{"id":24584,"date":"2026-02-26T08:00:23","date_gmt":"2026-02-26T07:00:23","guid":{"rendered":"https:\/\/cyberoo.com\/?p=24584"},"modified":"2026-02-26T08:03:15","modified_gmt":"2026-02-26T07:03:15","slug":"cyberoo-publishes-its-observatory-2026-report","status":"publish","type":"post","link":"https:\/\/cyberoo.com\/en\/news\/cyberoo-publishes-its-observatory-2026-report\/","title":{"rendered":"Cyberoo publishes its 2026 Observatory report"},"content":{"rendered":"\n<p class=\"has-text-align-center\"><strong>New attack trends targeting businesses and defense strategies for 2026<\/strong><\/p>\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><span style=\"text-decoration: underline;\">Reggio Emilia, February 26, 2026<\/span> \u2013 Cyberoo S.p.A., an innovative SME listed on the Euronext Growth Milan Market, specialized in cybersecurity for businesses, publishes the second edition of the annual report of the Cyberoo Observatory, this year dedicated to the theme \u201cInside the dark matter of cyberspace.\u201d The document analyzes the main trends and attack patterns that emerged in 2025 and translates the evidence gathered into operational defense strategies for 2026, thanks to data provided by the I-SOC team, an advanced center with over 100 specialists operating in Italy and abroad, which combines 24\/7 monitoring and response and Cyber Threat Intelligence, and by the Incident Response Team. The team, composed of ethical hackers and analysts, defends companies from cyber threats by integrating internal sources, such as data from the Cyber Security Suite, and external sources, such as the Surface, Deep, and Dark Web, with the aim of preventing and minimizing the damage of a cyber-attack.<\/p>\n\n\n\n<p><strong>Numbers<\/strong><\/p>\n\n\n\n<p>Among the most significant data emerging in 2025, Cyberoo reports:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>320 new threat actors<\/strong> identified, including particularly aggressive ones: Qilin, Akira, Sarcoma, Everest<\/li>\n\n\n\n<li>Over <strong>1,300 reports to the competent authorities <\/strong>for phishing, antispam, and antifraud by Cyberoo<\/li>\n\n\n\n<li>The detection of <strong>38,654 suspicious domains<\/strong><\/li>\n\n\n\n<li>The identification of over <strong>2,700 unique CVEs<\/strong> associated with monitored suppliers, confirming the criticality of vulnerability management within the supply chain<\/li>\n<\/ul>\n\n\n\n<p><strong>Trends for 2025<\/strong><\/p>\n\n\n\n<p>2025 saw an increase in the direct exploitation of vulnerabilities, including zero-day vulnerabilities, and further expansion of the market for <strong>stolen credentials<\/strong>.<\/p>\n\n\n\n<p><strong>DDoS attacks<\/strong>, cyberattacks that render servers and websites inaccessible by flooding them with fake traffic from thousands of infected devices, made a comeback as a distraction tool, used to saturate defense systems and facilitate parallel reconnaissance and infiltration activities.<\/p>\n\n\n\n<p><strong>Phishing <\/strong>has evolved significantly, becoming increasingly credible and contextualized thanks to the use of generative AI, with cases of impersonation supported by voice and video deepfakes.<\/p>\n\n\n\n<p>In general, <strong>AI-powered attacks<\/strong> represent a growing threat. Looking ahead to 2026 and beyond, the Observatory highlights the increase in AI-enabled threats, which make phishing, impersonation, and the spread of <strong>fake news<\/strong> more effective and scalable. The risk associated with credential theft and pressure on cloud and SaaS, which requires continuous monitoring, also remain central issues.<\/p>\n\n\n\n<p>At the same time, supply chain incidents have shown a \u201cchain\u201d dynamic, in which a vulnerability in a supplier or shared component has often resulted in a blow to multiple organizations, extending to the supply chain with forms of pressure such as <strong>triple extortion<\/strong>, an advanced cybercriminal tactic and evolution of ransomware, whereby attackers do not just encrypt data, but apply three simultaneous levels of pressure to force victims to pay a ransom for their data.