model
The Zero Trust model, fundamental in 2024, will become the standard for cyber security in 2025. Based on the principle “never trust, always verify,” this approach will be crucial to mitigating risks from unauthorized access by both internal and external users.
Organizations will adopt Zero Trust architectures across more environments, including cloud infrastructures and IoT. Technological advancements in this area will enable:
- Advanced multi-factor authentication tools;
- Enhanced activity monitoring to identify suspicious access in real-time.
Growth of supply chain attacks
Supply chain attacks will remain one of the primary cyber security threats in 2025. The reliance on external vendors and open-source solutions exposes businesses to significant risks, as seen in the 2024 compromises of Polyfill.io and XZ.
To mitigate these risks, companies should:
- Implement strict vendor management policies;
- Conduct large-scale security testing to detect vulnerabilities in purchased products;
- Use AI-driven automated verification systems to analyze third-party resource behavior.
Challenges in IoT device security
With the continued growth of the IoT market, cyber risks associated with connected devices will increase. Sensors, cameras, smart appliances, and industrial devices often lack regular security updates, making them potential entry points for cyberattacks.
In 2025, organizations should:
- Establish specific security standards for IoT devices;
- Enhance network protections hosting these devices;
- Deploy segmentation solutions to limit the impact radius of potential attacks.
New cloud environment vulnerabilities
As organizations continue to adopt cloud solutions, the risk of vulnerabilities in hybrid and multi-cloud environments will grow. Targeted attacks on misconfigurations or third-party cloud infrastructure are expected to rise.
Best practices to address this trend will include:
- Advanced identity and access management (IAM) systems;
- Continuous monitoring to detect insecure configurations;
- Employee training to improve awareness of cloud threats.
Increased attacks on industrial environments and critical infrastructure
Critical infrastructures, such as those in energy, transportation, and healthcare, will remain high-value targets for cybercriminals and state actors. Advances in industrial automation and operational technology (OT) adoption will make these environments increasingly vulnerable.
To protect such infrastructures, organizations will need to:
- Adopt integrated solutions combining physical and cyber security;
- Develop resilience plans based on attack simulations;
- Use threat detection tools for OT devices.