{"id":19026,"date":"2025-01-03T09:00:00","date_gmt":"2025-01-03T08:00:00","guid":{"rendered":"https:\/\/defenderbox.de\/?p=19026"},"modified":"2025-08-12T17:32:39","modified_gmt":"2025-08-12T15:32:39","slug":"cyberthreats2025","status":"publish","type":"post","link":"https:\/\/defenderbox.de\/en\/cyberbedrohungen2025\/","title":{"rendered":"Cyber criminals are arming themselves!"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"19026\" class=\"elementor elementor-19026\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-189bcdb6 e-con-full e-flex e-con e-parent\" data-id=\"189bcdb6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-204936e4 elementor-widget elementor-widget-text-editor\" data-id=\"204936e4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<h2 class=\"wp-block-heading\">Threats for 2025<\/h2>\n<!-- \/wp:heading --><!-- wp:paragraph -->\n<p>The threat situation in cyberspace continues to escalate: according to the latest Cyberthreat Predictions Report 2025 from FortiGuard Labs, cyberattacks will be <strong>bigger, bolder and more effective in future<\/strong>. The report analyzes current trends and future threats and provides companies with specific recommendations on how to arm themselves against these challenges. Highly developed industrialized countries such as Germany in particular are facing new, complex risks. Read more about the most important cyber trends below!<\/p>\n<!-- \/wp:paragraph --><!-- wp:heading -->\n<h2 class=\"wp-block-heading\">Are you prepared for cyber attacks?<\/h2>\n<!-- \/wp:heading --><!-- wp:paragraph -->\n<p>With the <a href=\"https:\/\/defenderbox.de\/en\/product\/\">DEFENDERBOX<\/a> you are one step ahead of cyber threats: Strengthen your company's resistance to hacker attacks - especially in your own environment!<\/p>\n<!-- \/wp:paragraph --><!-- wp:paragraph -->\n<p>Would you like to know how secure your company is? Find out with a test installation!<\/p>\n<!-- \/wp:paragraph --><!-- wp:buttons -->\n<div class=\"wp-block-buttons\"><!-- wp:button {\"backgroundColor\":\"luminous-vivid-orange\"} -->\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link has-luminous-vivid-orange-background-color has-background wp-element-button\" href=\"https:\/\/defenderbox.de\/en\/test-installation\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>TEST INSTALLATION<\/strong><\/a><\/div>\n<!-- \/wp:button --><\/div>\n<!-- \/wp:buttons --><!-- wp:heading -->\n<h2 class=\"wp-block-heading\">1 AI as a weapon: the strategic use of artificial intelligence\u00a0\u00a0<\/h2>\n<!-- \/wp:heading --><!-- wp:paragraph -->\n<p>Cybercriminals are using artificial intelligence (AI) in increasingly sophisticated ways to make their attacks more effective. The main applications include:\u00a0\u00a0<\/p>\n<!-- \/wp:paragraph --><!-- wp:list -->\n<ul class=\"wp-block-list\"><!-- wp:list-item -->\n<li>AI-generated disinformation campaigns: Attackers use Large Language Models (LLMs) to create targeted fake news, social media posts and comments. This manipulative content can cause political instability, social unrest or reputational damage - especially in sensitive phases such as elections or crisis situations.\u00a0\u00a0<\/li>\n<!-- \/wp:list-item --><!-- wp:list-item -->\n<li>Generative profiling for social engineering: Attackers create precise profiles of their victims by analyzing social media and publicly accessible data. LLMs are used to develop customized attacks based on the interests and activities of the target.\u00a0\u00a0<\/li>\n<!-- \/wp:list-item --><!-- wp:list-item -->\n<li>Automated phishing campaigns: AI-supported tools generate deceptively real phishing messages that are barely recognizable as fakes thanks to context-specific personalization and imitated writing styles of known contacts.\u00a0\u00a0<\/li>\n<!-- \/wp:list-item --><!-- wp:list-item -->\n<li>Deepfake-based voice phishing (vishing): Attackers can use synthetic voices to deceive employees and trick them into disclosing sensitive information.