<\/p>\n\n\n\n<p><strong>Distribution of cyber-attacks: affected markets and critical periods<\/strong><\/p>\n\n\n\n<p>In the sample analyzed for the purposes of drafting the report, the manufacturing sector is the most exposed to cyber-attacks, accounting for 29% of the total examined, also considering the \u201cvolume\u201d effect of the sector in the Italian and European markets.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1007\" src=\"https:\/\/cyberoo.com\/wp-content\/uploads\/2026\/02\/7-1-1024x1007.jpg\" alt=\"\" class=\"wp-image-24593\" srcset=\"https:\/\/cyberoo.com\/wp-content\/uploads\/2026\/02\/7-1-1024x1007.jpg 1024w, https:\/\/cyberoo.com\/wp-content\/uploads\/2026\/02\/7-1-300x295.jpg 300w, https:\/\/cyberoo.com\/wp-content\/uploads\/2026\/02\/7-1-768x756.jpg 768w, https:\/\/cyberoo.com\/wp-content\/uploads\/2026\/02\/7-1.jpg 1414w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>In terms of timing, December is the month most affected by compromises in 2025, coinciding with the Christmas holiday period, when reduced security measures and staffing levels can increase companies&#8217; operational vulnerability.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"852\" src=\"https:\/\/cyberoo.com\/wp-content\/uploads\/2026\/02\/4-1024x852.jpg\" alt=\"\" class=\"wp-image-24594\" srcset=\"https:\/\/cyberoo.com\/wp-content\/uploads\/2026\/02\/4-1024x852.jpg 1024w, https:\/\/cyberoo.com\/wp-content\/uploads\/2026\/02\/4-300x250.jpg 300w, https:\/\/cyberoo.com\/wp-content\/uploads\/2026\/02\/4-768x639.jpg 768w, https:\/\/cyberoo.com\/wp-content\/uploads\/2026\/02\/4.jpg 1414w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p><strong>The challenges of 2026<\/strong><\/p>\n\n\n\n<p>In light of the data highlighted, the biggest challenge concerns what remains invisible: there is a gap between the perception of security and the real risk to information systems. Cyberoo defines this unobserved area as \u201ccyber dark matter\u201d: it is the combination of unmapped assets and surfaces, incomplete controls, obsolete systems, poor awareness, inadequately managed tokens and APIs, and non-human identities outside the monitoring perimeter.<\/p>\n\n\n\n<p>That is why, among the priority actions recommended for 2026, the first is to strengthen internal governance and accountability, combine training, culture, and awareness with the orchestration of technologies, processes, and human skills, adopt identity-first controls, apply risk-based patch management, and ensure continuous supervision of cloud and SaaS with backups and incident response playbooks. The goal must be to move from reactive security to proactive and strategic defense, especially in larger companies that manage longer supply chains. In addition, it is essential to increase transparency and control over AI: managing artificial intelligence is critical to avoid falling into digital traps.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"707\" src=\"https:\/\/cyberoo.com\/wp-content\/uploads\/2026\/02\/10-1024x707.jpg\" alt=\"\" class=\"wp-image-24595\" srcset=\"https:\/\/cyberoo.com\/wp-content\/uploads\/2026\/02\/10-1024x707.jpg 1024w, https:\/\/cyberoo.com\/wp-content\/uploads\/2026\/02\/10-300x207.jpg 300w, https:\/\/cyberoo.com\/wp-content\/uploads\/2026\/02\/10-768x530.jpg 768w, https:\/\/cyberoo.com\/wp-content\/uploads\/2026\/02\/10.jpg 1414w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>\u201c<em><em><em><em>2025 has reminded us that the attack surface is no longer just technical: identity, AI, and suppliers determine the real risk. Investing in governance, continuous monitoring, and operational resilience is the choice that protects value, business, and the people who make up the company. Protecting activities and services requires an approach that combines advanced technologies, governance, and, above all, continuous training. The Cyberoo Observatory 2026 was created with the aim of increasing awareness and helping to make risk measurable and manageable, increasing visibility and prioritization capabilities, and transforming the evidence gathered into repeatable decisions and actionable strategies to reduce the operational impact of incidents<\/em><\/em><\/em>\u201d <\/em>&#8211; said <strong>Veronica Leonardi, CMO &amp; Board Member of Cyberoo<\/strong>.