{"id":5969,"date":"2025-07-24T11:36:45","date_gmt":"2025-07-24T06:06:45","guid":{"rendered":"https:\/\/newsdata.io\/blog\/?p=5969"},"modified":"2025-07-25T10:29:29","modified_gmt":"2025-07-25T04:59:29","slug":"cyber-crimes-datasets","status":"publish","type":"post","link":"https:\/\/newsdata.io\/blog\/cyber-crimes-datasets\/","title":{"rendered":"Cyber Crimes Datasets 2025"},"content":{"rendered":"[vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/4&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221; column_padding_type=&#8221;default&#8221; gradient_type=&#8221;default&#8221;][\/vc_column][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; el_class=&#8221;text_block_wrapper&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;3\/4&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221; column_padding_type=&#8221;default&#8221; gradient_type=&#8221;default&#8221;][image_with_animation image_url=&#8221;5974&#8243; image_size=&#8221;full&#8221; animation_type=&#8221;entrance&#8221; animation=&#8221;None&#8221; animation_movement_type=&#8221;transform_y&#8221; hover_animation=&#8221;none&#8221; alignment=&#8221;&#8221; border_radius=&#8221;none&#8221; box_shadow=&#8221;none&#8221; image_loading=&#8221;default&#8221; max_width=&#8221;100%&#8221; max_width_mobile=&#8221;default&#8221;][vc_column_text]<span style=\"font-weight: 400\">Welcome back to the <\/span><b>\u2018Dataset of the Week<\/b><span style=\"font-weight: 400\">\u2019 blog series, where we bring you a mega compilation of free, available datasets on trending topics. The topic we chose for this week is \u2018Cyber Crimes\u2019.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400\">You can also read previous blogs in the \u2018<a href=\"https:\/\/newsdata.io\/blog\/mega-compilation-news-dataset\/\">Dataset of the Week<\/a>\u2019 series on the following blogs:<\/span>[\/vc_column_text][vc_column_text]\n<ul>\n<li style=\"font-weight: 400\"><a href=\"https:\/\/newsdata.io\/blog\/russia-ukraine-war-news-datasets\/\"> Russia-Ukraine War News Datasets <\/a><\/li>\n<li style=\"font-weight: 400\"><a href=\"https:\/\/newsdata.io\/blog\/israel-hamas-war-datasets\/\"> Israel-Hamas News Datasets <\/a><\/li>\n<li style=\"font-weight: 400\"><a href=\"https:\/\/newsdata.io\/blog\/global-inflation-datasets\/\"> Global Inflation Dataset <\/a><\/li>\n<li style=\"font-weight: 400\"><a href=\"https:\/\/newsdata.io\/blog\/us-elections-news-datasets\/\"> US Elections News Dataset <\/a><\/li>\n<li><a href=\"https:\/\/newsdata.io\/blog\/india-election-2024-news-datasets\/\"> India Elections 2024 News Dataset <\/a><\/li>\n<li><a href=\"https:\/\/newsdata.io\/blog\/fifa-worldcup-2023-datasets-a-mega-compilation\/\"> FIFA World Cup News Datasets <\/a><\/li>\n<li style=\"font-weight: 400\"><a href=\"https:\/\/newsdata.io\/blog\/infrastructure-development-news-dataset\/\"> Infrastructure Development News Dataset <\/a><span style=\"font-weight: 400\">\u00a0<\/span><\/li>\n<li style=\"font-weight: 400\"><a href=\"https:\/\/newsdata.io\/blog\/carbon-footprint-news-datasets\/\"> Carbon Footprints News Datasets <\/a><\/li>\n<li style=\"font-weight: 400\"><a href=\"https:\/\/newsdata.io\/blog\/indian-stock-market-news-dataset\/\"> Indian Stock Market News Datasets <\/a><\/li>\n<li style=\"font-weight: 400\"><a href=\"https:\/\/newsdata.io\/blog\/space-race-news-datasets\/\"> Space Race News Datasets <\/a><\/li>\n<li style=\"font-weight: 400\"><a href=\"https:\/\/newsdata.io\/blog\/climate-crisis-news-datasets-a-mega-compilation\/\"> Climate Crisis News Datasets <\/a><\/li>\n<li style=\"font-weight: 400\"><a href=\"https:\/\/newsdata.io\/blog\/oil-trading-news-datasets\/\"> Oil Trading News Datasets <\/a><\/li>\n<li style=\"font-weight: 400\"><a href=\"https:\/\/newsdata.io\/blog\/ai-progress-news-datasets\/\"> AI Progress News Datasets <\/a><\/li>\n<li style=\"font-weight: 400\"><a href=\"https:\/\/newsdata.io\/blog\/heat-wave-news-datasets\/\"> Heat Waves News Datasets <\/a><\/li>\n<li style=\"font-weight: 400\"><a href=\"https:\/\/newsdata.io\/blog\/french-elections-news-datasets\/\"> French Elections News Datasets <\/a><\/li>\n<li style=\"font-weight: 400\"><a href=\"https:\/\/newsdata.io\/blog\/ev-news-datasets\/\"> EV News Datasets <\/a><\/li>\n<li style=\"font-weight: 400\"><a href=\"https:\/\/newsdata.io\/blog\/cybercrime-news-datasets\/\"> Cybercrime News Datasets <\/a><\/li>\n<li style=\"font-weight: 400\"><a href=\"https:\/\/newsdata.io\/blog\/uefa-euro-standings-news-datasets\/\">UEFA Euro Standings News Datasets<\/a><\/li>\n<li style=\"font-weight: 400\"><a href=\"https:\/\/newsdata.io\/blog\/2024-olympics-news-datasets\/\">2024 Olympics News Datasets<\/a><\/li>\n<li style=\"font-weight: 400\"><a href=\"https:\/\/newsdata.io\/blog\/us-tariffs-datasets\/\">US Tariff News Datasets Compilation 2025<\/a><\/li>\n<li style=\"font-weight: 400\"><a href=\"https:\/\/newsdata.io\/blog\/india-pak-conflict-dataset\/\">India-Pakistan Conflict Datasets Compilation<\/a><\/li>\n<\/ul>\n[\/vc_column_text][vc_column_text]\n<h2><b>Cyber Crimes<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Cybercrime datasets are collections of data related to cybersecurity incidents, which can be used for research, analysis, and training in the field of cybersecurity. These datasets include information on various cybercrimes, attack types, security tools used, and other relevant details worldwide.\u00a0<\/span>[\/vc_column_text][vc_column_text]\n<h2><b>Dataset Customization<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Despite ample websites and data portals providing you with datasets related to it, you can\u2019t always get a dataset that meets all the required criteria. For scenarios like this, providers like <\/span><a href=\"http:\/\/newsdata.io\/\"><b>Newsdata.io<\/b><\/a><span style=\"font-weight: 400\"> and<\/span><b> Datarade<\/b><span style=\"font-weight: 400\"> are leading providers of customised datasets.<\/span><\/p>\n<p><span style=\"font-weight: 400\">To request customised datasets on <\/span><span style=\"font-weight: 400\"><b>Cybercrimes<\/b><\/span><span style=\"font-weight: 400\">\u00a0on Newsdata.io, follow the given steps:<\/span>[\/vc_column_text][vc_column_text]\n<ul>\n<li>\n<h3><b>Search for data<\/b><\/h3>\n<\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">You can now search for several articles on your chosen topic and retrieve data using the search bar, as shown below.<\/span><br \/>\n\n<!-- iframe plugin v.5.0 wordpress.org\/plugins\/iframe\/ -->\n<iframe loading=\"lazy\" src=\"https:\/\/newsdata.io\/single\/search\" height=\"150\" width=\"100%\" scrolling=\"yes\" class=\"iframe-class\" frameborder=\"0\"><\/iframe>\n\n<ul>\n<li>\n<h3><b>Request news data<\/b><\/h3>\n<\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">You can request data by choosing the \u2018<\/span><a href=\"https:\/\/newsdata.io\/historical-news-download#request-form\"><b>Request News Data<\/b><\/a><span style=\"font-weight: 400\">\u2019 option. This will then redirect you to a request form, as shown below.