M
MercyNews
Home
Back
DDoS Attacks Double in 2025 as Threats Evolve
Technology

DDoS Attacks Double in 2025 as Threats Evolve

The digital landscape faced unprecedented assault in 2025. New data reveals a dramatic surge in both the volume and sophistication of DDoS attacks, forcing a fundamental shift in cybersecurity strategy.

Kommersant4h ago
3 min read
📋

Quick Summary

  • 1DDoS attacks increased dramatically in 2025, with official estimates reaching a 100% growth.
  • 2Attackers shifted from broad network floods to precise, multi-layered strikes.
  • 3Critical business services, especially payment systems, became primary targets.
  • 4Experts warn that traditional defense mechanisms are no longer sufficient.

Contents

The Digital SiegeA Surge in ScalePrecision Over PowerThe Business ImpactLooking Ahead

The Digital Siege#

The year 2025 marked a critical turning point in the landscape of cyber warfare. Distributed Denial of Service (DDoS) attacks did not just increase in frequency; they underwent a fundamental transformation in strategy and impact.

According to official assessments, the sheer volume of these incidents surged by 100% over the previous year. This dramatic escalation signals a new era where digital assaults are not merely more common, but significantly more dangerous and difficult to defend against.

A Surge in Scale#

The numbers paint a stark picture of an escalating threat environment. While cybersecurity specialists had already noted a substantial increase, official figures from regulatory bodies confirmed a doubling of attack volume throughout the year.

This isn't just a story of quantity. The nature of these attacks has evolved, moving away from simple brute force. The data highlights two critical trends:

  • A near 90% rise in the total number of recorded incidents
  • Official confirmation of a 100% growth rate in overall attack frequency
  • A shift toward more complex, coordinated assault vectors
"Instead of mass network loads, attackers increasingly use multi-layered and pinpoint impacts on critical business services."
— Cybersecurity Experts

Precision Over Power#

The most significant evolution in 2025 was the move from indiscriminate flooding to surgical strikes. Instead of overwhelming general network infrastructure, malicious actors increasingly deployed multi-layered and targeted attacks.

These new tactics focus on disrupting specific, high-value business functions. Payment processing systems, for instance, have become a favored target, as their disruption causes immediate and severe financial damage. This requires a completely different defensive posture from organizations.

Instead of mass network loads, attackers increasingly use multi-layered and pinpoint impacts on critical business services.

The Business Impact#

This strategic pivot places immense pressure on the market to innovate. The old methods of defense are proving inadequate against these sophisticated, new threats. Businesses can no longer rely on simple traffic filtering.

The focus has shifted to protecting the core logic of applications and ensuring the availability of essential services. Experts agree that this evolution demands principally new solutions for protection, moving the industry toward more intelligent, adaptive security frameworks.

Looking Ahead#

The events of 2025 have set a new baseline for cyber risk. The doubling of DDoS attacks, combined with their increased precision, represents a permanent shift in the threat landscape.

Organizations must now prepare for a future where attacks are both more frequent and more targeted. The key takeaway is clear: static defenses are obsolete. The path forward requires dynamic, intelligent security capable of defending against pinpoint strikes on critical infrastructure.

Frequently Asked Questions

The primary trend was a dramatic increase in both the volume and sophistication of attacks. Official data indicates the number of incidents doubled, while tactics shifted from broad network flooding to precise, targeted strikes on essential business services.

Attackers moved away from simple, high-volume traffic floods. They now employ complex, multi-layered strategies designed to disrupt specific critical services, such as payment systems, causing more direct and severe business impact.

The new threat landscape renders traditional security measures insufficient. Experts state that the market requires fundamentally new protection solutions that can defend against targeted, sophisticated assaults on core business functions rather than just general network perimeters.

#Телекоммуникации

Continue scrolling for more

AI Transforms Mathematical Research and Proofs
Technology

AI Transforms Mathematical Research and Proofs

Artificial intelligence is shifting from a promise to a reality in mathematics. Machine learning models are now generating original theorems, forcing a reevaluation of research and teaching methods.

Just now
4 min
278
Read Article
Andrew McCarthy of G-Squad Dies at 52
Entertainment

Andrew McCarthy of G-Squad Dies at 52

Andrew McCarthy, a member of the French boy band G-Squad, has died at the age of 52. The incident occurred at his home in Drancy, and an investigation has been opened.

21m
3 min
0
Read Article
mTOTP: The Future of Two-Factor Authentication?
Technology

mTOTP: The Future of Two-Factor Authentication?

A new project called mTOTP is exploring whether your smartphone could become your primary 2FA device, moving beyond traditional hardware tokens. The concept challenges traditional authentication methods by leveraging mobile device capabilities for enhanced security.

58m
5 min
6
Read Article
SNCF Orders 15 New TGVs from Alstom
Economics

SNCF Orders 15 New TGVs from Alstom

SNCF Voyageurs has placed a new order for 15 high-speed trains with Alstom, continuing a partnership established in 2016 to design the next generation of rail travel.

58m
5 min
6
Read Article
Shopify CEO Warns Against 'Founder Day Care' in Hiring
Technology

Shopify CEO Warns Against 'Founder Day Care' in Hiring

Shopify CEO Tobi Lütke warns that companies often make a critical mistake by sidelining founders they acquire, putting them in what he calls 'founder day care' instead of leveraging their unique leadership skills.

1h
5 min
17
Read Article
Bitchat: The Decentralized Bluetooth Messaging App
Technology

Bitchat: The Decentralized Bluetooth Messaging App

A new peer-to-peer messaging application called Bitchat has emerged, operating entirely over Bluetooth to create a decentralized communication network without relying on the internet.

2h
5 min
14
Read Article
Best Electric Bikes for Every Budget: January 2026 Guide
Technology

Best Electric Bikes for Every Budget: January 2026 Guide

A comprehensive guide to the best electric bicycles on the market, curated from thousands of miles of hands-on testing. Explore top picks for every budget this January.

2h
5 min
18
Read Article
FedEx CEO Rejects Standard Humanoid Robots for Warehouses
Technology

FedEx CEO Rejects Standard Humanoid Robots for Warehouses

FedEx CEO Raj Subramaniam has outlined why standard humanoid robots fall short for warehouse operations, advocating for more advanced 'super humanoid' designs with greater flexibility and dexterity for complex logistics tasks.

2h
7 min
21
Read Article
Europe's Race to Build Its Own AI Superpower
Technology

Europe's Race to Build Its Own AI Superpower

A new technological frontier is opening as Europe accelerates its quest for AI independence. The continent's longstanding alliance with the US is shifting, creating an urgent push for homegrown AI capabilities.

2h
5 min
17
Read Article
Ethereum's Quantum Readiness: The Walkaway Test
Technology

Ethereum's Quantum Readiness: The Walkaway Test

Ethereum's 'walkaway test' asks whether the network can remain credible, secure and adaptable without constant intervention, even as quantum risks loom.

2h
5 min
22
Read Article
🎉

You're all caught up!

Check back later for more stories

Back to Home