The complex patterns of cyber threats in Q4 2025

DigiCert's latest RADAR Threat Intelligence Brief sheds light on the escalating cybersecurity landscape during the year's end.

DigiCert, a provider of intelligent trust solutions, has unveiled its Q4 2025 RADAR Threat Intelligence Brief, offering an analysis of the intersecting trends in global internet demand and cyber threats. Utilising vast amounts of data from DigiCert's expansive security architecture, encompassing UltraDNS, UltraDDoS Protect, and UltraWAF, RADAR gives an in-depth perspective on the dynamic threat environment.

The quarterly report highlights how end-of-year online activities exert pressure on internet infrastructure. The surge in digital engagement during this period — driven by commerce, travel, and increased device usage— coincides with a discernible rise in cyber threats, underscoring the urgency for multi-layered security approaches.

Ongoing Demand for Online Content: The period saw uninterrupted high growth in internet traffic, punctuated by spikes during notable events. DigiCert's data indicates sustained heavy load periods during busy seasons, making traditional off-peak periods obsolete.

This incessant demand results in heightened NXDOMAIN requests and irregular queries from automation, signalling a persistent backdrop of internet scanning, system misconfigurations, and automated reconnaissance.

  • Peak demand is becoming standardised.
  • Constant DNS pressure illustrates increased background noise.
  • Short-lived recovery tactics are outdated.
  • Security vulnerabilities are exacerbated by continual scanning.

The quarter witnessed a surge in DDoS attacks, gaining in frequency, scale, and span. Attackers shifted from brief disruptions to exhaustive campaigns designed to apply constant strain on systems.

  • DDoS no longer equates to transient hiccups; attacks endure longer.
  • Sustained attacks risk performance downgrades.
  • Defensive measures devised for brevity may falter.
  • Operations and costs are quietly burdened.

Web application assaults remain largely automated, characterised by persistent probing rather than overt exploitation. Attackers concentrate on pinpointing subtleties in application responses using techniques like cookie manipulation.

  • Applications experience continued background testing.
  • Stealthy attacks linger, evading easy detection.
  • Cumulative probing can magnify minor flaws.
  • Continuous defensive readiness is imperative.

What Q4 2025 demonstrates is that digital resilience has evolved. It is imperative to manage protracted high demand and sustained threat levels across DNS, network, and application tiers. In light of the emergence of botnets like Aisuru and Kimwolf, readiness doesn't remain optional and is an essential component of operational strategy.

Alteryx and Google Cloud team up in a partnership that aims to enhance BigQuery's accessibility,...
TELUS and RingCentral integrate AI features into Business Connect to support business...
Derek Whigham has been appointed Non-Executive Director and Strategic Advisor at Acumen Cyber,...
With AI adoption accelerating, cloud security faces unprecedented challenges. This article explores...
Pax8 has been named a Strategic Partner in the UK Government’s AI Skills Boost programme, which...
A recent survey uncovers the high stress levels experienced by UK IT and cyber professionals,...
Rackspace Technology adds Joseph Vito to lead global alliance partnerships.
Acora partners with Securonix to enhance cyber resilience and modernise security operations through...