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p><strong>SOURCE<\/strong>: The Observatory is based on the continuous monitoring and analysis of billions of security events detected in 2025 (over 61,000 events per second) through Cyberoo&#8217;s proprietary systems and the operation of its MDR (Managed Detection &amp; Response), which includes Cyber Threat Intelligence activities. The scope of observation includes over 700 midsize European customers from different sectors. Cyberoo publishes the Observatory&#8217;s findings with the aim of promoting greater awareness of cyber dynamics and risks, helping companies to strengthen their cyber resilience through timely and measurable choices, in line with the evolution of the regulatory framework and the latest European guidelines on the subject.<\/p>\n\n\n\n<p>The complete document in Italian is available at the following link <a href=\"https:\/\/content.cyberoo.com\/it-it\/scarica-losservatorio-cyberoo-2026\">Download the Report \u2013 CYBEROO Observatory 2026<\/a>.<\/p>\n\n\n\n<p class=\"has-text-align-center\">***<\/p>\n\n\n\n<p><strong>Cyberoo S.p.A.<\/strong>, a company listed on the Euronext Growth Milan stock exchange of Borsa Italiana, is an innovative Reggio Emilia-based SME specialized in cybersecurity for businesses, intended not only to protect IT systems from external attacks but also to implement a real strategy capable of protecting, monitoring and managing IT ecosystem information. Cyberoo addresses the medium-sized enterprise market with a broad and deep portfolio of enterprise solutions developed using the most advanced technologies and with a value chain that allows it to set prices that are in line with our customers\u2019 spending power.<\/p>\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><span style=\"text-decoration: underline;\">FOR INFORMATION:<\/span><\/p>\n\n\n\n<p><strong>CMO &amp; INVESTOR RELATIONS MANAGER<\/strong> <strong>CYBEROO<\/strong><\/p>\n\n\n\n<p>Veronica Leonardi | <a href=\"mailto:investor@cyberoo.com\">investor@cyberoo.com<\/a> &nbsp;+39 0522 388111<\/p>\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><strong>INVESTOR RELATIONS ADVISOR<\/strong><\/p>\n\n\n\n<p><strong>CDR Communication S.r.l.<\/strong><\/p>\n\n\n\n<p>Vincenza Colucci | <a href=\"mailto:vincenza.colucci@cdr-communication.it\">vincenza.colucci@cdr-communication.it<\/a><\/p>\n\n\n\n<p>Marika Martinciglio | <a href=\"mailto:marika.martinciglio@cdr-communication.it\">marika.martinciglio@cdr-communication.it<\/a><\/p>\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><strong>MEDIA RELATIONS ADVISOR<\/strong><\/p>\n\n\n\n<p><strong>CDR Communication S.r.l.<\/strong><\/p>\n\n\n\n<p>Maddalena Prestipino | <a href=\"mailto:maddalena.prestipino@cdr-communication.it\">maddalena.prestipino@cdr-communication.it<\/a><\/p>\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><strong>EURONEXT GROWTH ADVISOR<\/strong><\/p>\n\n\n\n<p><strong>EnVent Italia SIM S.p.A.<\/strong><\/p>\n\n\n\n<p><a href=\"mailto:gdalessio@envent.it\">ega@envent.it<\/a> +39 02 22175979<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyberoo publishes its 2026 Observatory report<\/p>\n","protected":false},"author":8,"featured_media":24591,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[253],"tags":[330,500,498,499],"class_list":{"0":"post-24584","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news-press-en","8":"tag-cyberoo-en","9":"tag-observatory","10":"tag-osservatorio","11":"tag-trend"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cyberoo publishes its 2026 Observatory report<\/title>\n<meta name=\"description\" content=\"Cyberoo S.p.A. publishes the second edition of the annual report of the Cyberoo Observatory, this year dedicated to the theme \u201cInside the dark matter of cyberspace.