Europe
We've curated 67 cybersecurity statistics about Europe to help you understand how data protection laws and emerging threats are shaping the cybersecurity landscape across the continent in 2025.
Related Topics
Showing 21-40 of 67 results
30% of professionals indicated that workforce upskilling in data security is very important in 2026.
51% of professionals anticipate difficulty filling digital trust roles with qualified candidates in 2026.
Only 18% of professionals feel fully ready for new regulations like NIS2 and DORA in 2026.
18% of professionals believe increased government funding for cyber skills and workforce development is the most important factor for enhancing cybersecurity resilience in their country.
32% of professionals expect regulatory complexity and global compliance risks to be major concerns in 2026.
45% of professionals indicated they will be hiring for more digital trust roles in 2026 than in 2025.
41% of professionals support statutory cybersecurity guidance for high-risk sectors in 2026.
59% of professionals identified AI-driven social engineering as a significant cyber threat for 2026.
64% of professionals ranked regulatory compliance as a very important priority in 2026.
Only 14% of professionals reported that their organization is very prepared to manage generative AI risks in 2026.
63% of professionals expect to hire for digital trust roles in 2026.
DEVMAN has claimed 19 ransomware attacks across Asia, Africa, Europe, and Latin America.
Public Administration was the most targeted sector in the EU, accounting for just over 38% of incidents.
Phishing (including malspam, vishing, and malvertising) was the dominant intrusion vector, accounting for approx. 60% of cases..
Top Shares of Recorded Incidents by Sector in the EU: 38.2%: Public Administration, 28.5%: Unknown, 7.5%: Transport (second most targeted sector), 4.8%: Finance, 4.5%: Energy, 2.9%: Education, 2.3%: Health, 2.2%: Digital Infrastructure & Services, 1.7%: Manufacturing, 1.2%: Media & Entertainment.
13.4% of assessed objectives were financially-motivated.
State-aligned operations, often driven by low-impact DDoS campaigns targeting EU Member States’ organisations’ websites, resulted in service disruption in only 2% of incidents.
79.4% of assessed objectives were ideology driven.
Vulnerability exploitation accounted for 21.3% of initial access vectors.
7.2% of assessed objectives were cyberespionage.