
The latest report released by Kaspersky ICS CERT on June 10 indicates that in the first quarter of 2025, 21.9% of global Industrial Control System (ICS) computers encountered malicious object attacks, a figure that remains stable compared to the previous quarter.
The report emphasizes that the internet has become the primary source of threats to Operational Technology (OT) infrastructure across all regions. This pervasive threat primarily arises from ICS computers accessing malicious or compromised network resources, as well as content disseminated through instant messaging tools, cloud storage, and Content Delivery Networks (CDNs). Regionally, Africa has the highest proportion of affected ICS computers at 29.6%, while Northern Europe has the lowest at 10.7%. This disparity highlights the regional imbalance in cybersecurity maturity, reflecting a systemic lack of investment in cybersecurity tools, expertise, and awareness in vulnerable areas.
Specifically, Africa (12.76%), Southeast Asia (12.32%), and Central Asia (9.50%) face higher internet threats, including blacklisted internet resources, malicious scripts, phishing pages, cryptojacking programs, and spyware. Email clients are the second largest source of threats, particularly in Southern Europe (6.76%), the Middle East (5.17%), and Latin America (4.55%).
Kaspersky’s findings urge industries to enhance cybersecurity investments by strengthening perimeter defenses, network segmentation, and employee training to protect critical OT environments from an increasingly complex threat ecosystem.
Original link:
https://gbhackers.com/new-report-highlights-the-internet-as-the-primary-threat/
Source: Security Cow
Hot Topics
HOT!!
Academician Wu Jiangxing: Research on AI’s Inherent Security Issues and Trustworthy Application Systems
Call for Papers | 16 Hot Topics, Contributions Welcome!
New Book Release | Academician Wu Jiangxing Publishes Latest English Work
Trustworthy Inherent Security, Structural Metamorphic Computing Technology Selected for the “New Generation Information Engineering Science and Technology New Quality Product Technology Alternative List (2024)”
Welcoming a New Era of Cyber Resilience! The Fourth Academic Conference on Inherent Security in Cyberspace and the Seventh “Strong Network” Metamorphic Defense International Elite Challenge Concluded Successfully
Blue Paper Download | The Fourth Academic Conference on Inherent Security in Cyberspace, Five Blue Papers Released
Official Release! The Theory and Standards System of Inherent Security in Cyberspace Selected as One of the Top Ten Technological Advances in the Information and Communication Field (with Manual)
Submitting the “2025 Cybersecurity Ecosystem High-Quality Development Year-End Report” The Cyber Communication Security Integration Ecosystem Innovation Development Conference Held in Ning
| Previous Reviews
Academician Wu Jiangxing: How to Ensure AI Application Systems are Safe and Beneficial
Academician Wu Jiangxing Teaches Students of the Five-Color Stone Pilot Class
National Development and Reform Commission Sets the Tone for Low-altitude Economy: No Safety, No Low-altitude!
Ukrainian “Spider Web” Raid: How Cheap Drones Penetrate Russian Defense Lines?
Huawei’s Ren Zhengfei: Artificial Intelligence is the Last Technological Revolution of Human Society
Academician Wang Jian of the Chinese Academy of Engineering: The Journey to Explore Space Requires the Company of Computing
New Changes in Data Security: Compliance, Auditing, and Monitoring
