Cyber threats evolved rapidly in 2024, with attackers leveraging AI-driven social engineering, malware-free intrusions, and cloud-focused exploits. The newly released 2025 CrowdStrike Global Threat Report underlines critical shifts in cybercrime, particularly the surge in vishing (voice phishing) and identity-based attacks.

Key Findings from the CrowdStrike Report

1. The Rise of Vishing: Voice Phishing Surges Fivefold

Traditional email phishing is being replaced by vishing—a social engineering tactic where cybercriminals impersonate IT staff, customer support, or executives over the phone to trick victims into revealing sensitive information. Vishing attacks increased more than fivefold in 2024, making it the leading method for gaining unauthorized access to enterprise systems.

  • Attackers use deepfake voices to impersonate executives or IT personnel.
  • Help desk impersonation scams surged, bypassing traditional security defenses.
  • Social engineering tactics are now AI-assisted, making them more convincing.

Fig 1. Vishing intrusions detected by CrowdStrike OverWatch per month, 2024*

*Source – CrowdStrike

2. Malware-Free Cyber Intrusions Now Dominate Attacks

A staggering 79% of cyber intrusions in 2024 were malware-free, up from just 40% in 2019. [A malware-free intrusion often means acquiring someone’s username and password from a phishing scam or similar trick, and using those login credentials to easily enter a system and obtain digital valuables.]

Attackers now rely on legitimate remote management tools to bypass traditional antivirus and security measures.

  • Attackers use stolen credentials and social engineering instead of deploying malware.
  • Access broker advertisements increased by 50%, fueling the underground trade in stolen login data.
  • AI-assisted attackers exploit IT help desks to gain unauthorized access.

3. AI-Powered Cybercrime on the Rise

Generative AI has become key in the cybercriminal’s toolbox, driving more sophisticated social engineering campaigns. Deepfake scams, automated phishing, and AI-generated disinformation are among the most widely-used methods to deceive victims.

  • North Korea-linked hackers leveraged AI-powered fake job interviews to infiltrate tech firms.
  • AI-generated emails and voice messages make social engineering harder to detect.
  • Real-time AI adaptation allows attackers to refine their tactics instantly.

4. Cloud-Based Attacks and SaaS Exploitation Increase

Cloud and software-as-a-service (SaaS) attacks saw a sharp rise, with 35% of cloud security breaches involving valid account abuse. Adversaries exploited Microsoft 365, SharePoint, and enterprise APIs to steal sensitive data.

  • Attackers use stolen credentials instead of malware to avoid detection.
  • Cloud-focused hacking groups target misconfigured security settings.
  • SaaS applications are prime targets for identity-based attacks.

5. Faster Breakout Times: Attacks Can Spread in Under a Minute

The breakout time—how quickly a hacker moves through a network after gaining initial access—dropped to an average of 48 minutes in 2024, with some attacks propagating in under a minute. This highlights the urgent need for real-time threat detection and response.

How Businesses Can Defend Against Modern Cyber Threats

With cybercriminals leveraging AI and automation, businesses must adopt advanced security measures to mitigate these evolving threats. Key defense strategies include:

1. Implement Phishing-Resistant MFA

Traditional multi-factor authentication (MFA) methods can be bypassed through vishing and social engineering. Phishing-resistant MFA, such as biometric authentication and passwordless login, provides stronger protection against identity-based attacks.

2. Strengthen Cloud Security

With cloud-based threats on the rise, organizations should enforce:

  • Least privilege access to limit user permissions.
  • Continuous monitoring of API keys for unauthorized activity.
  • SaaS security measures to prevent credential abuse.

3. Fight AI with AI

Given that 79% of intrusions are malware-free, businesses must deploy behavioral analytics, AI-driven detection, and AI-powered tools to identify anomalies, detect cyber threats in real time, and enhance identity and access management (IAM). (More on AI vs AI)

4. Proactive Threat Hunting

Instead of waiting for breaches to occur, organizations should adopt proactive threat hunting strategies to detect malware-free attacks before they escalate.

Staying Ahead of Cybercriminals in 2025

The 2025 CrowdStrike Global Threat Report underscores that cybercriminals are evolving faster than ever, leveraging AI, automation, and social engineering to bypass traditional security measures. Organizations must prioritize identity protection, cloud security, and AI-driven detection to stay ahead of these emerging threats.

As vishing, malware-free attacks, and AI-powered scams continue to grow, businesses that fail to adapt will remain vulnerable. By implementing cutting-edge security strategies and embracing AI-driven defenses, companies can effectively combat the next wave of cyber threats.


For more information, or to learn how TraitWare’s patented Phishing-Resistant MFA+SSO works to strengthen security and simplify login for the enterprise, please reach out at any time, or start your FREE TRIAL today.