Learning Library

← Back to Library

Cybersecurity 2025: Predictions Reviewed

Key Points

  • The presenter reviews past cybersecurity forecasts, confirming that passkey adoption has surged, with one company reporting 4.2 million passkeys saved and one‑third of users now employing them.
  • AI‑generated phishing has become a reality, producing highly personalized, grammatically flawless emails that are far more convincing than traditional scams.
  • Deep‑fake technology is already being weaponized, exemplified by a video‑call impersonation of a CFO that caused a $25 million wire transfer loss and by AI‑crafted voice robocalls influencing political campaigns.
  • These trends underscore a growing gap between sophisticated attack vectors and existing defenses, highlighting the urgent need for upgraded security measures.
  • Looking ahead to 2025, the speaker anticipates continued expansion of password‑less authentication, escalated AI‑driven threats, and heightened focus on countering deep‑fake attacks.

Sections

Full Transcript

# Cybersecurity 2025: Predictions Reviewed **Source:** [https://www.youtube.com/watch?v=kqaMIFEz15s](https://www.youtube.com/watch?v=kqaMIFEz15s) **Duration:** 00:16:43 ## Summary - The presenter reviews past cybersecurity forecasts, confirming that passkey adoption has surged, with one company reporting 4.2 million passkeys saved and one‑third of users now employing them. - AI‑generated phishing has become a reality, producing highly personalized, grammatically flawless emails that are far more convincing than traditional scams. - Deep‑fake technology is already being weaponized, exemplified by a video‑call impersonation of a CFO that caused a $25 million wire transfer loss and by AI‑crafted voice robocalls influencing political campaigns. - These trends underscore a growing gap between sophisticated attack vectors and existing defenses, highlighting the urgent need for upgraded security measures. - Looking ahead to 2025, the speaker anticipates continued expansion of password‑less authentication, escalated AI‑driven threats, and heightened focus on countering deep‑fake attacks. ## Sections - [00:00:00](https://www.youtube.com/watch?v=kqaMIFEz15s&t=0s) **Assessing Last Year's Cyber Forecasts** - The speaker reviews 2024 predictions on passkey adoption and AI‑generated phishing, confirming their accuracy before forecasting trends for 2025 and beyond. - [00:03:08](https://www.youtube.com/watch?v=kqaMIFEz15s&t=188s) **Deepfakes and AI Hallucination Errors** - The speaker cites a Biden deep‑fake robo‑call that emerged after his prediction and a chatbot’s wildly inaccurate pace conversion, highlighting how generative AI can generate persuasive yet factually false information. - [00:06:19](https://www.youtube.com/watch?v=kqaMIFEz15s&t=379s) **AI-Driven Cybersecurity Outlook 2025** - The speaker outlines how generative AI is already being used to summarize incident data, predicts its expanding role and mixed impact—including the rise of “shadow AI”—in cybersecurity trends through 2025 and beyond. - [00:09:29](https://www.youtube.com/watch?v=kqaMIFEz15s&t=569s) **Deepfakes, AI‑Generated Malware, Legal Risks** - The speaker warns that AI‑crafted deepfakes could create reasonable doubt in court while generative AI can readily produce exploit code, posing unprecedented legal and cybersecurity challenges. - [00:12:34](https://www.youtube.com/watch?v=kqaMIFEz15s&t=754s) **Prompt Injection Threats and AI Defense** - The speaker explains that prompt‑injection attacks exploit LLMs’ naive trust, are flagged by OWASP as the leading risk to generative AI, and argues we must build stronger defenses while also leveraging AI to enhance cyber‑security operations. - [00:15:52](https://www.youtube.com/watch?v=kqaMIFEz15s&t=952s) **Call for Quantum‑Safe Adoption** - The speaker warns that classified information will be vulnerable without quantum‑safe cryptography, urges nations and organizations to begin migration projects, and invites viewers to explore related IBM Technology Channel videos and share their own future predictions. ## Full Transcript
0:00Two years ago, I did a video on cybersecurity trends for 2023. 0:05Then last year I did another one for 2024. 0:08Well, let's dust off the crystal ball and take a look and see what I'm seeing for 2025 and beyond. 0:16But before we do that, let's take a quick look at what I predicted last year and see if it came true or not. 0:22That way you can decide whether you want to believe this YouTube prophet or not. 0:25So how did I do on last year's predictions? 0:28The first one was about the adoption of pass keys over passwords, moving from passwords to doing this more 0:35sophisticated, security conscious pass key technology from FIDO. 0:41Past Keys. 0:41In fact, we found there was a password management company 0:46that particularly pointed out that they saw 4.2 million pass keys saved in their software over the course of the last year. 0:56That's a big improvement. 0:57A big uptick. 0:59They found that it was 1 in 3 users are now storing pass keys and hopefully using them as well. 1:07And that, in fact, they saw twice as many companies, in other words, websites that were accepting pass keys as an option. 1:15So I would say that's a big improvement. 