Unlock stock picks and a broker-level newsfeed that powers Wall Street.

Verizon’s 2025 Data Breach Investigations Report: System Intrusion Breaches Double in EMEA

In This Article:

Verizon Communications, Inc.
Verizon Communications, Inc.

LONDON, April 23, 2025 (GLOBE NEWSWIRE) -- Verizon Business today released its 2025 Data Breach Investigations Report (DBIR), revealing a dramatic surge in global data breaches, with EMEA experiencing a significant increase in system intrusion breaches. These breaches have skyrocketed, nearly doubling to 53% of breaches in the region in just one year.

The 2025 DBIR, which analysed over 22,000 security incidents, including 12,195 confirmed data breaches, found third-party involvement doubling to 30% in this year's report and a 34% surge in vulnerability exploitation globally. In EMEA, nearly a third (29%) of breaches originated from within the organisation, a stark contrast to APAC, where only 1% of threats are from internal actors, and North America, where internal threats account for just 5% of breaches. Although EMEA experienced the highest percentage of breaches caused by internal actors, the number of insiders decreased by 41% in 2025. This decline was due to a faster increase in other types of breaches.

“The alarming rate of employee-driven breaches in EMEA underscores a critical need for businesses to strengthen their internal cybersecurity. Organisations must go beyond guarding against external threats and foster a culture of security awareness and accountability within,” said Sanjiv Gossain, Group Vice President and Head of EMEA of Verizon Business. “The surge in system intrusions across EMEA is a clear warning to organisations to urgently fortify both external defenses and internal controls through comprehensive employee training, robust access controls, and zero-trust frameworks.”

Key EMEA Findings:

  • System Intrusion Threats: System intrusion breaches surged to 53%, nearly double last year’s rate of 27%

  • Insider Leaks: 29% of breaches originate from within EMEA organisations, with 19% attributed to unintentional mistakes and 8% involving misuse, such as unauthorised use of data that violates the organisation’s policies

  • Social Engineering: The second-most common incident pattern in the region, with phishing appearing in 19% of breaches in EMEA

Key Global Findings:

  • Exploitation of Vulnerabilities: This initial attack vector saw a 34% increase, with a significant focus on zero-day exploits targeting perimeter devices and VPNs

  • Ransomware: Ransomware attacks rose by 37% since last year, and are now present in 44% of breaches, despite a noticeable decrease in the median ransom amount paid

  • Third-Party Involvement: The percentage of breaches involving third parties doubled, highlighting the risks associated with supply chain and partner ecosystems

  • Human Element: Human involvement in breaches remains high, with a significant overlap between social engineering and credential abuse