\u201d\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cyberoo.com\/en\/news\/cyberoo-publishes-its-observatory-2026-report\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyberoo publishes its 2026 Observatory report\" \/>\n<meta property=\"og:description\" content=\"Cyberoo S.p.A. publishes the second edition of the annual report of the Cyberoo Observatory, this year dedicated to the theme \u201cInside the dark matter of cyberspace.\u201d\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cyberoo.com\/en\/news\/cyberoo-publishes-its-observatory-2026-report\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyberoo\" \/>\n<meta property=\"article:published_time\" content=\"2026-02-26T07:00:23+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-26T07:03:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cyberoo.com\/wp-content\/uploads\/2026\/02\/2-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Fabio Pio Rauzino\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"CYBEROO rafforza la propria presenza in Europa\" \/>\n<meta name=\"twitter:description\" content=\"Cyberoo sottoscrive i primi contratti in Spagna in collaborazione con il partner &quot;Technology 2 Client&quot;\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/cyberoo.com\/wp-content\/uploads\/2025\/11\/2026-CYBEROO-NEWS-2.png\" \/>\n<meta name=\"twitter:creator\" content=\"@CYBEROO_ITALIA\" \/>\n<meta name=\"twitter:site\" content=\"@CYBEROO_ITALIA\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Fabio Pio Rauzino\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/cyberoo.com\/en\/news\/cyberoo-publishes-its-observatory-2026-report\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/cyberoo.com\/en\/news\/cyberoo-publishes-its-observatory-2026-report\/\"},\"author\":{\"name\":\"Fabio Pio Rauzino\",\"@id\":\"https:\/\/cyberoo.com\/en\/#\/schema\/person\/7041fc513d1b833c794097b97b38e243\"},\"headline\":\"Cyberoo publishes its 2026 Observatory report\",\"datePublished\":\"2026-02-26T07:00:23+00:00\",\"dateModified\":\"2026-02-26T07:03:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/cyberoo.com\/en\/news\/cyberoo-publishes-its-observatory-2026-report\/\"},\"wordCount\":1074,\"publisher\":{\"@id\":\"https:\/\/cyberoo.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/cyberoo.com\/en\/news\/cyberoo-publishes-its-observatory-2026-report\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cyberoo.com\/wp-content\/uploads\/2026\/02\/2-1.jpg\",\"keywords\":[\"Cyberoo\",\"Observatory\",\"Osservatorio\",\"trend\"],\"articleSection\":[\"News &amp; Press\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cyberoo.com\/en\/news\/cyberoo-publishes-its-observatory-2026-report\/\",\"url\":\"https:\/\/cyberoo.com\/en\/news\/cyberoo-publishes-its-observatory-2026-report\/\",\"name\":\"Cyberoo publishes its 2026 Observatory report\",\"isPartOf\":{\"@id\":\"https:\/\/cyberoo.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/cyberoo.com\/en\/news\/cyberoo-publishes-its-observatory-2026-report\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/cyberoo.com\/en\/news\/cyberoo-publishes-its-observatory-2026-report\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cyberoo.com\/wp-content\/uploads\/2026\/02\/2-1.jpg\",\"datePublished\":\"2026-02-26T07:00:23+00:00\",\"dateModified\":\"2026-02-26T07:03:15+00:00\",\"description\":\"Cyberoo S.p.A. publishes the second edition of the annual report of the Cyberoo Observatory, this year dedicated to the theme \u201cInside the dark matter of cyberspace.\u201d\",\"breadcrumb\":{\"@id\":\"https:\/\/cyberoo.com\/en\/news\/cyberoo-publishes-its-observatory-2026-report\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cyberoo.com\/en\/news\/cyberoo-publishes-its-observatory-2026-report\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cyberoo.com\/en\/news\/cyberoo-publishes-its-observatory-2026-report\/#primaryimage\",\"url\":\"https:\/\/cyberoo.com\/wp-content\/uploads\/2026\/02\/2-1.jpg\",\"contentUrl\":\"https:\/\/cyberoo.com\/wp-content\/uploads\/2026\/02\/2-1.jpg\",\"width\":1200,\"height\":630,\"caption\":\"Cyberoo publishes its 2026 Observatory reportreport\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cyberoo.com\/en\/news\/cyberoo-publishes-its-observatory-2026-report\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/cyberoo.