Check Point Software's annual report is now available. Among all the information it contains, here are the 3 trends that particularly caught our eye.
The year 2025 has barely begun, and already the first analyses of cyber risks are taking shape. The report from Check Point Software, a major player in cybersecurity, highlights three worrying trends that have marked the last few weeks and that will be worth monitoring this year.
Infostealer attacks are becoming increasingly frequent. Particularly insidious, they enable the exfiltration of huge quantities of sensitive data, including authentication details, files, system configurations and financial information.
The attackers' strategy is devious: targeting BYOD (Bring Your Own Device) devices to gain access to corporate resources. Some infostealers even capture screenshots, making their impact devastating.
These logs are then resold on illegal Dark Web platforms, such as the Russian Market. According to Check Point Software, over 10 million Infostealer logs are for sale on this market.
The growing adoption of the Cloud is amplifying the complexity of IT environments and multiplying risks. In a previous article, we identified the Cloud as adding complexity and being a major source of configuration errors.
However, the report also highlights the risk of integration between on-prem and Cloud infrastructures.
For example, the connection between an on-prem Active Directory and ENTRA ID in the Cloud to set up an SSO (Single Sign-On) can become a vector of propagation. If on-prem infrastructures are compromised, this connection could enable a lateral movement towards Cloud resources.
Edge devices, i.e. equipment located at the boundary between a company's infrastructure and the Internet (routers, VPNs, firewalls, etc.), have become priority targets in 2024.
Cybercriminals exploit these devices to transform them into Operational Relay Boxes (ORBs), i.e. anonymized entry points to critical infrastructures. With a direct connection to the Internet and internal resources, these devices represent an ideal entry point for attackers.
As a result, many security solution manufacturers have been forced to release patches to address critical vulnerabilities in their equipment.
These trends underline three priority areas for reflection and action to secure businesses in 2025:
Thanks to its ongoing technology watch, MCG supports its customers in strengthening their resilience in the face of cyber threats, while enabling them to concentrate on their core business.