<\/span><\/p>\n\n<!-- iframe plugin v.5.0 wordpress.org\/plugins\/iframe\/ -->\n<iframe loading=\"lazy\" src=\"https:\/\/newsdata.io\/hreport\" height=\"680\" width=\"100%\" scrolling=\"yes\" class=\"iframe-class\" frameborder=\"0\"><\/iframe>\n[\/vc_column_text][vc_column_text]\n<ul>\n<li><b>NOTE<\/b><span style=\"font-weight: 400\">: If you want an overview of how the data will be segregated into datasets, you can choose the \u2018<\/span><a href=\"https:\/\/newsdata.io\/historical-news-download#request-form\"><b>Download Sample<\/b><\/a><span style=\"font-weight: 400\">\u2019 option.<\/span><\/li>\n<\/ul>\n[\/vc_column_text][vc_column_text]\n<h2><b>List Of Available Datasets<\/b><\/h2>\n[\/vc_column_text][vc_column_text]<b>1. Share of organizations in the United States that are at risk of a material cyberattack according to CISOs from 2021 to 2024<\/b><\/p>\n<p><b>Source: <\/b><span style=\"font-weight: 400\">Statista<\/span><\/p>\n<p><b>Author:<\/b><span style=\"font-weight: 400\"> Ani Petrosyan<\/span><\/p>\n<p><b>Publish Date: <\/b><span style=\"font-weight: 400\">Jun 23, 2025<\/span><\/p>\n<p><b>Link: <\/b><a href=\"http:\/\/statista.com\/statistics\/1448307\/companies-at-material-cyberattack-risk-us\/\">http:\/\/statista.com\/statistics\/1448307\/companies-at-material-cyberattack-risk-us\/<\/a><\/p>\n<p><b>Description: <\/b><span style=\"font-weight: 400\">A 2024 survey among chief information security officers (CISOs) in the United States showed that almost 9 in 10 organizations were at risk of a material cyberattack in the following 12 months.<\/span><\/p>\n<p><b>2. Share of organizations worldwide that are at risk of a material cyberattack according to board members as of June 2023, by country<\/b><\/p>\n<p><b>Source:\u00a0 <\/b><span style=\"font-weight: 400\">Statista<\/span><\/p>\n<p><b>Author:<\/b><span style=\"font-weight: 400\"> Ani Petrosyan<\/span><\/p>\n<p><b>Publish Date: <\/b><span style=\"font-weight: 400\">Mar 10, 2025<\/span><\/p>\n<p><b>Link: <\/b><a href=\"https:\/\/www.statista.com\/statistics\/1367360\/risk-cyber-attack-companies-worldwide-board-directors-by-country\/\">https:\/\/www.statista.com\/statistics\/1367360\/risk-cyber-attack-companies-worldwide-board-directors-by-country\/<\/a><\/p>\n<p><b>Description: <\/b><span style=\"font-weight: 400\">According to a 2023 survey among board members of worldwide organizations, approximately 95 percent of companies in Canada were at risk of a material cyberattack.<\/span><\/p>\n<p><b>3. Cyber Crimes from NCRB: Year-, State- and City-wise Number of Cyber Crimes Committed in violation of Special and Local Laws (SLL)<\/b><\/p>\n<p><b>Source: <\/b><span style=\"font-weight: 400\">Dataful<\/span><\/p>\n<p><b>Author:<\/b><span style=\"font-weight: 400\"> National Crime Records Bureau<\/span><\/p>\n<p><b>Publish Date: <\/b><span style=\"font-weight: 400\">February 2025<\/span><\/p>\n<p><b>Link: <\/b><a href=\"https:\/\/dataful.in\/datasets\/19644\/\">https:\/\/dataful.in\/datasets\/19644\/<\/a><\/p>\n<p><b>Description: <\/b><span style=\"font-weight: 400\">The dataset contains year-, state-, and city-wise data on the number of cyber crimes committed in Indian cities with over one million population, in violation of Special and Local Laws (SLL), together with the total number of Cyber crimes committed.\u00a0<\/span><\/p>\n<p><b>4. Cyber Crime Statewise (INDIA)<\/b><\/p>\n<p><b>Source: <\/b><span style=\"font-weight: 400\">Kaggle<\/span><\/p>\n<p><b>Author:<\/b><span style=\"font-weight: 400\"> Amritvir Singh<\/span><\/p>\n<p><b>Link: <\/b><a href=\"https:\/\/www.kaggle.com\/datasets\/amritvirsinghx\/cyber-crime-statewise\">https:\/\/www.kaggle.com\/datasets\/amritvirsinghx\/cyber-crime-statewise<\/a><\/p>\n<p><b>Description: <\/b><span style=\"font-weight: 400\">This dataset contains information about state-wise cybercrime in India and can be used to predict future crime rates. Some interesting insights can be generated by predicting crimes in 2020 and how the pandemic has affected the rise in cybercrimes.<\/span><\/p>\n<p><b>5. Share of CISOs in companies in the United States in agreement that human error is their organization&#8217;s biggest cyber vulnerability from 2021 to 2024<\/b><\/p>\n<p><b>Source: <\/b><span style=\"font-weight: 400\">Statista<\/span><\/p>\n<p><b>Author:<\/b><span style=\"font-weight: 400\"> Alexandra Borgeaud<\/span><\/p>\n<p><b>Publish Date: <\/b><span style=\"font-weight: 400\">Jun 25, 2025<\/span><\/p>\n<p><b>Link: <\/b><a href=\"https:\/\/www.statista.com\/statistics\/1448350\/ciso-human-error-organization-cyber-vulnerability-global\/\">https:\/\/www.statista.com\/statistics\/1448350\/ciso-human-error-organization-cyber-vulnerability-global\/<\/a><\/p>\n<p><b>Description: <\/b><span style=\"font-weight: 400\">According to a 2024 survey, a percentage of respondents among Chief Information Security Officers (CISOs) in the United States said human error is their organization&#8217;s most significant cyber vulnerability. This represents a slight decrease compared with the previous year.<\/span><\/p>\n<p><b>6. Revenue of cyber solutions market segments in the Asia-Pacific region in 2025, by selected country<\/b><\/p>\n<p><b>Source: <\/b><span style=\"font-weight: 400\">Statista<\/span><\/p>\n<p><b>Author:<\/b><span style=\"font-weight: 400\"> K. Tran\u00a0<\/span><\/p>\n<p><b>Publish Date: <\/b><span style=\"font-weight: 400\">Jul 21, 2025<\/span><\/p>\n<p><b>Link: <\/b><a href=\"https:\/\/www.statista.com\/forecasts\/1400864\/apac-revenue-of-cyber-solutions-by-segment-country\">https:\/\/www.statista.com\/forecasts\/1400864\/apac-revenue-of-cyber-solutions-by-segment-country<\/a><\/p>\n<p><b>Description: <\/b><span style=\"font-weight: 400\">In 2025, the network security market in China was estimated to generate around a few billion U.S. dollars in revenue, making it the largest cyber solutions segment in the country.<\/span><\/p>\n<p><b>7. Annual number of incoming complaints about internet crime on the IC3 website from 2000 to 2024<\/b><\/p>\n<p><b>Source: <\/b><span style=\"font-weight: 400\">Statista<\/span><\/p>\n<p><b>Author:<\/b><span style=\"font-weight: 400\"> Ani Petrosyan<\/span><\/p>\n<p><b>Publish Date: <\/b><span style=\"font-weight: 400\">Jul 15, 2025<\/span><\/p>\n<p><b>Link: <\/b><a href=\"https:\/\/www.statista.com\/statistics\/267546\/number-of-complaints-about-us-internet-crime\/\">https:\/\/www.statista.com\/statistics\/267546\/number-of-complaints-about-us-internet-crime\/<\/a><\/p>\n<p><b>Description: <\/b><span style=\"font-weight: 400\">The annual number of complaints of cybercrime received annually on the U.S. Internet Crime Complaint Center (IC3) website increased significantly between 2000 and 2024.