Cyber threats in 2025: What’s at stake for Philippine enterprises and consumers?

1 day ago 8
Suniway Group of Companies Inc.

Upgrade to High-Speed Internet for only ₱1499/month!

Enjoy up to 100 Mbps fiber broadband, perfect for browsing, streaming, and gaming.

Visit Suniway.ph to learn

Screenshot 2025-04-03 at 3.16.16 PM.png

As the digital landscape continues to evolve, so do the threats looming over businesses and individuals alike. With artificial intelligence (AI), cloud computing, and Web3 technologies advancing at an unprecedented pace, cybercriminals are also refining their tactics to exploit vulnerabilities.

Fortunately, Manila Bulletin TechNews was one of the participants who attended Trend Micro’s webinar, which tackled cyber threats. Trend Micro, a global cybersecurity leader, unveiled its Security Predictions 2025, offering a critical analysis of emerging threats and their implications for Philippine enterprises and consumers. The discussion, led by Ian Felipe (Country Manager, Trend Micro Philippines), Raymond Almanon (Senior Security Specialist), and Monte de Jesus (Senior Threat Researcher), underscored the urgent need for businesses and individuals to adopt a proactive stance against cyber risks.

The Expanding Attack Surface: What to Watch Out For

One of the primary concerns highlighted in the session was the expansion of the attack surface. With businesses increasingly relying on cloud-based solutions, the risk of cloud-native worm attacks has grown significantly. These self-propagating threats can exploit misconfigurations and security gaps, infiltrating multiple layers of an organization’s infrastructure.

Moreover, data manipulation has emerged as a major threat, particularly in AI-powered systems. Malicious actors are now targeting machine-learning models, poisoning data sets, and skewing outputs to serve fraudulent purposes. This has profound implications for financial institutions, healthcare providers, and any industry leveraging AI for decision-making.

AI and Social Engineering: The Rise of Hyper-Personalized Attacks

One of the questions I raised was how to spot an AI-driven attack and how it can be prevented using an AI tool as well. Such a tricky question, but I believe that with the rapid evolution of generative AI, cybercriminals are leveling up their social engineering tactics. Phishing campaigns, for instance, are no longer confined to generic, mass-targeted emails. Instead, attackers now craft hyper-personalized lures using AI-driven insights, making it increasingly difficult for even the most tech-savvy individuals to distinguish scams from legitimate communications.

Fraudsters also use deepfake technology to manipulate voices and video content, making impersonation scams more convincing than ever. This is particularly alarming for enterprises that rely on virtual meetings and remote work setups, as high-level executives can easily become unsuspecting targets of financial fraud.

Another critical area of concern is the rising frequency of software supply chain attacks. These attacks, which compromise the development and deployment processes of software providers, pose a substantial risk to businesses that rely on third-party applications. Trend Micro’s experts emphasized the importance of securing Continuous Integration/Continuous Deployment (CI/CD) systems, as attackers are now leveraging this weak link to infiltrate larger networks.

For Philippine enterprises, which are increasingly integrating global software solutions into their operations, ensuring supply chain security must be a top priority. Failure to do so could result in massive financial and reputational losses.

Blockchain: The New Frontier for Cybercrime

While blockchain technology has been lauded for its security features, cybercriminals are now identifying ways to exploit its vulnerabilities. Trend Micro predicts that blockchain-based platforms will become a fresh hunting ground for attackers, leading to new forms of extortion and fraud.

For instance, vulnerabilities in smart contracts and decentralized finance (DeFi) platforms could be manipulated to siphon funds from unsuspecting users. As more businesses and individuals invest in cryptocurrencies and blockchain-based services, staying informed about emerging threats is essential.

Preparing for the Future: What Can Businesses and Consumers Do?

In light of these growing cybersecurity risks, Trend Micro emphasized the need for a multi-layered defense strategy. Businesses, regardless of size, must invest in robust security solutions that include:

  • Cloud Security Measures – Protecting cloud environments from misconfigurations and unauthorized access.
  • AI Model Protection – Ensuring data integrity and preventing model poisoning in AI-driven systems.
  • Employee Cybersecurity Training – Equipping staff with the knowledge to identify and prevent social engineering attacks.
  • Supply Chain Security Audits – Vetting third-party providers to minimize software vulnerabilities.
  • Proactive Threat Intelligence – Leveraging AI-driven security solutions to anticipate and counter evolving threats.

For consumers, adopting basic cybersecurity hygiene can go a long way in preventing attacks. Using multi-factor authentication (MFA), enabling automatic software updates, and staying vigilant against phishing attempts are some of the simplest yet most effective steps individuals can take to safeguard their digital presence.

Easy Way In/Out

With the country’s rapid digital transformation, the Philippines is both an emerging hub for innovation and a growing target for cyber threats. As businesses and individuals become more reliant on technology, the risks also multiply. However, by staying informed and investing in preventive cybersecurity measures, Philippine enterprises and consumers can navigate the digital landscape with greater confidence.

Trend Micro’s 2025 security predictions serve as a timely reminder that cybersecurity is not a one-time investment—it’s an ongoing battle that requires vigilance, adaptation, and a proactive approach. By staying ahead of the threat curve, organizations and individuals alike can turn cybersecurity from a reactive necessity into a strategic advantage.

Read Entire Article