1:18That one definitely came true and I expect to see that one continue even more as we go forward. 1:24Now, my next prediction had to do with AI. 1:26phishing. 1:26In other words, using generative AI 1:28in order to generate phishing emails. 1:31We've in fact seen this occur as well. 1:33There was an email security company that said they are now seeing these perfectly crafted 1:39and legitimate sounding phishing emails that look better than anything we've seen before. 1:45In fact, these things are highly personalized. 1:49In fact, we could use information that's available on the Web 1:53in order to make them even more personalized and more targeted and therefore more believable. 1:58And that whole business of looking for grammar errors and spelling errors and phishing emails, 2:02that's slowly going away because generative AI. 2:05doesn't make that mistake. 2:06So we're in fact seeing and have already seen that AI 2:10is improving phishing attacks. 2:13Now we need to do something about the defense as well. 2:16Okay. 2:16Deep fakes. 2:17What's happening in that case? 2:19It turns out almost two months after I recorded last year's video, there was a an attack where a deep fake was able to. 2:31Emulate and impersonate the CFO, the chief financial officer of a company, 2:36and convince an employee to wire $25 million out of that company into the attacker's account. 2:43All using a deepfake in a video call. 2:46So the employee thought for sure they were talking to the CFO and therefore following those instructions. 2:51In fact, it was a deep fake. 2:53It was an AI generated impersonation of the actual person and they lost $25 million in that particular case. 3:01We also saw another example in the US, the presidential election run up in the early part of 2024. 3:08Again, just a few months after I made this prediction about deep fakes in the New Hampshire primary. 3:14For the Democratic primary, there was a deepfake robo call of Joe Biden's voice 3:19calling people and telling them they didn't need to vote in the primary. 3:23They could just save their vote for the general election. 3:26So these things have in fact occurred and they started occurring 3:30almost instantly after I referred to them as a prediction. How about hallucinations. 3:35So Generative AI 3:37continues to have some issues with the truth. 3:40Sometimes it's not well grounded in the truth. 3:42Sometimes it does amazing stuff. 3:44But just to give you an example, I did one really recently. 3:48A friend of mine who is a runner was quoting to me what her time was on a run that she did recently, 3:54and she's not from the US, so she quoted me her time as 5.45 per kilometer. 4:01And I thought, well, I don't think in kilometers, so I need to convert that into a per mile pace. 4:08And so I went to a chat bot, a very popular chat bot, and asked it what does that convert to? 4:135.45km. 4:15What is that pace? 4:16And Miles, if someone was running it and you know what it said. 4:20Said it was a 3.43 which congratulations to her. 4:24She would have literally broken the world record by more than 10s if that had been the case. 4:30It wasn't true. 4:31I went to the chat bot and said, That's not right. 4:34That's literally all I said. 4:35And it said, yeah, well let me correct my numbers. 4:39Actually, that would have come out to a 9.15 pace per mile. 4:44Well, that's a big difference. 4:45That's not a world record. 4:47That's respectable. 4:48Not a world record. 4:49So all I did was just prompt it and say. 4:51Tell me again. 4:52Try again. 4:53And then all of a sudden, it got it right. 4:55So we're still having hallucination problems. 4:58It's getting better, but it's not solved yet. 5:01And then the last prediction I made had to do with the use of cybersecurity needing to secure AI. 5:08In other words, companies are going to be deploying AI, and they're going to be wondering, how 5:13can I use cybersecurity technologies to make sure those deployments can't be attacked, that they're robust? 5:19That has, in fact, turned out to be the number one question I get when I'm out meeting with clients. 5:26This is the reason, for the most part, they're bringing me in to have conversations. 5:29I talk about a lot of other things, but this is the number one concern for all the clients I've seen virtually in the last year. 5:36How am I going to secure my AI 5:39deployment? 5:40Now, I think there's also this other part where I which I made a prediction about, 5:44and we're seeing this happen also, and that is how can we use AI 5:48to do a better job of cybersecurity? 5:51Well, one of the thing is we could use this to create essentially an online Q&A type chat bot. 6:00So in other words, if we had a chat bot that didn't hallucinate, that was grounded in the facts and we could do that 6:06with something like retrieval, augmented generation, RAG technology and things like that, it could do a better job 6:12of answering questions for cybersecurity analysts just go in and ask questions in natural language and get responses back. 6:19We're starting to see that technology make its way to the market. 6:22And another one is cases being able to look at incidents and things like that and be able to track them. 6:30Look at all the indicators of compromise and give a summarize version of a particular case. 6:35Because one of the things that generative AI 6:37is good at is generating summaries as well. 6:41And those summaries can be helpful when you need to pass off 6:44an incident or a case to someone else who now is going to pick up the ball and run with it. 6:50So overall. 