<\/span><\/p>\n<p><b>8. Most significant data breaches in the United States as of December 2025, by impact<\/b><\/p>\n<p><b>Source: <\/b><span style=\"font-weight: 400\">Statista<\/span><\/p>\n<p><b>Author: <\/b><span style=\"font-weight: 400\">Ani Petrosyan<\/span><\/p>\n<p><b>Publish Date: <\/b><span style=\"font-weight: 400\">Jul 7, 2025\u00a0<\/span><\/p>\n<p><b>Link: <\/b><a href=\"https:\/\/www.statista.com\/statistics\/1448545\/us-biggest-data-breaches\/\">https:\/\/www.statista.com\/statistics\/1448545\/us-biggest-data-breaches\/<\/a><\/p>\n<p><b>Description: <\/b><span style=\"font-weight: 400\">As of June 2025, the most significant data breach incident in the United States was the Yahoo data breach that dates back to 2013-2016. Impacting over three billion online users, this incident remains one of the most significant data breaches worldwide.<\/span><\/p>\n<p><b>9. Number of records exposed in online data breaches in the United States from the 1st quarter of 2020 to the 2nd quarter of 2025<\/b><\/p>\n<p><b>Source: <\/b><span style=\"font-weight: 400\">Statista<\/span><\/p>\n<p><b>Author:<\/b><span style=\"font-weight: 400\"> Ani Petrosyan<\/span><\/p>\n<p><b>Publish Date: <\/b><span style=\"font-weight: 400\">Jul 7, 2025<\/span><\/p>\n<p><b>Link:<\/b><a href=\"https:\/\/www.statista.com\/statistics\/1329989\/us-number-of-records-exposed\/\"> https:\/\/www.statista.com\/statistics\/1329989\/us-number-of-records-exposed\/<\/a><\/p>\n<p><b>Description: <\/b><span style=\"font-weight: 400\">Between the third quarter of 2024 and the second quarter of 2025, the number of records exposed in data breaches in the United States decreased significantly.<\/span><\/p>\n<p><b>10. Cyber Crimes Dataset<\/b><\/p>\n<p><b>Source: <\/b><span style=\"font-weight: 400\">Kaggle<\/span><\/p>\n<p><b>Author:<\/b><span style=\"font-weight: 400\"> Shakirul<\/span><\/p>\n<p><b>Link:<\/b><a href=\"https:\/\/www.kaggle.com\/datasets\/shakirul09\/cyber-crimes-dataset\"> https:\/\/www.kaggle.com\/datasets\/shakirul09\/cyber-crimes-dataset<\/a><\/p>\n<p><b>Description: <\/b><span style=\"font-weight: 400\">This dataset includes several cyber crimes and realistic cybersecurity incidents along with the attack types, target systems, outcomes, industries, etc.\u00a0<\/span>[\/vc_column_text][vc_column_text]<b>11. Most commonly reported cybercrime categories in the United States in 2024, by number of individuals affected.<\/b><\/p>\n<p><b>Source: <\/b><span style=\"font-weight: 400\">Statista\u00a0<\/span><\/p>\n<p><b>Author:<\/b><span style=\"font-weight: 400\"> Ani Petrosyan<\/span><\/p>\n<p><b>Publish Date: <\/b><span style=\"font-weight: 400\">Jul 7, 2025<\/span><\/p>\n<p><b>Link: <\/b><a href=\"https:\/\/www.statista.com\/statistics\/184083\/commonly-reported-types-of-cyber-crime-us\/\">https:\/\/www.statista.com\/statistics\/184083\/commonly-reported-types-of-cyber-crime-us\/<\/a><\/p>\n<p><b>Description: <\/b><span style=\"font-weight: 400\">In 2024, the most common type of cybercrime reported to the United States Internet Crime Complaint Center was phishing, with its variation, spoofing, affecting approximately 193,000 individuals.<\/span><\/p>\n<p><b>12. Data privacy actions taken by adults in the United States in the past year as of January 2025, by type<\/b><\/p>\n<p><b>Source: <\/b><span style=\"font-weight: 400\">Statista\u00a0<\/span><\/p>\n<p><b>Author: <\/b><span style=\"font-weight: 400\">Ani Petrosyan<\/span><\/p>\n<p><b>Publish Date: <\/b><span style=\"font-weight: 400\">\u00a0Jul 16, 2025<\/span><\/p>\n<p><b>Link: <\/b><a href=\"https:\/\/www.statista.com\/statistics\/1618805\/us-adults-taking-actions-privacy-by-type\/\">https:\/\/www.statista.com\/statistics\/1618805\/us-adults-taking-actions-privacy-by-type\/<\/a><\/p>\n<p><b>Description: <\/b><span style=\"font-weight: 400\">According to a survey conducted in January 2025 in the United States, the most common privacy action individuals took in the past year was avoiding clicking on suspicious links or e-mails, performed of the respondents.<\/span><\/p>\n<p><b>13. Concerns among adults in the United States about the spread of artificial intelligence (AI) video and audio deep fakes as of March 2025, by gender<\/b><\/p>\n<p><b>Source: <\/b><span style=\"font-weight: 400\">Statista\u00a0<\/span><\/p>\n<p><b>Author:<\/b><span style=\"font-weight: 400\"> Statista Research Department<\/span><\/p>\n<p><b>Publish Date: <\/b><span style=\"font-weight: 400\">Jul 7, 2025<\/span><\/p>\n<p><b>Link: <\/b><a href=\"https:\/\/www.statista.com\/statistics\/1470862\/us-adults-fear-of-ai-deepfakes-by-gender\/\">https:\/\/www.statista.com\/statistics\/1470862\/us-adults-fear-of-ai-deepfakes-by-gender\/<\/a><\/p>\n<p><b>Description: <\/b><span style=\"font-weight: 400\">According to a survey conducted in March 2025, a percentage of adult female respondents in the United States expressed concerns about the spread of artificial intelligence (AI) video and audio deepfakes.<\/span><\/p>\n<p><b>14. Willingness of adults in the United States to pay premium fees to companies with strong data protection as of May 2024<\/b><\/p>\n<p><b>Source: <\/b><span style=\"font-weight: 400\">Statista\u00a0<\/span><\/p>\n<p><b>Author:<\/b><span style=\"font-weight: 400\"> Ani Petrosyan<\/span><\/p>\n<p><b>Publish Date: <\/b><span style=\"font-weight: 400\">Mar 10, 2025<\/span><\/p>\n<p><b>Link: <\/b><a href=\"https:\/\/www.statista.com\/statistics\/1469800\/us-adults-willingness-to-pay-for-personal-data-protection\/\">https:\/\/www.statista.com\/statistics\/1469800\/us-adults-willingness-to-pay-for-personal-data-protection\/<\/a><\/p>\n<p><b>Description: <\/b><span style=\"font-weight: 400\">As of May 2024, 15 percent of adults in the United States said they were very willing to pay a premium fee to companies with strong data protection, while 45 percent of adults said they were somewhat willing. In Comparison, 18 percent of U.S. adults said they were very unwilling to pay for extra personal data protection.<\/span><\/p>\n<p><b>15. Opinions among adults in the United States regarding artificial intelligence (AI) causing erosion of personal privacy as of March 2025, by age group<\/b><\/p>\n<p><b>Source: <\/b><span style=\"font-weight: 400\">Statista\u00a0<\/span><\/p>\n<p><b>Author:<\/b><span style=\"font-weight: 400\"> Ani Petrosyan<\/span><\/p>\n<p><b>Publish Date:<\/b><span style=\"font-weight: 400\"> Jul 8, 2025<\/span><\/p>\n<p><b>Link: <\/b><a href=\"https:\/\/www.statista.com\/statistics\/1618202\/us-adults-on-ai-impact-on-privacy-violation-by-age\/\">https:\/\/www.statista.com\/statistics\/1618202\/us-adults-on-ai-impact-on-privacy-violation-by-age\/<\/a><\/p>\n<p><b>Description: <\/b><span style=\"font-weight: 400\">According to a survey conducted in March 2025 in the United States, the age group most concerned about the impact of artificial intelligence (AI) on privacy violations was individuals.\u00a0<\/span><\/p>\n<p><b>16. Cybercrime in India over a certain period.<\/b><\/p>\n<p><b>Source: <\/b><span style=\"font-weight: 400\">Kaggle\u00a0<\/span><\/p>\n<p><b>Author:<\/b><span style=\"font-weight: 400\"> Sevenzee7<\/span><\/p>\n<p><b>Link: <\/b><a href=\"https:\/\/www.kaggle.com\/datasets\/seanangelonathanael\/dataset-cybercrime-in-india\">https:\/\/www.kaggle.com\/datasets\/seanangelonathanael\/dataset-cybercrime-in-india<\/a><\/p>\n<p><b>Description: <\/b><span style=\"font-weight: 400\">The cybercrime dataset includes data related to cyber crimes within a certain period. An explanation of this dataset can be made based on the features or labels that have been given.