\u00a0\u00a0<\/li>\n<!-- \/wp:list-item --><!-- wp:list-item -->\n<li>Polymorphic malware: LLMs enable the development of malware that changes dynamically and is therefore more difficult to detect.\u00a0\u00a0<\/li>\n<!-- \/wp:list-item --><\/ul>\n<!-- \/wp:list --><!-- wp:heading -->\n<h2 class=\"wp-block-heading\">2. critical infrastructures targeted: ransomware becomes more aggressive\u00a0\u00a0<\/h2>\n<!-- \/wp:heading --><!-- wp:paragraph -->\n<p>Ransomware attacks are increasingly targeting critical infrastructure to cause maximum damage. Sectors such as energy supply, healthcare, manufacturing and financial services are particularly in focus.\u00a0\u00a0<\/p>\n<!-- \/wp:paragraph --><!-- wp:list -->\n<ul class=\"wp-block-list\"><!-- wp:list-item -->\n<li><strong><a href=\"https:\/\/defenderbox.de\/en\/news\/defense-in-depth\/\">Attacks on OT system<\/a><a href=\"https:\/\/defenderbox.de\/en\/news\/defense-in-depth\/\" target=\"_blank\" rel=\"noreferrer noopener\">e<\/a><\/strong>Operational Technology (OT) becomes the Achilles' heel, as disruptions in the water, electricity or production supply have serious consequences.\u00a0<\/li>\n<!-- \/wp:list-item --><!-- wp:list-item -->\n<li>Ransomware-as-a-Service (RaaS<strong>)<\/strong>These service models also enable technically inexperienced attackers to carry out complex attacks.\u00a0\u00a0<\/li>\n<!-- \/wp:list-item --><\/ul>\n<!-- \/wp:list --><!-- wp:heading -->\n<h2 class=\"wp-block-heading\">3. cybercrime-as-a-service (CaaS): specialists drive the attack dynamics\u00a0\u00a0<\/h2>\n<!-- \/wp:heading --><!-- wp:paragraph -->\n<p>The professionalization of the cybercrime-as-a-service market is leading to more targeted attacks. Providers are increasingly specializing in individual attack components such as initial access or infrastructure.\u00a0\u00a0<\/p>\n<!-- \/wp:paragraph --><!-- wp:list -->\n<ul class=\"wp-block-list\"><!-- wp:list-item -->\n<li>Reconnaissance-as-a-Service: Investing in the early phases of the attack chain, such as reconnaissance and preparation, enables precise and efficient attacks.\u00a0\u00a0<\/li>\n<!-- \/wp:list-item --><!-- wp:list-item -->\n<li>Cloud attacks: The increasing use of hybrid and multi-cloud strategies is expanding the attack surface, with CaaS providers providing specific tools and expertise for cloud infrastructures.\u00a0\u00a0<\/li>\n<!-- \/wp:list-item --><\/ul>\n<!-- \/wp:list --><!-- wp:heading -->\n<h2 class=\"wp-block-heading\">Conclusion: vigilance and proactive measures are crucial!<\/h2>\n<!-- \/wp:heading --><!-- wp:paragraph -->\n<p>The ongoing professionalization and technological progress in the cybercrime sector present companies with immense challenges. This makes it all the more important to recognize potential attack vectors at an early stage and protect yourself with modern security solutions.\u00a0\u00a0<\/p>\n<!-- \/wp:paragraph --><!-- wp:paragraph -->\n<p><a href=\"https:\/\/defenderbox.de\/en\/product\/\">DEFENDERBOX<\/a> is at your side as a reliable partner to protect your company in this dynamic threat environment. Contact us to make your cybersecurity strategy fit for 2025 and beyond.<\/p>\n<div class=\"wp-block-buttons\">\n<div>\u00a0<\/div>\n<\/div>\n<!-- \/wp:image --><!-- wp:paragraph --><!-- \/wp:paragraph --><!-- wp:separator {\"className\":\"is-style-wide\",\"style\":{\"spacing\":{\"margin\":{\"top\":\"var:preset|spacing|x-small\",\"bottom\":\"var:preset|spacing|x-small\"}}},\"backgroundColor\":\"tertiary\"} --><!-- \/wp:group -->\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Cyber criminals are gearing up! Here are the most important cyber threats for 2025.