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyberoo publishes its 2026 Observatory report\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cyberoo.com\/en\/#website\",\"url\":\"https:\/\/cyberoo.com\/en\/\",\"name\":\"Cyberoo\",\"description\":\"Superheroes are always ready for action\",\"publisher\":{\"@id\":\"https:\/\/cyberoo.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cyberoo.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/cyberoo.com\/en\/#organization\",\"name\":\"Cyberoo\",\"url\":\"https:\/\/cyberoo.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cyberoo.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/cyberoo.com\/wp-content\/uploads\/2023\/01\/CYBEROO-logo-dark.svg\",\"contentUrl\":\"https:\/\/cyberoo.com\/wp-content\/uploads\/2023\/01\/CYBEROO-logo-dark.svg\",\"width\":258,\"height\":38,\"caption\":\"Cyberoo\"},\"image\":{\"@id\":\"https:\/\/cyberoo.com\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CYBEROO_ITALIA\",\"https:\/\/it.linkedin.com\/company\/cyberoo-italia\",\"https:\/\/www.youtube.com\/channel\/UC7AwVDG9Ngdwohk_zPd25xQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/cyberoo.com\/en\/#\/schema\/person\/7041fc513d1b833c794097b97b38e243\",\"name\":\"Fabio Pio Rauzino\",\"url\":\"https:\/\/cyberoo.com\/en\/news\/author\/fabiopio-rauzino\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyberoo publishes its 2026 Observatory report","description":"Cyberoo S.p.A. publishes the second edition of the annual report of the Cyberoo Observatory, this year dedicated to the theme \u201cInside the dark matter of cyberspace.\u201d","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cyberoo.com\/en\/news\/cyberoo-publishes-its-observatory-2026-report\/","og_locale":"en_US","og_type":"article","og_title":"Cyberoo publishes its 2026 Observatory report","og_description":"Cyberoo S.p.A. publishes the second edition of the annual report of the Cyberoo Observatory, this year dedicated to the theme \u201cInside the dark matter of cyberspace.\u201d","og_url":"https:\/\/cyberoo.com\/en\/news\/cyberoo-publishes-its-observatory-2026-report\/","og_site_name":"Cyberoo","article_published_time":"2026-02-26T07:00:23+00:00","article_modified_time":"2026-02-26T07:03:15+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/cyberoo.com\/wp-content\/uploads\/2026\/02\/2-1.jpg","type":"image\/jpeg"}],"author":"Fabio Pio Rauzino","twitter_card":"summary_large_image","twitter_title":"CYBEROO rafforza la propria presenza in Europa","twitter_description":"Cyberoo sottoscrive i primi contratti in Spagna in collaborazione con il partner \"Technology 2 Client\"","twitter_image":"https:\/\/cyberoo.com\/wp-content\/uploads\/2025\/11\/2026-CYBEROO-NEWS-2.png","twitter_creator":"@CYBEROO_ITALIA","twitter_site":"@CYBEROO_ITALIA","twitter_misc":{"Written by":"Fabio Pio Rauzino","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cyberoo.com\/en\/news\/cyberoo-publishes-its-observatory-2026-report\/#article","isPartOf":{"@id":"https:\/\/cyberoo.com\/en\/news\/cyberoo-publishes-its-observatory-2026-report\/"},"author":{"name":"Fabio Pio Rauzino","@id":"https:\/\/cyberoo.com\/en\/#\/schema\/person\/7041fc513d1b833c794097b97b38e243"},"headline":"Cyberoo publishes its 2026 Observatory report","datePublished":"2026-02-26T07:00:23+00:00","dateModified":"2026-02-26T07:03:15+00:00","mainEntityOfPage":{"@id":"https:\/\/cyberoo.com\/en\/news\/cyberoo-publishes-its-observatory-2026-report\/"},"wordCount":1074,"publisher":{"@id":"https:\/\/cyberoo.com\/en\/#organization"},"image":{"@id":"https:\/\/cyberoo.com\/en\/news\/cyberoo-publishes-its-observatory-2026-report\/#primaryimage"},"thumbnailUrl":"https:\/\/cyberoo.com\/wp-content\/uploads\/2026\/02\/2-1.jpg","keywords":["Cyberoo","Observatory","Osservatorio","trend"],"articleSection":["News &amp; Press"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/cyberoo.com\/en\/news\/cyberoo-publishes-its-observatory-2026-report\/","url":"https:\/\/cyberoo.com\/en\/news\/cyberoo-publishes-its-observatory-2026-report\/","name":"Cyberoo publishes its 2026 Observatory report","isPartOf":{"@id":"https:\/\/cyberoo.