Rapid rise in cybercrime in Europe

Check Point External Risk Management, has published alarming findings in its report "Europe Threat Landscape Report 2024-2025", which addresses the rapid evolution of cyber threats. The report shows a 333 percent increase in credential theft, increasing supply chain attacks and the growing impact of AI-powered phishing.

Photo: Gorodenkoff

Organizations across Europe and the UK are at increased risk. Drawing on data from the Cyberint Argos Platform, the report analyzes 140,000 cyber threat alerts across critical industries, reveals significant vulnerabilities and provides strategic guidance for CISOs to combat emerging risks.

Most important results

 

  • AI phishing on the rise: A sharp rise in phishing attacks driven by generative AI has led to personalized and more convincing scams, rendering traditional detection methods obsolete.
  • Ransomware Evolution: Double and triple extortion ransomware methods are increasingly targeting sensitive sectors, including finance, healthcare and IT, with AI-enabled malware bypassing advanced defenses.
  • Threat to the supply chain increases: A staggering 84 percent of incidents at manufacturers in 2024 were due to supply chain vulnerabilities that exposed critical weaknesses in third-party relationships.
  • The challenges of remote working: Working from home remains a significant risk factor, as unsecured personal devices and home networks have become prime targets for malware and phishing.

 

Strategic recommendations for CISOs


The report identifies five key areas in which organizations should strengthen their defensive measures in 2025:

 

  1. Use of AI-based tools to combat sophisticated phishing and ransomware attacks.
  2. Strengthening supply chain security through real-time monitoring and supplier assessments.
  3. Implementation of zero-trust architectures to minimize risks through hybrid working models.
  4. Increase investment in endpoint security and securing private devices.
  5. Introduce rigorous employee training programs to reduce vulnerabilities due to human error.

 

Marco Eggerling, Global CISO at Check Point Software Technologies, comments on the report: "The rise of AI-powered phishing and AI-based ransomware reflects a shift in the threat landscape, where attackers are using advanced technologies to exploit vulnerabilities faster and on a larger scale. And with AI redefining both innovation and crime, it's critical for organizations to adapt their defenses to stay one step ahead. Generative AI, for example, has increased the sophistication of phishing and malware attacks, making them almost indistinguishable from legitimate communications. So the same AI innovations that are driving efficiency and creativity must also be used to defend against these emerging threats. In addition, hybrid working models are forcing companies to strike a balance between enabling flexible working and protecting their expanded attack surface. The same applies to the supply chain: with 84% of incidents linked to security breaches at manufacturers, the networking of business ecosystems poses a major challenge.

This report therefore highlights the need for companies to review their relationships with third party suppliers and invest in solutions that provide greater insight into supply chain risk. Investigating fourth party risk, i.e. companies that a third party supplier in turn engages, is also becoming increasingly important as the risk landscape expands."

"For all these reasons, a preventative approach to security and real-time threat monitoring is extremely important, as timely and helpful information has become the cornerstone of effective cyber security. It helps organizations to anticipate and neutralize risks before they become dangerous."

The Europe Threat Landscape Report 2024-2025 provides organizations with a helpful framework to navigate the cyber threat landscape and prepare for the challenges ahead.

Source: Check Point

 

(Visited 308 times, 1 visits today)

More articles on the topic

SECURITY NEWS

Stay informed about current security topics - practical and reliable. Receive exclusive content directly to your inbox. Don't miss any updates.

Register now!
register
You can unsubscribe at any time!
close-link