Table of ContentsToggle Table of Content

Tony Campbell on four key takeaways from the 2025 Cyber Threat Report.

What you need to know from the latest Australian Cyber Threat Report - from blurred lines between state and criminal actors to the growing impact of AI and ransomware beyond just IT teams.

AdobeStock 290894731

The Australian Signals Directorate’s 2024–25 Annual Cyber Threat Report lays bare the realities of Australia’s threat landscape. Ransomware remains rampant, AI is transforming attack capabilities, and basic defences are still letting organisations down.

After three decades working in cyber security, I’ve learned that these reports aren’t just about numbers – they’re roadmaps for how we adapt. Here are my four key insights from this year’s report, and what I believe Australian organisations need to take away from it.

1. The lines between nation states and criminals are blurring

It’s pretty clear now that the boundary between state-sponsored and criminal cyber threat actors is blurring.

Today’s attackers are using the same collection of tactics, techniques, and tools, whether their motive is espionage, extortion, or disruption.

This kind of convergence on the threat actor side demands a new approach to defence, with threat intelligence and incident response sitting at the heart of every cyber strategy.

I’ve been saying for a while now that the distinction between espionage and extortion is fast disappearing – and this year’s threat report proves it.

Whether an actor is working on behalf of a nation state or an organised criminal group, the tactics are often identical.

They exploit the same vulnerabilities, use the same attack frameworks, and even share infrastructure.

That means defenders can no longer rely on classifying an attack by its motive. We need to detect and respond based on behaviour.

Threat intelligence and incident response must sit at the centre of every cyber strategy, not on the periphery.

If you can’t see what’s happening in your network – and act on it fast – you’re already on the back foot.

2. Cyber hygiene remains the strongest line of defence

Strong intercept-resistant multi-factor authentication, unique passwords, tested backups, and timely patching are critical.

The fundamentals haven’t changed – the advice provided on how to shore up defences is still industry best practice.

The ACSC’s data shows again that these basic cyber hygiene measures prevent most incidents – yet too many organisations are still woefully exposed.

That’s the frustrating part. Every year the ACSC reminds us that basic hygiene stops most attacks, and every year we see organisations skip them.

Multi-factor authentication, password management, patching, and regular, tested backups aren’t exciting topics, but they are the bedrock of resilience.

I often see organisations investing heavily in shiny new tools while leaving these gaps wide open.

Until every business treats cyber hygiene like workplace safety – routine, monitored, and non-negotiable – we’ll keep seeing the same preventable incidents.

3. AI is transforming both attack and defence

AI-based tools are taking over on the tools side for threat actors, especially in the most sophisticated actor arsenals.

Malicious actors, even the small-time criminal ones, are using AI to automate phishing, analyse stolen data, and orchestrate denial-of-service campaigns.

You no longer need to be a technical genius to launch a sophisticated attack; AI does the heavy lifting.

We need to be investing research and time into defending against these AI-driven threats, which requires equally adaptive, intelligent security controls.

To stay ahead, we need to be just as adaptive. AI should be part of our defence strategy – analysing patterns, detecting anomalies, and automating responses faster than humans ever could.

But it must be deployed responsibly, with governance and ethics front of mind.

AI will make us safer, but only if we remain in control of how it’s used.

4. Ransomware still tops the list of costly and disruptive threats

Ransomware is still the most disruptive and costly cyber threat facing Australian organisations.

The average cost to large businesses has jumped up by 219%. That’s a huge cost.

But often we forget that the risk equation isn’t just about dollars – it includes the erosion of customer trust and operational continuity.

We’re now seeing ransomware gangs shift their focus toward operational technology systems, which makes this more than a corporate risk – it’s a national one.

Building resilience at scale means embedding recovery and continuity planning at every level: technical, operational, and executive.

It’s not enough to recover your data; you must be able to recover your confidence and your customers’ trust, too.

The bottom line

Cyber security today isn’t about building higher walls – it’s about building stronger systems that can adapt, respond, and recover.

We can’t control the sophistication of threat actors, but we can control how ready we are for them.

The 2025 report adds to the cacophony of alarm bells that have long been ringing. But it’s also a reminder that resilience is within reach – if we treat it as a shared responsibility across every organisation, every industry, and every Australian.

Learn more about Kinetic IT’s Enterprise Security solutions.

About Tony Campbell

Tony Campbell

Tony Campell / Enterprise Security Service Line Manager

Tony Campbell has over two decades of experience in technology and security. He has led enterprise-scale projects, authored technical books, and served as a technical editor for Apress Inc. A co-founder of Digital Forensics Magazine, Tony also developed security training for Infosec Skills. At Kinetic IT, he leads cyber consulting and advisory services.

Follow Tony Campbell on LinkedIn for more insights.

2023 Global SIAM Survey 5-year whitepaper.

We respect your privacy and will never share your information. Privacy Policy
Kinetic-IT-and-ServiceNow

ServiceNow Ecosystem Partners 2023 Report.

We respect your privacy and will never share your information. Privacy Policy
Kinetic-IT-and-ServiceNow

5 tips to unlock value in your ServiceNow Configuration Management Database.

We respect your privacy and will never share your information. Privacy Policy
Kinetic-IT-and-ServiceNow
Before you leave we’d like to offer you an exclusive insight!

5 tips to unlock value in your ServiceNow Configuration Management Database.

We respect your privacy and will never share your information. Privacy Policy

Speak with a Kinetic IT Expert about how our technology can help your business.

Speak with a Kinetic IT Expert.

Complete this form to begin a conversation with one of our Kinetic IT experts.

Enhance your user experience.

Complete the form and submit your enquiry to begin a conversation with us about how we can help your business operations.

Transform Your Organisation.

Complete the form and submit your enquiry to begin the transformation process.

Fill out the form to access this webinar content.

Provide your details to watch this on demand webinar and read the companion guide.

ISG Provider Lens™ ServiceNow Ecosystem Partners 2024 Report.

Name

We respect your privacy and will never share your information. Privacy Policy