
"The report is based on the analysis of nearly 4,900 cybersecurity incidents recorded between July 2024 and June 2025. This includes publicly reported incidents, as well as attacks reported to ENISA by EU countries and members of an ENISA information sharing program."
"ENISA's report covers a wide range of attacks and threats and it does not focus on OT. However, it reveals that 18.2% of threats observed during the study period were aimed at these types of systems, after mobile threats, which accounted for 42% of attacks, and web threats, which accounted for 27%."
""Operational technology threats represent 18.2%, reflecting the growing exposure of industrial and critical systems as they continue being increasingly connected and targeted," ENISA noted."
""Z-Pentest's attacks aim to weaken industrial and control systems (ICS/SCADA) in Western countries, thereby strengthening Russia's geopolitical influence by exploiting the technological vulnerabilities of its enemies," Orange Cyberdefense said."
ENISA's analysis covers nearly 4,900 cybersecurity incidents recorded between July 2024 and June 2025, including publicly disclosed incidents and attacks reported by EU countries and an ENISA information-sharing program. Mobile threats accounted for 42% of attacks, web threats 27%, and operational technology (OT) threats 18.2%, indicating growing exposure of industrial and critical systems as they become more connected and targeted. Many disclosed OT and ICS attacks are attributed to hacktivists or actors claiming ideological motives but linked to state-sponsored activity. The pro-Russian NoName057(16) is known for DDoS activity and is linked to the Z-Pentest Alliance, which Orange Cyberdefense describes as aiming to weaken ICS/SCADA in Western countries to bolster Russia's geopolitical influence.
Read at SecurityWeek
Unable to calculate read time
Collection
[
|
...
]