\u00a0<\/span><\/p>\n<p><b>17. Opinions among adults in the United States regarding artificial intelligence (AI) causing erosion of personal privacy as of March 2025<\/b><\/p>\n<p><b>Source:<\/b><span style=\"font-weight: 400\"> Statista<\/span><\/p>\n<p><b>Author:<\/b><span style=\"font-weight: 400\"> Ani Petrosyan<\/span><\/p>\n<p><b>Publish Date: <\/b><span style=\"font-weight: 400\">Jul 8, 2025<\/span><\/p>\n<p><b>Link: <\/b><a href=\"https:\/\/www.statista.com\/statistics\/1618190\/us-adults-on-ai-impact-on-privacy-violation\/\">https:\/\/www.statista.com\/statistics\/1618190\/us-adults-on-ai-impact-on-privacy-violation\/<\/a><\/p>\n<p><b>Description: <\/b><span style=\"font-weight: 400\">According to a survey conducted in March 2025, over the adults in the United States were very concerned about the impact of artificial intelligence on the violation of personal privacy. Furthermore, a percent said they were not very concerned.<\/span><\/p>\n<p><b>18. Items linked to cyber crimes blocked by the Indian Cyber Crime Coordination Centre in India from March to September 2024<\/b><\/p>\n<p><b>Source: <\/b><span style=\"font-weight: 400\">Statista<\/span><\/p>\n<p><b>Author:<\/b><span style=\"font-weight: 400\"> Tanushree Basuroy<\/span><\/p>\n<p><b>Publish Date: <\/b><span style=\"font-weight: 400\">Jul 11, 2025<\/span><\/p>\n<p><b>Link: <\/b><a href=\"https:\/\/www.statista.com\/statistics\/1499864\/india-cyber-crime-related-items-blocked-by-i4c\/\">https:\/\/www.statista.com\/statistics\/1499864\/india-cyber-crime-related-items-blocked-by-i4c\/<\/a><\/p>\n<p><b>Description: <\/b><span style=\"font-weight: 400\">The Indian Cyber Crime Coordination Centre (I4C) took down around pieces of online content that perpetrated cyber crime in India between March and September 2024. Other actions taken by the I4C, set up by the Ministry of Home Affairs, included blocking mobile phone numbers, IMEIs, and applications linked to cyber crimes.<\/span><\/p>\n<p><b>19. Number of cyber fraud cases reported across India in 2022, by leading state<\/b><\/p>\n<p><b>Source: <\/b><span style=\"font-weight: 400\">Statista<\/span><\/p>\n<p><b>Author:<\/b><span style=\"font-weight: 400\"> Tanushree Basuroy<\/span><\/p>\n<p><b>Publish Date: <\/b><span style=\"font-weight: 400\">Jul 9, 2025<\/span><\/p>\n<p><b>Link: <\/b><a href=\"https:\/\/www.statista.com\/statistics\/1097920\/india-cyber-fraud-incidents-by-leading-state\/\">https:\/\/www.statista.com\/statistics\/1097920\/india-cyber-fraud-incidents-by-leading-state\/<\/a><\/p>\n<p><b>Description: <\/b><span style=\"font-weight: 400\">In 2022, the state of Telangana in India had the highest number of cyber fraud offences.\u00a0<\/span><\/p>\n<p><b>20. Number of cyber crimes related to sexual harassment and exploitation across India from 2016 to 2022<\/b><\/p>\n<p><b>Source: <\/b><span style=\"font-weight: 400\">Statista<\/span><\/p>\n<p><b>Author:<\/b><span style=\"font-weight: 400\"> Tanushree Basuroy<\/span><\/p>\n<p><b>Publish Date: <\/b><span style=\"font-weight: 400\">Jul 8, 2025<\/span><\/p>\n<p><b>Link: <\/b><a href=\"https:\/\/www.statista.com\/statistics\/875912\/india-number-of-cyber-crimes-related-to-sexual-harassment\/\">https:\/\/www.statista.com\/statistics\/875912\/india-number-of-cyber-crimes-related-to-sexual-harassment\/<\/a><\/p>\n<p><b>Description: <\/b><span style=\"font-weight: 400\">There were thousands of cases of cybercrime related to sexual harassment or exploitation reported across India in 2022.<\/span>[\/vc_column_text][vc_column_text]<b>21. Indian Cyber Threat data<\/b><\/p>\n<p><b>Source: <\/b><span style=\"font-weight: 400\">Kaggle<\/span><\/p>\n<p><b>Author:<\/b><span style=\"font-weight: 400\"> Saurav Kumar<\/span><\/p>\n<p><b>Link:<\/b><a href=\"https:\/\/www.kaggle.com\/datasets\/iraaday7\/indian-cyber-theat-data\"> https:\/\/www.kaggle.com\/datasets\/iraaday7\/indian-cyber-theat-data<\/a><\/p>\n<p><b>Description: <\/b><span style=\"font-weight: 400\">The dataset contains year-, state-, and city-wise historically compiled data on the number of cyber crimes committed in violation of the Information Technology Act (IT Act) in Indian cities with over one million population.<\/span><\/p>\n<p><b>22. Most important consequences of cyber attacks worldwide in 2024<\/b><\/p>\n<p><b>Source: <\/b><span style=\"font-weight: 400\">Statista<\/span><\/p>\n<p><b>Author:<\/b><span style=\"font-weight: 400\"> Ani Petrosyan<\/span><\/p>\n<p><b>Publish Date: <\/b><span style=\"font-weight: 400\">Jun 23, 2025<\/span><\/p>\n<p><b>Link: <\/b><a href=\"https:\/\/www.statista.com\/statistics\/1327148\/main-consequences-cyber-attacks-cybersecurity-worldwide\/\">https:\/\/www.statista.com\/statistics\/1327148\/main-consequences-cyber-attacks-cybersecurity-worldwide\/<\/a><\/p>\n<p><b>Description: <\/b><span style=\"font-weight: 400\">Cyber attacks on businesses are becoming more frequent, targeted, and complex. The effects of a cyber attack go well beyond the direct financial consequences.<\/span><\/p>\n<p><b>23. Number of people arrested and charged for cyber crimes across India in 2022, by gender<\/b><\/p>\n<p><b>Source: <\/b><span style=\"font-weight: 400\">Statista<\/span><\/p>\n<p><b>Author:<\/b><span style=\"font-weight: 400\"> Tanushree Basuroy<\/span><\/p>\n<p><b>Publish Date: <\/b><span style=\"font-weight: 400\">Jul 9, 2025<\/span><\/p>\n<p><b>Link: <\/b><a href=\"https:\/\/www.statista.com\/statistics\/1118320\/india-persons-arrested-and-charged-for-cyber-crimes-by-gender\/\">https:\/\/www.statista.com\/statistics\/1118320\/india-persons-arrested-and-charged-for-cyber-crimes-by-gender\/<\/a><\/p>\n<p><b>Description: <\/b><span style=\"font-weight: 400\">In 2022, over a thousand men were arrested on account of cyber crimes across India compared to women arrested.<\/span><\/p>\n<p><b>24. Total purchase amount planned for cybersecurity in South Korea in 2024, by agency type<\/b><\/p>\n<p><b>Source: <\/b><span style=\"font-weight: 400\">Statista<\/span><\/p>\n<p><b>Author:<\/b><span style=\"font-weight: 400\"> Nina Jobst<\/span><\/p>\n<p><b>Publish Date: <\/b><span style=\"font-weight: 400\">Jul 22, 2025<\/span><\/p>\n<p><b>Link: <\/b><a href=\"https:\/\/www.statista.com\/statistics\/1308528\/south-korea-cyber-security-purchase-plan-by-agency-type\/\">https:\/\/www.statista.com\/statistics\/1308528\/south-korea-cyber-security-purchase-plan-by-agency-type\/<\/a><\/p>\n<p><b>Description: <\/b><span style=\"font-weight: 400\">In 2024, according to a survey on cybersecurity purchase demand data, public institutions had planned the largest amount of cybersecurity purchases.