• About
  • Subscribe
  • Contact
Friday, June 6, 2025
    Login
FutureCISO
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
No Result
View All Result
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
No Result
View All Result
FutureCISO
No Result
View All Result
Home Technology Data Protection

Ransomware attacks surge despite fewer payments

FutureCISO Editors by FutureCISO Editors
June 6, 2025
Ransomware attacks surge despite fewer payments

Photo by Tima Miroshnichenko: https://www.pexels.com/photo/grayscale-photo-of-hackers-sitting-on-chairs-5380637/

Share on FacebookShare on Twitter

A new report from Delinea, a provider of identity security solutions, has found that 69% of organisations worldwide fell victim to ransomware attacks over the past year, with 27% experiencing multiple incidents.

Source: 2025 State of Ransomware Report, Delinea

The 2025 State of Ransomware Report, based on insights from over 1,000 IT and security leaders, highlights an evolving threat landscape driven by AI-powered attacks and stolen credentials.

While only 57% of organisations paid ransoms, down from 76% in 2024, attackers are increasingly turning to extortion tactics, with 85% of ransomware victims threatened with data exposure.

Art Gilliland, CEO at Delinea, stated: “Ransomware has evolved into a shape-shifting, AI-enabled threat that no business can afford to underestimate.

"In order to combat the sophistication of today's attacks, organisations must fight AI with AI and embrace proactive, identity security strategies like zero trust architecture, Privileged Access Management, and continuous credential monitoring to stay ahead.” Art Gilliland

The report highlights the double-edged sword of AI, with threat actors using it to automate phishing campaigns and impersonate individuals, while defenders are leveraging AI for faster threat detection and response.

Ninety per cent of organisations are now using AI in their ransomware defence strategies, particularly within Security Operations Centres (64%), for analysing Indicators of Compromise (62%), and to prevent phishing (51%).

Despite this, many organisations are falling short in essential security practices, with only 34% enforcing least privilege access controls and 57% implementing application control measures. Recovery times remain lengthy, with 75% of victims taking up to two weeks to fully restore operations.

Related:  Confronting the largest attack surface ever with XEM
Tags: Delinearansomware
FutureCISO Editors

FutureCISO Editors

No Result
View All Result

Recent Posts

  • Ransomware attacks surge despite fewer payments
  • Platform to enhance software development security
  • Check Point launches enhanced branch office security gateways
  • BarracudaOne to offer a unified approach to cybersecurity
  • AI agents present new security challenges in Southeast Asia

Categories

  • Blogs
  • Compliance and Governance
  • Culture and Behaviour
  • Cybersecurity careers
  • Data Protection
  • Endpoint Security
  • Incident Response
  • Network Security
  • People
  • Process
  • Resources
  • Risk Management
  • Technology
  • Training and awarenes
  • Videos
  • Webinars and PodChats
  • White Papers

Strategic Insights for Chief Information Officers

FutureCISO serves the interests of the Chief Information Security Officer (CISO) and the information security profession. Its purpose is to provide relevant and timely industry insights around all things important to security professionals and organisations that recognize and value the importance of protecting the organisation’s data and its customers’ privacy.

Cxociety Media Brands

  • FutureIoT
  • FutureCFO
  • FutureCIO

Categories

  • Privacy Policy
  • Terms of Use
  • Cookie Policy

Copyright © 2024 Cxociety Pte Ltd | Designed by Pixl

Login to your account below

or

Not a member yet? Register here

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
Login

Copyright © 2024 Cxociety Pte Ltd | Designed by Pixl