6:52I think we did pretty good. 6:54Okay. 6:55Enough of living in the past. 6:56Old man. 6:57Let's get rid of those. 6:58And now we're going to take a look at 2025 and beyond. 7:01I don't know exactly what year all of these things will happen. 7:04So we're just looking toward the future in general. 7:06And even though they say history repeats itself, actually, Mark Twain said it doesn't repeat itself, but it often rhymes. 7:14So we're going to see some of the same trends that we saw before that will continue maybe in a little bit different form. 7:19And not surprisingly, AI 7:22is going to be a big part of everything that happens in technology, and cybersecurity is no different in that regard. 7:29We're going to see it give us some pluses and minuses, 7:32some pros and cons, some things where it'll help us and some things where it might help us. 7:36I'm going to start with some of the things where it necessarily will not be helping us. 7:41And that's, first of all, a prediction about shadow AI. 7:45That is, this stuff is so good and everyone is going to want to do it and everyone is going to do it. 7:50And not all of those AI deployments will in fact be authorized, will be the ones that are approved by the organization. 7:58So we could have, for instance, in some places 8:01that somebody goes into a cloud instance, pulls down a model and stuff starts running away. 8:07And that shadow AI could present a problem for the organization. 8:11Other examples on mobile phones. 8:14So people are using AI is being built into mobile phone operating systems and we're going to see more and more of that. 8:20If that's not handled well, it could be a source of data leakage. 8:24It could be a source of misinformation. 8:26So that's this kind of sort of unapproved shadow AI. 8:30Is going to represent a particular problem for us, and I expect to see that grow as we go into the future. 8:37What else? 8:38Deepfakes. 8:38I mentioned that one before and that one's not going away. 8:42In fact, Deepfake technology is only going to be getting better and there are going to be implications to business. 8:50I gave an example of that where an organization was basically swindled out of or convinced to send $25 million. 8:59There was another case a few years ago where $35 million was sent as a result of a deepfake call, 9:05just an audio call, and someone followed those instructions. 9:08So it's going to effect business. 9:10It's going to affect governments as someone puts out a deep fake of a head of state or something like that. 9:18Then if we don't have reliable sources for that, people are going to see those messages 9:23and some portion of the people will believe it because some portion of belief will of the people will believe anything. 9:30So how are we going to make sure that what we're seeing are, in fact, the real leaders and not deepfakes? 9:37And think about law. 9:40The legal aspect of this, we look at evidence and we take those into court, a video of someone committing a crime. 9:47What if it was a deepfake and it wasn't really that person committing the crime? 9:51Or by the same token, what if it was an actual video? 9:54And the defense just argues that it's a deepfake and now that creates some sort of reasonable doubt. 9:59So there are going to be implications to all of this, and we have not figured out yet. 10:03Our legal system, government systems and so forth, have not figured out what all the implications of those will be. 10:09The bad guys will continue to use these in ways that will represent a threat to us. 10:14Another one is exploits. 10:17And writing malware. 10:20In fact, we know that generative AI 10:21is able to write code. 10:23Well, why wouldn't it be able to write malware? 10:25In fact, it can. 10:26In fact, there was one study that was done that found that one of the very popular generative AI 10:32chat bots was able to, when given an adequate description of a zero day vulnerability, 10:39it was able to generate exploit code 80% of the time, 87% of the time. 10:45That's really good. 10:46That means a bad guy doesn't even have to know how to write code. 10:49They just need to know how to take the information about the description of the problem, 10:53put it into the right chat bot, and now they get their exploit and they can launch that. 10:58Well, that's a theoretical threat. 11:00Has it actually happened? 11:01In fact, it has already. 11:03We've started to see this already. 11:04One major online retailer that you're all familiar with 11:08has already reported they've seen a seven fold increase in the last six months in their attacks. 11:15The number of attacks coming in and they attribute some large percentage of that. 11:20They believe that that's not a coincidence, that it's gone seven X in the last six months. 11:25They believe generative AI 11:26has a is a big part of that, that attackers are starting to use this technology more and more. 11:31That trend, I expect, will continue. 11:34How about the attack surface? 11:37Well, every time we add a new piece of componentry into a system, it extends the attack surface. 