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cyberoo.com\/en\/news\/cyberoo-publishes-its-observatory-2026-report\/#primaryimage"},"image":{"@id":"https:\/\/cyberoo.com\/en\/news\/cyberoo-publishes-its-observatory-2026-report\/#primaryimage"},"thumbnailUrl":"https:\/\/cyberoo.com\/wp-content\/uploads\/2026\/02\/2-1.jpg","datePublished":"2026-02-26T07:00:23+00:00","dateModified":"2026-02-26T07:03:15+00:00","description":"Cyberoo S.p.A. publishes the second edition of the annual report of the Cyberoo Observatory, this year dedicated to the theme \u201cInside the dark matter of cyberspace.\u201d","breadcrumb":{"@id":"https:\/\/cyberoo.com\/en\/news\/cyberoo-publishes-its-observatory-2026-report\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cyberoo.com\/en\/news\/cyberoo-publishes-its-observatory-2026-report\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cyberoo.com\/en\/news\/cyberoo-publishes-its-observatory-2026-report\/#primaryimage","url":"https:\/\/cyberoo.com\/wp-content\/uploads\/2026\/02\/2-1.jpg","contentUrl":"https:\/\/cyberoo.com\/wp-content\/uploads\/2026\/02\/2-1.jpg","width":1200,"height":630,"caption":"Cyberoo publishes its 2026 Observatory reportreport"},{"@type":"BreadcrumbList","@id":"https:\/\/cyberoo.com\/en\/news\/cyberoo-publishes-its-observatory-2026-report\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cyberoo.com\/en\/"},{"@type":"ListItem","position":2,"name":"Cyberoo publishes its 2026 Observatory report"}]},{"@type":"WebSite","@id":"https:\/\/cyberoo.com\/en\/#website","url":"https:\/\/cyberoo.com\/en\/","name":"Cyberoo","description":"Superheroes are always ready for action","publisher":{"@id":"https:\/\/cyberoo.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cyberoo.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/cyberoo.com\/en\/#organization","name":"Cyberoo","url":"https:\/\/cyberoo.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cyberoo.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/cyberoo.com\/wp-content\/uploads\/2023\/01\/CYBEROO-logo-dark.svg","contentUrl":"https:\/\/cyberoo.com\/wp-content\/uploads\/2023\/01\/CYBEROO-logo-dark.svg","width":258,"height":38,"caption":"Cyberoo"},"image":{"@id":"https:\/\/cyberoo.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CYBEROO_ITALIA","https:\/\/it.linkedin.com\/company\/cyberoo-italia","https:\/\/www.youtube.com\/channel\/UC7AwVDG9Ngdwohk_zPd25xQ"]},{"@type":"Person","@id":"https:\/\/cyberoo.com\/en\/#\/schema\/person\/7041fc513d1b833c794097b97b38e243","name":"Fabio Pio Rauzino","url":"https:\/\/cyberoo.com\/en\/news\/author\/fabiopio-rauzino\/"}]}},"_links":{"self":[{"href":"https:\/\/cyberoo.com\/en\/wp-json\/wp\/v2\/posts\/24584","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberoo.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyberoo.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyberoo.com\/en\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberoo.com\/en\/wp-json\/wp\/v2\/comments?post=24584"}],"version-history":[{"count":3,"href":"https:\/\/cyberoo.com\/en\/wp-json\/wp\/v2\/posts\/24584\/revisions"}],"predecessor-version":[{"id":24608,"href":"https:\/\/cyberoo.com\/en\/wp-json\/wp\/v2\/posts\/24584\/revisions\/24608"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberoo.com\/en\/wp-json\/wp\/v2\/media\/24591"}],"wp:attachment":[{"href":"https:\/\/cyberoo.com\/en\/wp-json\/wp\/v2\/media?parent=24584"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyberoo.com\/en\/wp-json\/wp\/v2\/categories?post=24584"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyberoo.com\/en\/wp-json\/wp\/v2\/tags?post=24584"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}