The complex patterns of cyber threats in Q4 2025

DigiCert's latest RADAR Threat Intelligence Brief sheds light on the escalating cybersecurity landscape during the year's end.

DigiCert, a provider of intelligent trust solutions, has unveiled its Q4 2025 RADAR Threat Intelligence Brief, offering an analysis of the intersecting trends in global internet demand and cyber threats. Utilising vast amounts of data from DigiCert's expansive security architecture, encompassing UltraDNS, UltraDDoS Protect, and UltraWAF, RADAR gives an in-depth perspective on the dynamic threat environment.

The quarterly report highlights how end-of-year online activities exert pressure on internet infrastructure. The surge in digital engagement during this period — driven by commerce, travel, and increased device usage— coincides with a discernible rise in cyber threats, underscoring the urgency for multi-layered security approaches.

Ongoing Demand for Online Content: The period saw uninterrupted high growth in internet traffic, punctuated by spikes during notable events. DigiCert's data indicates sustained heavy load periods during busy seasons, making traditional off-peak periods obsolete.

This incessant demand results in heightened NXDOMAIN requests and irregular queries from automation, signalling a persistent backdrop of internet scanning, system misconfigurations, and automated reconnaissance.

  • Peak demand is becoming standardised.
  • Constant DNS pressure illustrates increased background noise.
  • Short-lived recovery tactics are outdated.
  • Security vulnerabilities are exacerbated by continual scanning.

The quarter witnessed a surge in DDoS attacks, gaining in frequency, scale, and span. Attackers shifted from brief disruptions to exhaustive campaigns designed to apply constant strain on systems.

  • DDoS no longer equates to transient hiccups; attacks endure longer.
  • Sustained attacks risk performance downgrades.
  • Defensive measures devised for brevity may falter.
  • Operations and costs are quietly burdened.

Web application assaults remain largely automated, characterised by persistent probing rather than overt exploitation. Attackers concentrate on pinpointing subtleties in application responses using techniques like cookie manipulation.

  • Applications experience continued background testing.
  • Stealthy attacks linger, evading easy detection.
  • Cumulative probing can magnify minor flaws.
  • Continuous defensive readiness is imperative.

What Q4 2025 demonstrates is that digital resilience has evolved. It is imperative to manage protracted high demand and sustained threat levels across DNS, network, and application tiers. In light of the emergence of botnets like Aisuru and Kimwolf, readiness doesn't remain optional and is an essential component of operational strategy.

AvePoint introduces AgentPulse Command Centre, advancing AI agent governance across multicloud...
Capita is expanding its partnership with Multiverse to train 250 additional employees in AI skills,...
Kiteworks and Kasm partner to provide secure data management for distributed teams and partner...
Red Cactus and Tollring launch AI conversation analytics to support CRM integration across over 200...
F5 reveals new AI-driven security features in its ADSP that aim to enhance application protection...
Teleport’s infrastructure identity platform has been named a 2026 SC Awards Finalist in the Best...
WSO2 unveils a fresh focus on supporting agentic enterprises, aiming to strengthen AI deployment...
ServiceNow introduces AI innovations, Autonomous Workforce and EmployeeWorks, aiming to enhance...