11:45It's one more thing that a bad guy can use to break into. 11:49So the attack surface now includes AI 11:52So the shadow AI 11:53that's out there. 11:55Any of these other technologies could potentially be things that someone will exploit. 12:00So here I was talking more about breaking into the existing IT 12:04infrastructure using generative AI 12:06In this case, I'm saying the use of the AI 12:09itself will become something that gets attacked. 12:12And if someone is able to poison that, it's going to mess up the operations of the business. 12:16They may be able to pull data out of it. 12:18And we have a data loss of some sort. 12:20Another one, that's a big concern. 12:23In fact, I've talked about this one before and done a couple of videos on this topic. 12:27Prompt injection. 12:29Generative AI 12:30is subject to some of the same failings that humans have. 12:34That is, it believes a lot of things and it can be naive and it can be socially engineered in essence. 12:41And that's what a prompt engineering prompt injection attack does. 12:45We tell it to do things that the originators of the technology did not intend it to do, 12:50and that way the bad guys will continue to figure out ways to get this thing beyond and break out of its guardrails. 12:59To do anything now, as it's been referred to. 13:03And we are going to need to be able to have better and better defenses against these kinds of attacks 13:08because those in fact, the OWASP organization Open Worldwide Application Security Project 13:14says this is the number one attack type against large language models, which are what the generative AIs are based on. 13:22So we haven't seen a solution to that. 13:24I'm sure we'll see more of it. 13:26What else? 13:27Well, those are a lot of negatives that we have to face. 13:31How about at least one positive in here? 13:33And I mentioned a little bit of this before, and that is using AI to improve cybersecurity. 13:39How can we do a better job of cyber now that we have this AI 13:42tool? 13:42It's not just an attack surface. 13:44It's not just a negative, but let's leverage that tool as well. 13:48Well, what we've seen a lot so far is using generative AI 13:52in a more passive role where it's doing analysis and things like that. 13:57But what if it gets involved a little bit more in response? 14:01Now, maybe it doesn't automate the response. 14:03In fact, I'd be very cautious about doing that because we still have elucidation problems and I don't want it hallucinating. 14:08What the answer should be to a particular break in, but giving advice 14:13and saying here within the understanding of this AI, we believe this is the most likely response you should take. 14:21Then here's our our confidence in that 14:23and here's the next most likely thing that you should do and the next priority thing that you should do. 14:28So giving us that kind of expert advice, or at least 14:33for an expert to look at, here's a bunch of suggestions, 14:36and now I can decide which ones I want to do and which ones I want to discard. 14:39So that's a potential positive use of generative AI 14:43in doing cybersecurity. 14:45And then one thing that's not related to I just saw that, you know, not everything is about AI, 14:51and that is quantum computers, quantum safe cryptography. 14:55Quantum computers are going to do some amazing stuff. 14:59But one of the things they're going to do, we wish it didn't, is it's going to be able to break our cryptography at one point. 15:05We don't know when this will be. 15:06Maybe five years, maybe ten years could be tomorrow. 15:09Someone is going to be able to read all the encrypted messages 15:12that we have put out by using a quantum computer to break that. 15:17Now, the quantum computers will do some wonderful things. 15:19That's not one of them. 15:20But we're going to need to start moving and we need to have already started moving 15:27toward these new quantum safe or post quantum crypto algorithms, 15:31the ones that will not be susceptible to attack and vulnerable to quantum attacks. 15:37A lot of people are still sitting in the starting blocks and have not begun 15:40this activity and they need to because of a thing called harvest now decrypt later 15:44I make a copy of your data right now, 15:47and then I wait for a quantum computer to get strong enough and then I can read what your stuff was. 15:52And that could be a problem, especially if we're talking nation states 15:55where some of the information will be classified for generations to come. 16:00So we really need to start working on projects to convert to this new quantum safe cryptography. 16:06And I expect we will see more organizations realizing that and starting to do that. 16:12Okay. 16:13So those are a few of my predictions for 2025 and beyond. 16:17And by the way, I've got videos on the IBM Technology Channel on virtually every one of these topics, including this one. 16:25So go check out those on the IBM Technology Channel. 16:28If you want to see a deeper dive into each one of these subjects. 16:31But enough about my predictions. 16:33How about your predictions? 16:34What does your crystal ball show you? 16:37Go ahead and put in the comments section, what your 16:40predictions are so that we can all benefit from your wisdom and.