Ransomware’s Evolving Playbook
Ransomware attacks became more targeted, with groups going after backups, threatening data leaks, and using AI to craft convincing phishing emails.
As 2025 comes to a close, we’re looking back at some of the most impactful cyber threats of the year and more importantly, what they reveal about the challenges ahead. From ransomware tactics to AI-driven phishing and risky app integrations, this round-up highlights where businesses have been most vulnerable and how you can strengthen your defences in 2026.
Ransomware attacks became more targeted, with groups going after backups, threatening data leaks, and using AI to craft convincing phishing emails.
Store backups off-network, use phishing-resistant MFA, and revisit your incident response plan.
Multi-Factor Authentication (MFA) remained a must—but poor setups and “MFA fatigue” left many organisations vulnerable.
Switch to number-matching or hardware-based MFA, and monitor authentication logs for suspicious behaviour.
SaaS tools, browser extensions, and file-sharing platforms were quietly adopted by users, expanding the attack surface without IT knowing.
Audit third-party app permissions and apply conditional access to restrict unsanctioned tools.
Vendors lacking basic security protocols or Cyber Essentials certification introduced risk into core systems.
Require suppliers to meet baseline standards and build supply chain security into your strategy.
Old admin accounts and forgotten guest logins opened doors for attackers in multiple breaches this year.
Run regular access reviews and automate account deactivation for leavers and expired roles.
Use the final weeks of 2025 to get a head start:
Cybersecurity threats don’t always kick the door down—sometimes, they slip in through the cracks. This month, we’re spotlighting three subtle but serious security risks that could be undermining your defences right now.
Learn what Product Lifecycle Management (PLM) is and how it helps teams manage product data, processes, and collaboration across the lifecycle. Discover the key benefits and PLM tools driving innovation.
If you are an Autodesk Vault user in the mechanical engineering and manufacturing industry, you are likely familiar with the challenges of managing design data. While Vault provides a solid foundation for storing and organising design data, it falls short in some critical areas. You might have noticed this if you ever wanted to automate workflows or configure company-specific rules and processes in Vault. Let’s dive into these challenges and possible solutions.