Cyberattacks against Israeli organizations have shifted from sporadic disruptions to a near-daily occurrence, with Israel emerging as the world’s most targeted country for geopolitically motivated cyber activity in 2025, according to Radware’s 2026 Global Cyber Threat Report.
The report finds that Israel accounted for approximately 12.2% of all geopolitically driven cyberattacks worldwide last year. The data underscores a broader shift in which state and national conflicts are increasingly playing out in cyberspace.
3 View gallery


During 2025, around 16,000 unique cyber attack claims were recorded
(Photo: Shutterstock)
Ideologically motivated threat actors have been running sustained distributed denial-of-service (DDoS) campaigns against Israeli government websites, critical infrastructure and private-sector companies. In many cases, groups publicly claim responsibility for attacks in real time through dedicated Telegram channels. During 2025, around 16,000 unique attack claims were recorded from such groups, pointing to ongoing, coordinated activity rather than isolated incidents.
Globally, cyber activity rose sharply over the past year. Network-layer DDoS attacks increased by 168% in one year. In the second half of 2025 alone, according to the report, the average Radware customer experienced more than 25,000 such attacks, reflecting what the company describes as a shift from occasional assaults to a persistent attack environment.
Application-layer attacks also accelerated, rising by more than 120% compared with the previous year. These attacks target websites, digital services and APIs, and are increasingly seen as the primary battleground because they can directly disrupt business systems, customer-facing platforms and core operational processes.
The technology, telecommunications and financial services sectors ranked among the most frequently targeted industries, alongside online services and e-commerce platforms. Radware notes that many modern attacks are extremely short — sometimes lasting less than a minute — making manual detection and response increasingly ineffective. As a result, organizations are being pushed toward automated, real-time defense systems.
Malicious bot activity is another fast-growing threat, climbing 92% over the past year. According to the report, the widespread availability of generative AI tools has lowered the barrier to entry for attackers, enabling even relatively small groups to launch large-scale automated campaigns. These include account takeover attempts, data scraping and repeated login attacks.
“The threat landscape is evolving rapidly,” said Ron Meyran, vice president of Threat Intelligence at Radware. “Attackers are now combining automation, artificial intelligence and multi-vector strategies to disrupt operations at scale. Organizations must adopt automated defenses capable of responding in seconds, not minutes.”
The trends observed in 2025 — including application-focused attacks, automation-driven campaigns and the use of cyberspace as a geopolitical tool — are likely to persist, according to Radware, becoming a permanent feature of the operating environment for governments and businesses alike.



