The Cyber Security Report 2025 H2 presents the analysis developed by Telefónica Tech experts on the most relevant threats, vulnerabilities, and trends in the Cybersecurity landscape during the second half of the year.
This analysis is built on internal data enriched with validated public information, with the aim of providing a clear, up to date, and practical view of the risks faced by users, organizations, and critical sectors in the digital environment.
The report is structured into seven key sections:
- Key incidents: A compilation of the most relevant cyber incidents that occurred between July and December 2025, including attacks against large organizations, data breaches, and ransomware campaigns.
- Mobile, Apple iOS and Android: An analysis of the evolution of mobile operating systems, with a special focus on the transition to iOS 26, the increase in patched vulnerabilities, and the persistent fragmentation within the Android ecosystem.
- Notable vulnerabilities: Analysis of the most critical vulnerabilities identified during the semester, highlighting those with the greatest impact on enterprise and industrial environments.
- APT operations, organized groups, and associated malware: Monitoring of the activity of advanced threat actors such as APT36, Lazarus, or Volt Typhoon, including cyber espionage and sabotage campaigns targeting strategic sectors.
- OT threat analysis: Assessment of the cyber threat landscape in industrial environments through the Aristeo sensor network, including the analysis of industrial 5G environments.
- Threat analysis by indicator: Classification and trends of indicators of compromise, highlighting the dominance of phishing, malware downloads, and the abuse of legitimate infrastructures for malicious purposes.
- Report conclusions: Key takeaways from the semester and recommendations to strengthen security posture in the face of an increasingly automated and sophisticated threat landscape.
Each section is accompanied by charts, tables, and relevant links that allow deeper insight into the topics covered. The report is designed to be a useful tool for Cybersecurity professionals, business leaders, technology managers, and public institutions.
✅ Download the full report to learn more about the cyberattacks, vulnerabilities, and emerging threats that shaped the second half of 2025.
Hybrid Cloud
Cyber Security & NaaS
AI & Data
IoT & Connectivity
Business Applications
Intelligent Workplace
Consulting & Professional Services
Small Medium Enterprise
Health and Social Care
Industry
Retail
Tourism and Leisure
Transport & Logistics
Energy & Utilities
Banking and Finance
Smart Cities
Public Sector