\u00a0<\/span><\/p>\n<p><b>25. Number of cyber crimes under the competence of the Directorate for Investigating Organized Crime and Terrorism in Romania from 2010 to 2024<\/b><\/p>\n<p><b>Source: <\/b><span style=\"font-weight: 400\">Statista<\/span><\/p>\n<p><b>Author:<\/b><span style=\"font-weight: 400\"> Statista Research Department<\/span><\/p>\n<p><b>Publish Date: <\/b><span style=\"font-weight: 400\">Jul 9, 2025<\/span><\/p>\n<p><b>Link:<\/b><a href=\"https:\/\/www.statista.com\/statistics\/1258159\/romania-cyber-crimes-diicot\/\"> https:\/\/www.statista.com\/statistics\/1258159\/romania-cyber-crimes-diicot\/<\/a><\/p>\n<p><b>Description: <\/b><span style=\"font-weight: 400\">In 2024, the Directorate for Investigating Organized Crime and Terrorism in Romania closed cybercrime cases.<\/span><\/p>\n<p><b>26. Most significant cases of data breach worldwide as of January 2025, by number of compromised data records and individuals impacted<\/b><\/p>\n<p><b>Source: <\/b><span style=\"font-weight: 400\">Statista<\/span><\/p>\n<p><b>Author:<\/b><span style=\"font-weight: 400\"> Ani Petrosyan<\/span><\/p>\n<p><b>Publish Date: <\/b><span style=\"font-weight: 400\">May 26, 2025<\/span><\/p>\n<p><b>Link: <\/b><a href=\"https:\/\/www.statista.com\/statistics\/290525\/cyber-crime-biggest-online-data-breaches-worldwide\/\">https:\/\/www.statista.com\/statistics\/290525\/cyber-crime-biggest-online-data-breaches-worldwide\/<\/a><\/p>\n<p><b>Description: <\/b><span style=\"font-weight: 400\">The largest reported data leakage as of January 2025 was the Cam4 data breach in March 2020, which exposed more than 10 billion data records.<\/span><\/p>\n<p><b>27. Average cost of a data breach worldwide from May 2020 to February 2024, by industry<\/b><\/p>\n<p><b>Source: <\/b><span style=\"font-weight: 400\">Statista<\/span><\/p>\n<p><b>Author:<\/b><span style=\"font-weight: 400\"> Ani Petrosyan<\/span><\/p>\n<p><b>Publish Date: <\/b><span style=\"font-weight: 400\">\u00a0Jun 23, 2025<\/span><\/p>\n<p><b>Link: <\/b><a href=\"https:\/\/www.statista.com\/statistics\/387861\/cost-data-breach-by-industry\/\">https:\/\/www.statista.com\/statistics\/387861\/cost-data-breach-by-industry\/<\/a><\/p>\n<p><b>Description: <\/b><span style=\"font-weight: 400\">Between March 2022 and February 2024, the highest average cost of a data breach, nearly a million U.S. dollars, was detected in the healthcare industry.<\/span><\/p>\n<p><b>28. Estimated cost of cybercrime worldwide 2018-2029 (in trillion U.S. dollars)<\/b><\/p>\n<p><b>Source: <\/b><span style=\"font-weight: 400\">Statista<\/span><\/p>\n<p><b>Author:<\/b><span style=\"font-weight: 400\"> Ani Petrosyan<\/span><\/p>\n<p><b>Publish Date: <\/b><span style=\"font-weight: 400\">Jun 23, 2025<\/span><\/p>\n<p><b>Link: <\/b><a href=\"https:\/\/www.statista.com\/forecasts\/1280009\/cost-cybercrime-worldwide\">https:\/\/www.statista.com\/forecasts\/1280009\/cost-cybercrime-worldwide<\/a><\/p>\n<p><b>Description: <\/b><span style=\"font-weight: 400\">The global indicator &#8216;Estimated Cost of Cybercrime&#8217; in the cybersecurity market was forecast to continuously increase between 2024 and 2029.<\/span><\/p>\n<p><b>29. Timeline of data privacy regulation in the European Union (EU) as of February 2025<\/b><\/p>\n<p><b>Source: <\/b><span style=\"font-weight: 400\">Statista<\/span><\/p>\n<p><b>Author:<\/b><span style=\"font-weight: 400\"> Ani Petrosyan<\/span><\/p>\n<p><b>Publish Date: <\/b><span style=\"font-weight: 400\">Mar 3, 2025<\/span><\/p>\n<p><b>Link:<\/b><a href=\"https:\/\/www.statista.com\/statistics\/1558389\/eu-privacy-regulation-timeline\/\">https:\/\/www.statista.com\/statistics\/1558389\/eu-privacy-regulation-timeline\/<\/a><\/p>\n<p><b>Description: <\/b><span style=\"font-weight: 400\">As of February 2025, the European Union (EU) has introduced or proposed around 21 laws or amendments covering data privacy. The first and the most comprehensive such regulation was approved in 2016 and fully enforced in May 2018.<\/span><\/p>\n<p><b>30. Distribution of cyberattack incidents in companies worldwide from 2020 to 2024, by region<\/b><\/p>\n<p><b>Source: <\/b><span style=\"font-weight: 400\">Statista<\/span><\/p>\n<p><b>Author:<\/b><span style=\"font-weight: 400\"> Ani Petrosyan<\/span><\/p>\n<p><b>Publish Date:<\/b><span style=\"font-weight: 400\"> May 26, 2025<\/span><\/p>\n<p><b>Link: <\/b><a href=\"https:\/\/www.statista.com\/statistics\/1499023\/global-cyberattack-incidents-by-region\/\">https:\/\/www.statista.com\/statistics\/1499023\/global-cyberattack-incidents-by-region\/<\/a><\/p>\n<p><b>Description:<\/b><span style=\"font-weight: 400\"> In 2024, the Asia-Pacific region was impacted by cyberattacks more than other regions, accounting for 34 percent of cases, up from 23 percent in the year prior. Europe and North America followed, with around a quarter of reported incidents.<\/span>[\/vc_column_text][vc_column_text]<b>31. Distribution of phishing e-mails sent worldwide in 2024, by target type.<\/b><\/p>\n<p><b>Source: <\/b><span style=\"font-weight: 400\">Statista<\/span><\/p>\n<p><b>Author:<\/b><span style=\"font-weight: 400\"> Ani Petrosyan<\/span><\/p>\n<p><b>Publish Date: <\/b><span style=\"font-weight: 400\">May 14, 2025<\/span><\/p>\n<p><b>Link: <\/b><a href=\"https:\/\/www.statista.com\/statistics\/1610521\/phishing-attacks-by-target-type\/\">https:\/\/www.statista.com\/statistics\/1610521\/phishing-attacks-by-target-type\/<\/a><\/p>\n<p><b>Description:<\/b><span style=\"font-weight: 400\"> In 2024, the majority of detected phishing e-mails targeted organizational assets. According to research of 386,000 phishing e-mails, 65 percent of sent phishing e-mails targeted organizational assets. Additionally, 35 percent of the phishing e-mails were directed toward personal assets.<\/span><\/p>\n<p><b>32. Number of phishing e-mails sent worldwide in 2024, by author type.<\/b><\/p>\n<p><b>Source: <\/b><span style=\"font-weight: 400\">Statista<\/span><\/p>\n<p><b>Author:<\/b><span style=\"font-weight: 400\"> Ani Petrosyan<\/span><\/p>\n<p><b>Publish Date: <\/b><span style=\"font-weight: 400\">May 14, 2025<\/span><\/p>\n<p><b>Link: <\/b><a href=\"https:\/\/www.statista.com\/statistics\/1610513\/phishing-attacks-by-author-type\/\">https:\/\/www.statista.com\/statistics\/1610513\/phishing-attacks-by-author-type\/<\/a><\/p>\n<p><b>Description: <\/b><span style=\"font-weight: 400\">In 2024, the majority of detected phishing e-mails were created by humans. A newly emerged trend of crafting phishing e-mails using AI technology was shown in only a smaller number of detected phishing e-mails, 2,785 or up to 4.7 percent, that were sent to employees of different organizations worldwide.<\/span><\/p>\n<p><b>33. Annual growth of phishing attacks worldwide from 2022 to 2024<\/b><\/p>\n<p><b>Source: <\/b><span style=\"font-weight: 400\">Statista<\/span><\/p>\n<p><b>Author:<\/b><span style=\"font-weight: 400\"> Ani Petrosyan<\/span><\/p>\n<p><b>Publish Date: <\/b><span style=\"font-weight: 400\">\u00a0Apr 23, 2025<\/span><\/p>\n<p><b>Link: <\/b><a href=\"https:\/\/www.statista.com\/statistics\/1610501\/phishing-increase-rate-global-annual\/\">https:\/\/www.statista.com\/statistics\/1610501\/phishing-increase-rate-global-annual\/<\/a><\/p>\n<p><b>Description: <\/b><span style=\"font-weight: 400\">In 2024, the number of reported phishing attacks increased by three percent year-over-year. In 2022, this annual increase was 28 percent. Between 2021 and 2024, the cumulative increase in the number of reported phishing attacks was 49 percent.