<\/p>","protected":false},"author":3,"featured_media":19027,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[29,28],"tags":[41,39,38,40,37,36],"class_list":["post-19026","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-netzwerksicherheit-mit-defenderbox","category-neues-auf-der-cyberfront","tag-cyberlage","tag-cybersecurity","tag-cybersicherheit","tag-hackerangriffe","tag-schwachstellen","tag-sicherheitsluecken"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyberkriminelle r\u00fcsten auf! - DEFENDERBOX<\/title>\n<meta name=\"description\" content=\"DEFENDERBOX: Ihr Partner f\u00fcr IT-Sicherheit &amp; Compliance. Proaktive Cybersecurity-L\u00f6sung f\u00fcr den Mittelstand, NGOs und \u00f6ffentlichen Sektor. Jetzt Cyber-Widerstandsf\u00e4higkeit st\u00e4rken.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/defenderbox.de\/en\/cyberthreats2025\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyberkriminelle r\u00fcsten auf! - DEFENDERBOX\" \/>\n<meta property=\"og:description\" content=\"DEFENDERBOX: Ihr Partner f\u00fcr IT-Sicherheit &amp; Compliance. Proaktive Cybersecurity-L\u00f6sung f\u00fcr den Mittelstand, NGOs und \u00f6ffentlichen Sektor. Jetzt Cyber-Widerstandsf\u00e4higkeit st\u00e4rken.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/defenderbox.de\/en\/cyberthreats2025\/\" \/>\n<meta property=\"og:site_name\" content=\"DEFENDERBOX\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/de.linkedin.com\/company\/defenderbox\" \/>\n<meta property=\"article:published_time\" content=\"2025-01-03T08:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-12T15:32:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/12\/KI-Bild-erstellen.de-Infos-zu-Cyberbed.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1344\" \/>\n\t<meta property=\"og:image:height\" content=\"768\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Regine Heue\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Regine Heue\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/cyberbedrohungen2025\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/cyberbedrohungen2025\\\/\"},\"author\":{\"name\":\"Regine Heue\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#\\\/schema\\\/person\\\/b83407c671731c92428913089813ab49\"},\"headline\":\"Cyberkriminelle r\u00fcsten auf!\",\"datePublished\":\"2025-01-03T08:00:00+00:00\",\"dateModified\":\"2025-08-12T15:32:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/cyberbedrohungen2025\\\/\"},\"wordCount\":506,\"publisher\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/cyberbedrohungen2025\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/defenderbox.de\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/KI-Bild-erstellen.de-Infos-zu-Cyberbed.png\",\"keywords\":[\"Cyberlage\",\"Cybersecurity\",\"Cybersicherheit\",\"Hackerangriffe\",\"Schwachstellen\",\"Sicherheitsl\u00fccken\"],\"articleSection\":[\"Netzwerksicherheit\",\"News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/cyberbedrohungen2025\\\/\",\"url\":\"https:\\\/\\\/defenderbox.de\\\/cyberbedrohungen2025\\\/\",\"name\":\"Cyberkriminelle r\u00fcsten auf! - DEFENDERBOX\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/cyberbedrohungen2025\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/cyberbedrohungen2025\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/defenderbox.de\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/KI-Bild-erstellen.de-Infos-zu-Cyberbed.png\",\"datePublished\":\"2025-01-03T08:00:00+00:00\",\"dateModified\":\"2025-08-12T15:32:39+00:00\",\"description\":\"DEFENDERBOX: Ihr Partner f\u00fcr IT-Sicherheit & Compliance. Proaktive Cybersecurity-L\u00f6sung f\u00fcr den Mittelstand, NGOs und \u00f6ffentlichen Sektor. Jetzt Cyber-Widerstandsf\u00e4higkeit st\u00e4rken.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/cyberbedrohungen2025\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/defenderbox.de\\\/cyberbedrohungen2025\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/cyberbedrohungen2025\\\/#primaryimage\",\"url\":\"https:\\\/\\\/defenderbox.de\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/KI-Bild-erstellen.de-Infos-zu-Cyberbed.png\",\"contentUrl\":\"https:\\\/\\\/defenderbox.de\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/KI-Bild-erstellen.de-Infos-zu-Cyberbed.png\",\"width\":1344,\"height\":768,\"caption\":\"Bedrohungen f\u00fcr 2025 und dar\u00fcber hinaus\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/cyberbedrohungen2025\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/defenderbox.