Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

The MSP Cybersecurity Readiness Guide: Turning Security into Growth

November 10, 2025

CISA and NSA Issue Urgent Guidance to Secure WSUS and Microsoft Exchange Servers

November 9, 2025

Eclipse Foundation Revokes Leaked Open VSX Tokens Following Wiz Discovery

November 9, 2025
Facebook X (Twitter) Instagram
Monday, November 10
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Google Forecasts Rise of Cyber-Physical Attacks Targeting Europe
News

Google Forecasts Rise of Cyber-Physical Attacks Targeting Europe

Team-CWDBy Team-CWDNovember 7, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


In 2026, Europe is set to face a rise cyber-physical attacks targeting critical infrastructure such as energy grids, transport and digital infrastructure, according to Google Cloud Security.

In specific analysis of Europe, Middle East and Africa (EMEA) based on findings from its Cybersecurity Forecast 2026 report, published on November 4, 2025, Google Cloud Security anticipates increased cyber espionage campaigns from state actors, particularly Russia and China, targeting European governments, defense and research in critical and emerging technology sectors.

These attacks could take the form of hybrid warfare, where cyber means support attacks impacting physical systems, especially in critical infrastructure.

These cyber-physical attacks will likely be combined with information operations to undermine public trust, the report added.

Additionally, non-state threat actors are expected to continue to target European supply chains, especially managed service providers and software dependencies, to gain access to numerous downstream targets, Google Cloud Security noted.

Globally, Google analysts said they expect cybercrime to remain the primary disruptive threat to industrial control systems (ICS) and operational technology (OT) in 2026.

Some ransomware operations deployed in 2026 will be specifically designed to impact critical enterprise software, such as enterprise resource planning (ERP) systems, severely disrupting the supply chain of data essential for OT operations.

Read more: Hackers Help Organized Crime Groups in Cargo Freight Heists, Researchers Find

Google’s Cyber Predictions for 2026

Other key forecasts outlined by Google Cloud Security include:

  • Adversaries fully embracing AI, with the use of AI for malicious campaigns expected to shift from the exception to the norm, transforming the landscape with sophisticated, multimodal attacks that combine voice, video and text deepfakes
  • Cybercrime to remain globally disruptive, with ransomware and data theft extortion to continue to dominate financially motivated attacks, targeting third-party providers and zero-day vulnerabilities at scale
  • North Korean (DPRK) IT worker schemes to expand, especially across Europe, posing both financial and espionage risks
  • Russia’s cyber operations to undergo a strategic shift, moving beyond short-term tactical support for the conflict in Ukraine to prioritize long-term global strategic goals (e.g. developing advanced cyber capabilities, collecting intelligence to support global political and economic interests and obtaining strategic footholds within international critical infrastructure environments)
  • The volume of China-nexus cyber operations to continue surpassing that of other nations in 2026, prioritizing stealthy operations and maximizing operational scale
  • Iranian cyber activity to be driven by objectives of regime stability and maintaining regional influence amid ongoing geopolitical conflicts, with the risk of wiper deployment remaining elevated in 2026



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleDiscover Practical AI Tactics for GRC — Join the Free Expert Webinar
Next Article New AI-Targeted Cloaking Attack Tricks AI Crawlers Into Citing Fake Info as Verified Facts
Team-CWD
  • Website

Related Posts

News

The MSP Cybersecurity Readiness Guide: Turning Security into Growth

November 10, 2025
News

CISA and NSA Issue Urgent Guidance to Secure WSUS and Microsoft Exchange Servers

November 9, 2025
News

Eclipse Foundation Revokes Leaked Open VSX Tokens Following Wiz Discovery

November 9, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest News

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202512 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views

The risks of unsupported IoT tech

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202512 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views
Our Picks

Why you should never pay to get paid

September 15, 2025

How the always-on generation can level up their cybersecurity game

September 11, 2025

What is it, and how do I get it off my device?

September 11, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2025 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.