<\/span><\/p>\n<p><b>34. Distribution of industries worldwide most targeted by phishing attacks in the 4th quarter 2024<\/b><\/p>\n<p><b>Source: <\/b><span style=\"font-weight: 400\">Statista<\/span><\/p>\n<p><b>Author:<\/b><span style=\"font-weight: 400\"> Ani Petrosyan\u00a0<\/span><\/p>\n<p><b>Publish Date: <\/b><span style=\"font-weight: 400\">Apr 23, 2025<\/span><\/p>\n<p><b>Link: <\/b><a href=\"https:\/\/www.statista.com\/statistics\/266161\/websites-most-affected-by-phishing\/\">https:\/\/www.statista.com\/statistics\/266161\/websites-most-affected-by-phishing\/<\/a><\/p>\n<p><b>Description: <\/b><span style=\"font-weight: 400\">During the fourth quarter of 2024, nearly 23 percent of phishing attacks worldwide targeted social media.<\/span><\/p>\n<p><b>35. Number of cyber incidents with a political dimension initiated against the United States in 2024, by attack characteristic<\/b><\/p>\n<p><b>Source: <\/b><span style=\"font-weight: 400\">Statista<\/span><b>\u00a0<\/b><\/p>\n<p><b>Author:<\/b><span style=\"font-weight: 400\"> Statista Research Department\u00a0<\/span><\/p>\n<p><b>Publish Date: <\/b><span style=\"font-weight: 400\">Jan 6, 2025<\/span><\/p>\n<p><b>Link: <\/b><a href=\"https:\/\/www.statista.com\/statistics\/1428610\/us-targeted-political-cyberattacks-by-characteristic\/\">https:\/\/www.statista.com\/statistics\/1428610\/us-targeted-political-cyberattacks-by-characteristic\/<\/a><\/p>\n<p><b>Description: <\/b><span style=\"font-weight: 400\">In 2024, global cyber threat actors launched a total of 178 cyberattacks with a political dimension against the United States.<\/span><\/p>\n<p><b>36. Coinminers were most commonly detected in malware attacks worldwide in the 2nd quarter of 2024<\/b><\/p>\n<p><b>Source: <\/b><span style=\"font-weight: 400\">Statista<\/span><\/p>\n<p><b>Author:<\/b><span style=\"font-weight: 400\"> Ani Petrosyan<\/span><\/p>\n<p><b>Publish Date: <\/b><span style=\"font-weight: 400\">May 27, 2025<\/span><\/p>\n<p><b>Link: <\/b><a href=\"https:\/\/www.statista.com\/statistics\/1553460\/coinminers-malware-share-global\/\">https:\/\/www.statista.com\/statistics\/1553460\/coinminers-malware-share-global\/<\/a><\/p>\n<p><b>Description: <\/b><span style=\"font-weight: 400\">In the second quarter of 2024, XMRig was the coinminer most used in malware, as nearly 54 percent of malware originated from this type of coinminer. Additionally, web miners ranked second, being behind over a quarter of malware attacks originating from coinminers in total.<\/span><\/p>\n<p><b>37. Main cybersecurity objectives of companies worldwide in 2025<\/b><\/p>\n<p><b>Source: <\/b><span style=\"font-weight: 400\">Statista<\/span><\/p>\n<p><b>Author:<\/b><span style=\"font-weight: 400\"> Alexandra Borgeaud<\/span><\/p>\n<p><b>Publish Date: <\/b><span style=\"font-weight: 400\">Jan 14, 2025<\/span><\/p>\n<p><b>Link: <\/b><a href=\"https:\/\/www.statista.com\/statistics\/1550066\/top-businesses-cybersecurity-objectives-worldwide\/\">https:\/\/www.statista.com\/statistics\/1550066\/top-businesses-cybersecurity-objectives-worldwide\/<\/a><\/p>\n<p><b>Description: <\/b><span style=\"font-weight: 400\">When asked about the main cybersecurity objectives for their company in 2025, 36 percent of respondents among business and tech leaders worldwide highlighted faster response times to incidents and disruptions.<\/span><\/p>\n<p><b>38. Main technologies shaping the global cyber threat landscape worldwide in 2025<\/b><\/p>\n<p><b>Source: <\/b><span style=\"font-weight: 400\">Statista<\/span><\/p>\n<p><b>Author:<\/b><span style=\"font-weight: 400\"> Alexandra Borgeaud<\/span><\/p>\n<p><b>Publish Date: <\/b><span style=\"font-weight: 400\">May 5, 2025<\/span><\/p>\n<p><b>Link: <\/b><a href=\"https:\/\/www.statista.com\/statistics\/1550064\/technologies-shaping-the-global-cyber-threat-landscape\/\">https:\/\/www.statista.com\/statistics\/1550064\/technologies-shaping-the-global-cyber-threat-landscape\/<\/a><\/p>\n<p><b>Description: <\/b><span style=\"font-weight: 400\">When asked about which technologies were going to shape the global cyber threat landscape in 2025, 67 percent of respondents among business and tech leaders worldwide highlighted Generative AI (GenAI). In addition, two-thirds of respondents mentioned cloud technology.<\/span><\/p>\n<p><b>39. Main cybersecurity objectives of companies worldwide in 2025<\/b><\/p>\n<p><b>Source: <\/b><span style=\"font-weight: 400\">Statista<\/span><\/p>\n<p><b>Author:<\/b><span style=\"font-weight: 400\"> Alexandra Borgeaud<\/span><\/p>\n<p><b>Publish Date: <\/b><span style=\"font-weight: 400\">Jan 14, 2025<\/span><\/p>\n<p><b>Link: <\/b><a href=\"https:\/\/www.statista.com\/statistics\/1550066\/top-businesses-cybersecurity-objectives-worldwide\/\">https:\/\/www.statista.com\/statistics\/1550066\/top-businesses-cybersecurity-objectives-worldwide\/<\/a><\/p>\n<p><b>Description: <\/b><span style=\"font-weight: 400\">When asked about the main cybersecurity objectives for their company in 2025, 36 percent of respondents among business and tech leaders worldwide highlighted faster response times to incidents and disruptions.<\/span><\/p>\n<p><b>40. Share of organizations worldwide using AI as part of their cybersecurity strategy as of April 2024, by use areas<\/b><\/p>\n<p><b>Source: <\/b><span style=\"font-weight: 400\">Statista<\/span><\/p>\n<p><b>Author:<\/b><span style=\"font-weight: 400\"> Ani Petrosyan<\/span><\/p>\n<p><b>Publish Date: <\/b><span style=\"font-weight: 400\">May 27, 2025<\/span><\/p>\n<p><b>Link: <\/b><a href=\"https:\/\/www.statista.com\/statistics\/1610539\/global-ai-usage-in-cybersecurity-by-use-areas\/\">https:\/\/www.statista.com\/statistics\/1610539\/global-ai-usage-in-cybersecurity-by-use-areas\/<\/a><\/p>\n<p><b>Description: <\/b><span style=\"font-weight: 400\">A survey of cybersecurity professionals worldwide, conducted between March and April 2024, found that around 57 percent of organizations using AI technologies in cybersecurity integrated them into anomaly detection systems.<\/span>[\/vc_column_text][vc_column_text]<b>41. Share of organizations worldwide hit by ransomware attacks from 2022 to 2024, by country<\/b><\/p>\n<p><b>Source: <\/b><span style=\"font-weight: 400\">Statista<\/span><\/p>\n<p><b>Author:<\/b><span style=\"font-weight: 400\"> Ani Petrosyan<\/span><\/p>\n<p><b>Publish Date: <\/b><span style=\"font-weight: 400\">\u00a0Jun 23, 2025<\/span><\/p>\n<p><b>Link: <\/b><a href=\"https:\/\/www.statista.com\/statistics\/1246438\/ransomware-attacks-by-country\/\">https:\/\/www.statista.com\/statistics\/1246438\/ransomware-attacks-by-country\/<\/a><\/p>\n<p><b>Description:<\/b><span style=\"font-weight: 400\"> On average, a percentage of organizations worldwide were victims of a ransomware attack between January and February 2024, according to a survey conducted among cybersecurity leaders of worldwide organizations.