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyberkriminelle r\u00fcsten auf!\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#website\",\"url\":\"https:\\\/\\\/defenderbox.de\\\/\",\"name\":\"DEFENDERBOX\",\"description\":\"Cybersecurity at its best.\",\"publisher\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/defenderbox.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#organization\",\"name\":\"DEFENDERBOX\",\"url\":\"https:\\\/\\\/defenderbox.de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/defenderbox.de\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/cropped-Logo_Claim-400_116.png\",\"contentUrl\":\"https:\\\/\\\/defenderbox.de\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/cropped-Logo_Claim-400_116.png\",\"width\":400,\"height\":110,\"caption\":\"DEFENDERBOX\"},\"image\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/de.linkedin.com\\\/company\\\/defenderbox\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#\\\/schema\\\/person\\\/b83407c671731c92428913089813ab49\",\"name\":\"Regine Heue\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/229aff465565b2ec40968fea9d60687f0298ac3de5d0c39eeb1b385e3b6eabaf?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/229aff465565b2ec40968fea9d60687f0298ac3de5d0c39eeb1b385e3b6eabaf?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/229aff465565b2ec40968fea9d60687f0298ac3de5d0c39eeb1b385e3b6eabaf?s=96&d=mm&r=g\",\"caption\":\"Regine Heue\"},\"sameAs\":[\"http:\\\/\\\/defenderbox.de\"],\"url\":\"https:\\\/\\\/defenderbox.de\\\/en\\\/author\\\/regine-heue\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber criminals are arming themselves! - DEFENDERBOX","description":"DEFENDERBOX: Your Partner for IT Security &amp; Compliance. Proactive Cybersecurity Solution for Small and Medium-sized Businesses, NGOs, and the Public Sector. Strengthen Cyber Resilience Now.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/defenderbox.de\/en\/cyberthreats2025\/","og_locale":"en_US","og_type":"article","og_title":"Cyberkriminelle r\u00fcsten auf! - DEFENDERBOX","og_description":"DEFENDERBOX: Ihr Partner f\u00fcr IT-Sicherheit & Compliance. Proaktive Cybersecurity-L\u00f6sung f\u00fcr den Mittelstand, NGOs und \u00f6ffentlichen Sektor. Jetzt Cyber-Widerstandsf\u00e4higkeit st\u00e4rken.","og_url":"https:\/\/defenderbox.de\/en\/cyberthreats2025\/","og_site_name":"DEFENDERBOX","article_publisher":"https:\/\/de.linkedin.com\/company\/defenderbox","article_published_time":"2025-01-03T08:00:00+00:00","article_modified_time":"2025-08-12T15:32:39+00:00","og_image":[{"width":1344,"height":768,"url":"https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/12\/KI-Bild-erstellen.de-Infos-zu-Cyberbed.png","type":"image\/png"}],"author":"Regine Heue","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Regine Heue","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/defenderbox.de\/cyberbedrohungen2025\/#article","isPartOf":{"@id":"https:\/\/defenderbox.de\/cyberbedrohungen2025\/"},"author":{"name":"Regine Heue","@id":"https:\/\/defenderbox.de\/#\/schema\/person\/b83407c671731c92428913089813ab49"},"headline":"Cyberkriminelle r\u00fcsten auf!","datePublished":"2025-01-03T08:00:00+00:00","dateModified":"2025-08-12T15:32:39+00:00","mainEntityOfPage":{"@id":"https:\/\/defenderbox.de\/cyberbedrohungen2025\/"},"wordCount":506,"publisher":{"@id":"https:\/\/defenderbox.de\/#organization"},"image":{"@id":"https:\/\/defenderbox.de\/cyberbedrohungen2025\/#primaryimage"},"thumbnailUrl":"https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/12\/KI-Bild-erstellen.de-Infos-zu-Cyberbed.png","keywords":["Cyberlage","Cybersecurity","Cybersicherheit","Hackerangriffe","Schwachstellen","Sicherheitsl\u00fccken"],"articleSection":["Netzwerksicherheit","News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/defenderbox.de\/cyberbedrohungen2025\/","url":"https:\/\/defenderbox.de\/cyberbedrohungen2025\/","name":"Cyber criminals are arming themselves! - DEFENDERBOX","isPartOf":{"@id":"https:\/\/defenderbox.