The complex patterns of cyber threats in Q4 2025

DigiCert's latest RADAR Threat Intelligence Brief sheds light on the escalating cybersecurity landscape during the year's end.

  • Monday, 9th February 2026 Posted 2 hours ago in by Sophie Milburn
DigiCert, a provider of intelligent trust solutions, has unveiled its Q4 2025 RADAR Threat Intelligence Brief, offering an analysis of the intersecting trends in global internet demand and cyber threats. Utilising vast amounts of data from DigiCert's expansive security architecture, encompassing UltraDNS, UltraDDoS Protect, and UltraWAF, RADAR gives an in-depth perspective on the dynamic threat environment.

The quarterly report highlights how end-of-year online activities exert pressure on internet infrastructure. The surge in digital engagement during this period — driven by commerce, travel, and increased device usage— coincides with a discernible rise in cyber threats, underscoring the urgency for multi-layered security approaches.

Ongoing Demand for Online Content: The period saw uninterrupted high growth in internet traffic, punctuated by spikes during notable events. DigiCert's data indicates sustained heavy load periods during busy seasons, making traditional off-peak periods obsolete.

This incessant demand results in heightened NXDOMAIN requests and irregular queries from automation, signalling a persistent backdrop of internet scanning, system misconfigurations, and automated reconnaissance.

  • Peak demand is becoming standardised.
  • Constant DNS pressure illustrates increased background noise.
  • Short-lived recovery tactics are outdated.
  • Security vulnerabilities are exacerbated by continual scanning.

The quarter witnessed a surge in DDoS attacks, gaining in frequency, scale, and span. Attackers shifted from brief disruptions to exhaustive campaigns designed to apply constant strain on systems.

  • DDoS no longer equates to transient hiccups; attacks endure longer.
  • Sustained attacks risk performance downgrades.
  • Defensive measures devised for brevity may falter.
  • Operations and costs are quietly burdened.

Web application assaults remain largely automated, characterised by persistent probing rather than overt exploitation. Attackers concentrate on pinpointing subtleties in application responses using techniques like cookie manipulation.

  • Applications experience continued background testing.
  • Stealthy attacks linger, evading easy detection.
  • Cumulative probing can magnify minor flaws.
  • Continuous defensive readiness is imperative.

What Q4 2025 demonstrates is that digital resilience has evolved. It is imperative to manage protracted high demand and sustained threat levels across DNS, network, and application tiers. In light of the emergence of botnets like Aisuru and Kimwolf, readiness doesn't remain optional and is an essential component of operational strategy.