Discover the key insights from our new Cybersecurity Report H1 2025 – now available.

Whitepapers & Co

Cybersecurity Report H1 2025

The Myra Cybersecurity Report H1 2025 provides IT decision-makers with practical insights to strengthen business resilience and proactively counter cyber threats. Discover how you can align your cybersecurity measures even more effectively with the latest analyses, trends, and recommendations.

 
✔ Current threat situation in Germany and the EU

✔ Cyber hotspots: finance, public sector, and KRITIS (critical infrastructure)

✔ Digital sovereignty: strategies for a change of course

✔ Offensive AI: an overview of strategies and technologies
 

Download without registration

Key Insights at a Glance

Dynamic Threat Landscape

The tense and dynamic cybersecurity situation will remain a key challenge in Germany in 2025. Although the attacks documented and repelled by Myra in the first half of the year were down 18.5% year-on-year, the technical sophistication, targeting, and intensity of the attacks are increasing significantly.

  • Highly regulated sectors are particularly affected: Around 40% of all attacks were directed at banks and financial service providers.

  • Attackers are also focusing on critical infrastructure and the public sector.

  • Attackers are deliberately using global cloud infrastructures to conceal attacks and further increase their impact.

  • The technology industry recorded the strongest attacks, with some attacks lasting up to two days.

Expert Insights: Strategies for Greater Digital Independence

In conversation with Prof. Dr. Louisa Specht-Riemenschneider, Federal Commissioner for Data Protection and Freedom of Information (BfDI), and Prof. Dr. Dennis-Kenji Kipker, cybersecurity expert and member of the Myra Advisory Board, we shed light on the complex interplay between digital sovereignty, data protection, and cyber resilience.

(Download the report now to read the entire chapter.)

Prof. Dr. Kipker, cyberattacks repeatedly demonstrate how vulnerable digital infrastructures in Germany still are. In your opinion, what are the biggest challenges in defending against cyberattacks, such as DDoS?

We must bear in mind that defending against DDoS attacks has long been more than just a technical issue – it's about supply chains, compliance, liability, and digital sovereignty. This is because defending against overload attacks – for example, through traffic analysis and filtering – requires service providers to look deep into data traffic and intervene. This entails not only technical risks, but also significant compliance risks. This is particularly true when personal or business-critical data is involved.

As a company, I have to ensure that the service providers I use are trustworthy and comply with all regulatory requirements in order to minimize liability risks and guarantee system availability. The basis for this is clean risk management, on the basis of which the service provider is thoroughly checked via due diligence.

Prof. Dr. Specht-Riemenschneider, in recent years, Germany's dependencies in areas such as health, energy, and IT have become increasingly apparent. How can these dependencies be reduced and Germany's sovereignty strengthened?

The dependencies are often known, but are addressed too late or not with the necessary consistency. A key reason for this is that economic efficiency and short-term cost savings have long been a priority, while strategic resilience and digital sovereignty only come to the fore in times of crisis.

Digital and technical sovereignty requires forward-looking digital and industrial policies that specifically strengthen European technologies and infrastructures. This means investing in key technologies such as cloud computing, AI, and semiconductors that embody European values. But it also means greater European cooperation to leverage economies of scale and strengthen our ability to act through pooled demand.

In addition, regulatory frameworks must be designed in such a way that they enable innovation that complies with fundamental rights without creating new dependencies. In short, we need less reaction and more strategic foresight.

How the Threat Report can help you

Use the data, analyses and forecasts in the report

Recognize risks

Find out which dangers threaten your business.

Derive measures

Recognize the potential of holistic protection solutions.

Icon protection

Close gaps

Implement tailor-made solutions to protect your digital assets.

Build resilience

Use the business continuity you gain as a competitive advantage.

Get in touch

Protect yourself effectively against cyber attacks

We will be happy to show you in a free demo how Myra can improve your security and answer all your questions.

Request a free demo