In today’s fast-paced and hyperconnected world, cyber risks are no longer just an IT concern, they are a fundamental business risk. The stakes are high: reputation, operations, customer trust, and financial stability are all on the line. As the threat landscape continues to evolve, businesses need to be agile in how they anticipate, detect, and respond.
At TD, we are more than a financial partner—we are committed to supporting your organization's efforts to become more resilient and secure. To deliver on that commitment, we have developed this Cyber Trends Report with you in mind. It serves as a practical, insight-rich resource designed to help you better understand potential risks and make informed decisions in an increasingly complex digital environment.
In this report, you will find highlights of key cyber threats and trends we have observed, from the growing use of AI by malicious actors to sophisticated phishing campaigns, ransomware tactics, and sector-specific vulnerabilities. You will also find actionable insights and best practices that can help strengthen your organization’s cyber readiness.
Whether you are looking to enhance your internal defenses, educate your teams, or simply stay ahead of what’s next, we trust that this report offers timely value to sharpen your strategy.
Together, we can build a more secure digital future.

Cyber Threat Landscape 2025
AI-Enhanced Fraud and Deepfakes
What’s New: Generative AI is fueling a wave of hyper-personalized scams and business email compromise (BEC). Deepfake technology is now used to impersonate executives in video calls, with one real-world case involving a $25 million loss via a fake CFO Zoom call.
Industry Insight: GenAI is helping threat actors scale operations and launch attacks in multiple languages, bypassing traditional email filters and evading user suspicion. The report notes the emergence of "scams-as-a-service" using GenAI.
Actions for Commercial Clients:
- Adopt advanced email filtering and behavioral analytics
- Train staff on GenAI-enabled phishing and deepfakes
- Implement smart friction: secondary verifications for high-risk transactions
Supply Chain Attacks & Vendor Concentration Risk
What’s New: Threat actors increasingly exploit critical software components and managed file transfer (MFT) platforms. High-profile vulnerabilities in MOVEit, Cleo, and XZ Utils led to mass data exposure across sectors.
Industry Insight: A breach in a single shared vendor can ripple across dozens of firms. Diversifying vendors may reduce concentration risk but can also introduce less mature partners.
Actions for Commercial Clients:
- Conduct vendor risk audits
- Request SBOMs (Software Bill of Materials) from IT suppliers
- Build incident response plans that include third-party breaches
Ransomware Goes Big-Game Hunting
What’s New: In 2024, the number of attacks declined, but ransom demands reach historic highs—including a record $75 million payout. Ransom-as-a-Service (RaaS) continues to become more professionalized, employing double and triple extortion tactics.
Industry Insight: Financial services, healthcare, government (municipalities) and the education sector remain among the top targets for ransomware operators. RaaS operators quickly rebrand to evade law enforcement and sanctions.
Actions for Commercial Clients:
- Test ransomware incident response plans
- Implement strong and secure backups
- Segment networks and monitor for lateral movement
Distributed Denial-of-Service (DDoS) Attacks Surge Amid Geopolitical Tensions
What’s New: DDoS attacks are increasingly used to disrupt services and distract from more damaging intrusions. Campaigns linked to hacktivists surged around geopolitical flashpoints, impacting firms in APAC, EMEA, and North America.
Industry Insight: Financial services was the most targeted sector for DDoS in 2024, accounting for 34% of attacks (Akamai).
Actions for Commercial Clients:
- Ensure upstream DDoS protections are active and monitored
- Run stress tests on key services and Application Programming Interfaces (APIs) to ensure reliability and security
- Prepare communication, intervention and action plans for outages

Emerging Technologies & Defensive Priorities
Generative AI & Shadow AI Risks
What’s New: Employees are experimenting with GenAI without oversight (“shadow AI”), exposing firms to data leakage and IP loss. Meanwhile, threat actors use Large Language Models (LLMs)—advanced artificial intelligence tools—to produce convincing phishing emails and malicious code.
Industry Insight: Threat actors aren’t yet using GenAI to discover novel vulnerabilities, but they’re accelerating attack cycles with more polish and scale. AI governance and internal education are now critical.
Actions for Commercial Clients:
- Create an AI governance policy
- Monitor AI tool usage and ensure data controls
- Require human oversight in GenAI use cases
Emerging Technologies & Defensive Priorities
Quantum Computing: The Crypto Clock is Ticking
What’s New: With new quantum chip advancements from Microsoft and Amazon, the risk of current encryption becoming obsolete is real. Threat actors are already harvesting encrypted data to decrypt later.
Industry Insight: Firms that delay quantum readiness risk significant exposure. Post-quantum cryptography (PQC) migration may take years.
Actions for Commercial Clients:
- Begin inventorying cryptographic assets
- Prioritize sensitive long-retention data (e.g., loan files)
- Start piloting NIST-approved PQC algorithms
Nation-State and Hacktivist Attacks
What’s New: Attacks from groups affiliated with China, Russia, Iran, and North Korea are expanding. Financial institutions are often indirect targets due to their dependence on third-party tech or geopolitical positioning.
Industry Insight: North Korean threat actors stole $2.2B in cryptocurrency in 2024 and infiltrated Western financial firms by posing as IT workers. Volt Typhoon (China) and Midnight Blizzard (Russia) conduct pre-positioning campaigns.
Actions for Commercial Clients:
- Vet remote hires and offshore vendors
- Watch for misinformation/disinformation threats
- Engage in tabletop exercises involving geopolitical disruptions
No part of this publication may be reproduced in any form, or referred to in any other publication, without express written permission. All rights reserved. All trademarks are the property of their respective owners. The TD logo and other trademarks are the property of The Toronto-Dominion Bank or a wholly-owned subsidiary, in Canada and/or other countries.
©2025, TD Bank, N.A.