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/defenderbox.de\/cyberbedrohungen2025\/#primaryimage"},"image":{"@id":"https:\/\/defenderbox.de\/cyberbedrohungen2025\/#primaryimage"},"thumbnailUrl":"https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/12\/KI-Bild-erstellen.de-Infos-zu-Cyberbed.png","datePublished":"2025-01-03T08:00:00+00:00","dateModified":"2025-08-12T15:32:39+00:00","description":"DEFENDERBOX: Your Partner for IT Security &amp; Compliance. Proactive Cybersecurity Solution for Small and Medium-sized Businesses, NGOs, and the Public Sector. Strengthen Cyber Resilience Now.","breadcrumb":{"@id":"https:\/\/defenderbox.de\/cyberbedrohungen2025\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/defenderbox.de\/cyberbedrohungen2025\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/defenderbox.de\/cyberbedrohungen2025\/#primaryimage","url":"https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/12\/KI-Bild-erstellen.de-Infos-zu-Cyberbed.png","contentUrl":"https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/12\/KI-Bild-erstellen.de-Infos-zu-Cyberbed.png","width":1344,"height":768,"caption":"Bedrohungen f\u00fcr 2025 und dar\u00fcber hinaus"},{"@type":"BreadcrumbList","@id":"https:\/\/defenderbox.de\/cyberbedrohungen2025\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/defenderbox.de\/"},{"@type":"ListItem","position":2,"name":"Cyberkriminelle r\u00fcsten auf!"}]},{"@type":"WebSite","@id":"https:\/\/defenderbox.de\/#website","url":"https:\/\/defenderbox.de\/","name":"DEFENDERBOX","description":"Cybersecurity at its best.","publisher":{"@id":"https:\/\/defenderbox.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/defenderbox.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/defenderbox.de\/#organization","name":"DEFENDERBOX","url":"https:\/\/defenderbox.de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/defenderbox.de\/#\/schema\/logo\/image\/","url":"https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/08\/cropped-Logo_Claim-400_116.png","contentUrl":"https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/08\/cropped-Logo_Claim-400_116.png","width":400,"height":110,"caption":"DEFENDERBOX"},"image":{"@id":"https:\/\/defenderbox.de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/de.linkedin.com\/company\/defenderbox"]},{"@type":"Person","@id":"https:\/\/defenderbox.de\/#\/schema\/person\/b83407c671731c92428913089813ab49","name":"Regine Heue","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/229aff465565b2ec40968fea9d60687f0298ac3de5d0c39eeb1b385e3b6eabaf?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/229aff465565b2ec40968fea9d60687f0298ac3de5d0c39eeb1b385e3b6eabaf?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/229aff465565b2ec40968fea9d60687f0298ac3de5d0c39eeb1b385e3b6eabaf?s=96&d=mm&r=g","caption":"Regine Heue"},"sameAs":["http:\/\/defenderbox.de"],"url":"https:\/\/defenderbox.de\/en\/author\/regine-heue\/"}]}},"_links":{"self":[{"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/posts\/19026","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/comments?post=19026"}],"version-history":[{"count":0,"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/posts\/19026\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/media\/19027"}],"wp:attachment":[{"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/media?parent=19026"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/categories?post=19026"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/tags?post=19026"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}