2025 Email Threats Report: AI's Impact on Security Measures

Edward Zhou
Edward Zhou

CEO & Co-Founder

 
July 15, 2025
3 min read

Key Findings from the 2025 Email Threats Report

The 2025 Email Threats Report by Barracuda Networks highlights the evolution of email-based threats, focusing on advanced tactics employed by cybercriminals.

83% of malicious Microsoft 365 documents contain QR codes that lead to phishing websites.

1 in every 4 HTML attachments are malicious.

20% of companies experience at least one account takeover (ATO) incident each month.

12% of malicious PDF attachments are Bitcoin sextortion scams.

Email Threat Landscape Overview

Barracuda's analysis of 670 million emails in February 2025 reveals that email continues to be the most common attack vector, with a staggering 24% of messages classified as either malicious or unwanted spam. The report underlines the need for organizations to adopt stringent security measures to combat these threats, particularly given the high prevalence of malicious attachments and links.

87% of binaries detected were malicious, emphasizing the critical need for policies against executable files sent via email. HTML files, while less common, showed a notable malicious rate of 23%, often utilized for phishing and credential theft.

Insights from Fortra's 2025 Email Threat Intelligence Report

According to Fortra's 2025 Email Threat Intelligence Report, which analyzed over one million unblocked email threats from 2024, response-based social engineering tactics and links to phishing sites constituted 99% of the examined threats. Only 1% of malicious emails delivered malware, indicating that pre-delivery email defenses are more effective against malware than against sophisticated phishing attacks.

The report highlights the increasing sophistication of adversaries, utilizing simple emails with phone numbers and QR codes to lure victims into insecure environments, making detection challenging. As cybercriminals adopt generative AI to refine their tactics, the need for robust security practices becomes even more paramount.

“The incorporation of AI and trusted tools, paired with an unimaginable amount of stolen personal data, means today’s phishing campaigns are more likely than ever to compromise users,” stated Matt Reck, CEO of Fortra.

Specific Threats Highlighted

The report emphasizes several alarming trends:

  • Phishing and Account Takeovers: Approximately 20% of organizations face at least one ATO incident monthly. Attackers exploit weak passwords and phishing schemes to gain access.
  • Malicious QR Codes: A significant percentage of malicious attachments, including 68% of PDFs and 83% of Microsoft documents, contain QR codes directing users to phishing sites.
  • Bitcoin Sextortion Scams: These scams account for 12% of malicious PDF attachments, highlighting the need for vigilance against fear-based tactics.

Advanced Threat Detection and Recommendations

Olesia Klevchuk, Barracuda’s product marketing director for Email Protection, remarked, “Email remains the most common attack vector for cyberthreats because it provides an easy entry point into corporate networks.” A multi-layered approach to email security is crucial, incorporating AI-driven threat detection and best practices, such as implementing DMARC to thwart impersonation attacks.

As organizations navigate the evolving threat landscape, staying informed about the latest risks and adopting comprehensive security measures are essential for safeguarding against email-based attacks.

Explore how Gopher Security can help enhance your email security strategy and protect your organization against these emerging threats.

Edward Zhou
Edward Zhou

CEO & Co-Founder

 

CEO & Co-Founder of Gopher Security, leading the development of Post-Quantum cybersecurity technologies and solutions.

Related News

2026 Cybersecurity Trends: Dominance of Vulnerability Exploits
vulnerability exploits

2026 Cybersecurity Trends: Dominance of Vulnerability Exploits

Vulnerability exploits now account for 40% of cyber intrusions, surpassing phishing. Learn how shrinking patch windows and edge device targets are changing security.

By Brandon Woo April 6, 2026 3 min read
common.read_full_article
Surge in Vulnerability Exploits: Cyber Intrusions Trends 2026
cybersecurity trends 2026

Surge in Vulnerability Exploits: Cyber Intrusions Trends 2026

Vulnerability exploits now drive 40% of cyberattacks as hackers weaponize flaws within hours. Learn why traditional patching is failing and how to adapt. Read more.

By Divyansh Ingle March 30, 2026 3 min read
common.read_full_article
Surge in Vulnerability Exploits Dominates 2026 Cyber Intrusions
Vulnerability Exploitation

Surge in Vulnerability Exploits Dominates 2026 Cyber Intrusions

Hackers are weaponizing zero-days within hours of disclosure, leaving traditional patch cycles in the dust. Learn how to bridge the security gap with MFA and Zero-Trust.

By Alan V Gutnov March 23, 2026 4 min read
common.read_full_article
Vulnerability Exploits Dominate Cyber Intrusions in 2026 Trends
vulnerability exploits

Vulnerability Exploits Dominate Cyber Intrusions in 2026 Trends

Exploits are the leading cause of cyber intrusions, outpacing phishing. Discover the latest trends and essential strategies to protect your organization. Read now!

By Brandon Woo March 16, 2026 3 min read
common.read_full_article