The complex patterns of cyber threats in Q4 2025

DigiCert's latest RADAR Threat Intelligence Brief sheds light on the escalating cybersecurity landscape during the year's end.

DigiCert, a provider of intelligent trust solutions, has unveiled its Q4 2025 RADAR Threat Intelligence Brief, offering an analysis of the intersecting trends in global internet demand and cyber threats. Utilising vast amounts of data from DigiCert's expansive security architecture, encompassing UltraDNS, UltraDDoS Protect, and UltraWAF, RADAR gives an in-depth perspective on the dynamic threat environment.

The quarterly report highlights how end-of-year online activities exert pressure on internet infrastructure. The surge in digital engagement during this period — driven by commerce, travel, and increased device usage— coincides with a discernible rise in cyber threats, underscoring the urgency for multi-layered security approaches.

Ongoing Demand for Online Content: The period saw uninterrupted high growth in internet traffic, punctuated by spikes during notable events. DigiCert's data indicates sustained heavy load periods during busy seasons, making traditional off-peak periods obsolete.

This incessant demand results in heightened NXDOMAIN requests and irregular queries from automation, signalling a persistent backdrop of internet scanning, system misconfigurations, and automated reconnaissance.

  • Peak demand is becoming standardised.
  • Constant DNS pressure illustrates increased background noise.
  • Short-lived recovery tactics are outdated.
  • Security vulnerabilities are exacerbated by continual scanning.

The quarter witnessed a surge in DDoS attacks, gaining in frequency, scale, and span. Attackers shifted from brief disruptions to exhaustive campaigns designed to apply constant strain on systems.

  • DDoS no longer equates to transient hiccups; attacks endure longer.
  • Sustained attacks risk performance downgrades.
  • Defensive measures devised for brevity may falter.
  • Operations and costs are quietly burdened.

Web application assaults remain largely automated, characterised by persistent probing rather than overt exploitation. Attackers concentrate on pinpointing subtleties in application responses using techniques like cookie manipulation.

  • Applications experience continued background testing.
  • Stealthy attacks linger, evading easy detection.
  • Cumulative probing can magnify minor flaws.
  • Continuous defensive readiness is imperative.

What Q4 2025 demonstrates is that digital resilience has evolved. It is imperative to manage protracted high demand and sustained threat levels across DNS, network, and application tiers. In light of the emergence of botnets like Aisuru and Kimwolf, readiness doesn't remain optional and is an essential component of operational strategy.

TXP has partnered with Otera to support the deployment of AI decision agents in UK mid-market...
Apex Computing has achieved a third Microsoft Solutions Partner designation, adding Microsoft...
Dynatrace announces acquisition of Bindplane to help strengthen its observability capabilities and...
Infosys and Harness have entered a strategic partnership to integrate AI into software delivery,...
Emerson Electric has updated its Guardian Digital Platform with additional AI capabilities and...
The National Geographic Society is collaborating with AWS to digitise and centralise its media...
CirrusHQ appoints Matt Smith as Head of Sales to support its cloud partnerships and organisational...
Argos99, launched by Fenix24, is a SaaS platform designed to support cyber resiliency and...