<\/span><\/p>\n<p><b>42. Number of phishing attacks detected worldwide from the 3rd quarter of 2013 to the 4th quarter of 2024<\/b><\/p>\n<p><b>Source: <\/b><span style=\"font-weight: 400\">Statista<\/span><\/p>\n<p><b>Author:<\/b><span style=\"font-weight: 400\"> Ani Petrosyan<\/span><\/p>\n<p><b>Publish Date: <\/b><span style=\"font-weight: 400\">Apr 23, 2025<\/span><\/p>\n<p><b>Link: <\/b><a href=\"https:\/\/www.statista.com\/statistics\/266155\/number-of-phishing-attacks-worldwide\/\">https:\/\/www.statista.com\/statistics\/266155\/number-of-phishing-attacks-worldwide\/<\/a><\/p>\n<p><b>Description: <\/b><span style=\"font-weight: 400\">In the 4th quarter of 2024, over 989 thousand unique phishing attacks were detected worldwide, representing a slight increase from the preceding quarter.<\/span><\/p>\n<p><b>43. Annual number of data compromises and individuals impacted in the United States from 2005 to 2024<\/b><\/p>\n<p><b>Source: <\/b><span style=\"font-weight: 400\">Statista<\/span><\/p>\n<p><b>Author:<\/b><span style=\"font-weight: 400\"> Ani Petrosyan<\/span><\/p>\n<p><b>Publish Date: <\/b><span style=\"font-weight: 400\">Jul 14, 2025<\/span><\/p>\n<p><b>Link: <\/b><a href=\"https:\/\/www.statista.com\/statistics\/273550\/data-breaches-recorded-in-the-united-states-by-number-of-breaches-and-records-exposed\/\">https:\/\/www.statista.com\/statistics\/273550\/data-breaches-recorded-in-the-united-states-by-number-of-breaches-and-records-exposed\/<\/a><\/p>\n<p><b>Description: <\/b><span style=\"font-weight: 400\">In 2024, the number of data compromises in the United States stood at 3,158 cases. Meanwhile, over 1.35 billion individuals were affected in the same year by data compromises, including data breaches, leakage, and exposure.<\/span><\/p>\n<p><b>44. Share of adults in the United States who encountered financial scams or fraud in the past year as of January 2025<\/b><\/p>\n<p><b>Source:\u00a0 <\/b><span style=\"font-weight: 400\">Statista<\/span><\/p>\n<p><b>Author:<\/b><span style=\"font-weight: 400\"> Ani Petrosyan<\/span><\/p>\n<p><b>Publish Date: <\/b><span style=\"font-weight: 400\">\u00a0Jul 16, 2025<\/span><\/p>\n<p><b>Link: <\/b><a href=\"https:\/\/www.statista.com\/statistics\/1618858\/us-adults-financial-scam-experience\/\">https:\/\/www.statista.com\/statistics\/1618858\/us-adults-financial-scam-experience\/<\/a><\/p>\n<p><b>Description: <\/b>According to a survey conducted in January 2025 in the United States, around Of respondents said they did not experience any financial fraud or scams in the past year.<\/p>\n<p><b>45. Biggest concerns of the board of directors (BOD) of organizations in the United States regarding cybersecurity as of February 2024.<\/b><\/p>\n<p><b>Source: <\/b><span style=\"font-weight: 400\">Statista<\/span><\/p>\n<p><b>Author:<\/b><span style=\"font-weight: 400\"> Ani Petrosyan<\/span><\/p>\n<p><b>Publish Date: <\/b><span style=\"font-weight: 400\">Mar 10, 2025<\/span><\/p>\n<p><b>Link: <\/b><a href=\"https:\/\/www.statista.com\/statistics\/1448323\/biggest-cybersecurity-concerns-of-us\/\">https:\/\/www.statista.com\/statistics\/1448323\/biggest-cybersecurity-concerns-of-us\/<\/a><\/p>\n<p><b>Description: <\/b><span style=\"font-weight: 400\">According to a 2024 survey, about 49 percent of chief information security officers (CISOs) of companies in the United States reported that the leading cybersecurity concern for the board of directors (BOD) was the disruption to operations following a cyberattack.<\/span><\/p>\n<p><b>46. State, Age Group, Gender, and Region-wise Comprehensive Modular Survey: Telecom (CMS-T)<\/b><\/p>\n<p><b>Source: <\/b><span style=\"font-weight: 400\">Dataful<\/span><\/p>\n<p><b>Author:<\/b><span style=\"font-weight: 400\"> Ministry of Statistics and Programme Implementation<\/span><\/p>\n<p><b>Publish Date:<\/b><span style=\"font-weight: 400\"> June 2025<\/span><\/p>\n<p><b>Link: <\/b><a href=\"https:\/\/dataful.in\/datasets\/21446\/\">https:\/\/dataful.in\/datasets\/21446\/<\/a><\/p>\n<p><b>Description: <\/b><span style=\"font-weight: 400\">The Comprehensive Modular Survey: Telecom (CMS-T) was conducted by the National Sample Survey Office (NSSO) during January-March 2025 as a part of the NSS 80th round.<\/span><\/p>\n<p><b>47. Cyber Crimes from NCRB &#8211; Master Data: Year- and State-wise Total Number of Cyber Crimes Committed in India<\/b><\/p>\n<p><b>Source: <\/b><span style=\"font-weight: 400\">Dataful<\/span><\/p>\n<p><b>Author:<\/b><span style=\"font-weight: 400\"> National Crime Records Bureau<\/span><\/p>\n<p><b>Publish Date: <\/b><span style=\"font-weight: 400\">February 2024<\/span><\/p>\n<p><b>Link:<\/b> <a href=\"https:\/\/dataful.in\/datasets\/19204\/\">https:\/\/dataful.in\/datasets\/19204\/<\/a><\/p>\n<p><b>Description: <\/b><span style=\"font-weight: 400\">The dataset contains year- and state-wise historically compiled data on the total number of cyber crimes which have been committed in India.\u00a0<\/span><\/p>\n<p><b>48. Cyber Crimes Dataset\u00a0<\/b><\/p>\n<p><b>Source: <\/b><span style=\"font-weight: 400\">Data Catalog<\/span><\/p>\n<p><b>Author:<\/b><span style=\"font-weight: 400\"> Cyber Crimes Center (C3)<\/span><\/p>\n<p><b>Publish Date: <\/b><span style=\"font-weight: 400\">January 21, 2024<\/span><\/p>\n<p><b>Link:<\/b><a href=\"https:\/\/catalog.data.gov\/dataset\/cyber-crimes-center-c3\"> https:\/\/catalog.data.gov\/dataset\/cyber-crimes-center-c3<\/a><\/p>\n<p><b>Description: <\/b><span style=\"font-weight: 400\">This dataset is about what C3 conducts transborder criminal investigations of internet-related crimes within the HSI portfolio of immigration and customs authorities. C3 is responsible for identifying and targeting cybercrime activities over which HSI has jurisdiction.\u00a0<\/span><\/p>\n<p><b>49. Year-over-year change in the number of personally identifiable information (PII) used in scams in the United States from 2024 to 2025, by type<\/b><\/p>\n<p><b>Source: <\/b><span style=\"font-weight: 400\">Statista<\/span><\/p>\n<p><b>Author:<\/b><span style=\"font-weight: 400\"> Ani Petrosyan<\/span><\/p>\n<p><b>Publish Date: <\/b><span style=\"font-weight: 400\">Jul 16, 2025<\/span><\/p>\n<p><b>Link: <\/b><a href=\"https:\/\/www.statista.com\/statistics\/1618772\/us-change-pii-number-used-in-scam-by-type\/\">https:\/\/www.statista.com\/statistics\/1618772\/us-change-pii-number-used-in-scam-by-type\/<\/a><\/p>\n<p><b>Description: <\/b><span style=\"font-weight: 400\">In 2025, the number of stolen names used in scams in the United States increased by 25 percent, compared to the previous year.<\/span><\/p>\n<p><b>50. CYBER CRIME RATE INDIA 2016-2018 RECORDED<\/b><\/p>\n<p><b>Source: <\/b><span style=\"font-weight: 400\">Kaggle\u00a0<\/span><\/p>\n<p><b>Author:<\/b><span style=\"font-weight: 400\"> Siddharth Kanwal<\/span><\/p>\n<p><b>Link: <\/b><a href=\"https:\/\/www.kaggle.com\/datasets\/siddharthkanwal\/cyber-crime-rate-india-20162018-recorded\">https:\/\/www.kaggle.com\/datasets\/siddharthkanwal\/cyber-crime-rate-india-20162018-recorded<\/a><\/p>\n<p><b>Description: <\/b><span style=\"font-weight: 400\">Statistics of the cybercrime rate in India recorded from 2016 to 2018.\u00a0<\/span>[\/vc_column_text][vc_column_text]\n<h4><b>Conclusion\u00a0<\/b><\/h4>\n<p><span style=\"font-weight: 400\">With this, we end this week\u2019s \u2018Dataset of the Week\u2019 blog. Make sure to check out our previously published blogs in \u2018Dataset of the Week\u2019 on Newsdata.io. I hope to see you again next week for yet another blog on trending topics.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Happy Mining!<\/span><\/p>\n[\/vc_column_text][\/vc_column][\/vc_row]\n<!-- AddThis Advanced Settings generic via filter on the_content --><!-- AddThis Share Buttons generic via filter on the_content -->","protected":false},"excerpt":{"rendered":"<p>The article focuses on the Cyber Crimes happening worldwide. This article also provides a list of available datasets for the same.<!-- AddThis Advanced Settings generic via filter on get_the_excerpt --><!-- AddThis Share Buttons generic via filter on get_the_excerpt --><\/p>\n","protected":false},"author":17,"featured_media":5974,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[165],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cyber Crimes Datasets 2025<\/title>\n<meta name=\"description\" content=\"The article focuses on the Cyber Crimes happening worldwide. This article also provides a list of available datasets for the same.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/newsdata.io\/blog\/cyber-crimes-datasets\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Crimes Datasets 2025\" \/>\n<meta property=\"og:description\" content=\"The article focuses on the Cyber Crimes happening worldwide. This article also provides a list of available datasets for the same.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/newsdata.io\/blog\/cyber-crimes-datasets\/\" \/>\n<meta property=\"og:site_name\" content=\"Newsdata.io - Stay Updated with the Latest News API Trends\" \/>\n<meta property=\"article:published_time\" content=\"2025-07-24T06:06:45+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-25T04:59:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/newsdata.io\/blog\/wp-content\/uploads\/2025\/07\/dataset-11.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1499\" \/>\n\t<meta property=\"og:image:height\" content=\"840\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Aditi Chaudhary\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@AditiCh17996036\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Aditi Chaudhary\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"16 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/newsdata.io\/blog\/cyber-crimes-datasets\/\",\"url\":\"https:\/\/newsdata.io\/blog\/cyber-crimes-datasets\/\",\"name\":\"Cyber Crimes Datasets 2025\",\"isPartOf\":{\"@id\":\"https:\/\/newsdata.io\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/newsdata.io\/blog\/cyber-crimes-datasets\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/newsdata.io\/blog\/cyber-crimes-datasets\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/i0.wp.com\/newsdata.io\/blog\/wp-content\/uploads\/2025\/07\/dataset-11.png?fit=1499%2C840&ssl=1\",\"datePublished\":\"2025-07-24T06:06:45+00:00\",\"dateModified\":\"2025-07-25T04:59:29+00:00\",\"author\":{\"@id\":\"https:\/\/newsdata.io\/blog\/#\/schema\/person\/531c7aac51910b5277dd51422cf0d964\"},\"description\":\"The article focuses on the Cyber Crimes happening worldwide. This article also provides a list of available datasets for the same.\",\"breadcrumb\":{\"@id\":\"https:\/\/newsdata.io\/blog\/cyber-crimes-datasets\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/newsdata.io\/blog\/cyber-crimes-datasets\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/newsdata.io\/blog\/cyber-crimes-datasets\/#primaryimage\",\"url\":\"https:\/\/i0.wp.com\/newsdata.io\/blog\/wp-content\/uploads\/2025\/07\/dataset-11.png?fit=1499%2C840&ssl=1\",\"contentUrl\":\"https:\/\/i0.wp.com\/newsdata.io\/blog\/wp-content\/uploads\/2025\/07\/dataset-11.png?fit=1499%2C840&ssl=1\",\"width\":1499,\"height\":840},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/newsdata.io\/blog\/cyber-crimes-datasets\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/newsdata.io\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber Crimes Datasets 2025\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/newsdata.io\/blog\/#website\",\"url\":\"https:\/\/newsdata.io\/blog\/\",\"name\":\"Newsdata.io - Stay Updated with the Latest News API Trends\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/newsdata.io\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/newsdata.io\/blog\/#\/schema\/person\/531c7aac51910b5277dd51422cf0d964\",\"name\":\"Aditi Chaudhary\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/newsdata.io\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/331be6db4c207ba712e439ded52d96d1?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/331be6db4c207ba712e439ded52d96d1?s=96&d=mm&r=g\",\"caption\":\"Aditi Chaudhary\"},\"description\":\"Aditi Chaudhary is an enthusiastic content writer at Newsdata.io, where she covers topics related to real-time news, News APIs, data-driven journalism, and emerging trends in media and technology. Aditi is passionate about storytelling, research, and creating content that informs and inspires. As a student of Journalism and Mass Communication with a strong interest in the evolving landscape of digital media, she aims to merge her creativity with credibility to expand her knowledge and bring innovation into every piece she creates.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/aditi-chaudhary-456076293\/\",\"https:\/\/x.com\/AditiCh17996036\"],\"url\":\"https:\/\/newsdata.io\/blog\/author\/aditi\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber Crimes Datasets 2025","description":"The article focuses on the Cyber Crimes happening worldwide. This article also provides a list of available datasets for the same.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/newsdata.io\/blog\/cyber-crimes-datasets\/","og_locale":"en_US","og_type":"article","og_title":"Cyber Crimes Datasets 2025","og_description":"The article focuses on the Cyber Crimes happening worldwide. This article also provides a list of available datasets for the same.","og_url":"https:\/\/newsdata.io\/blog\/cyber-crimes-datasets\/","og_site_name":"Newsdata.io - Stay Updated with the Latest News API Trends","article_published_time":"2025-07-24T06:06:45+00:00","article_modified_time":"2025-07-25T04:59:29+00:00","og_image":[{"width":1499,"height":840,"url":"https:\/\/newsdata.io\/blog\/wp-content\/uploads\/2025\/07\/dataset-11.png","type":"image\/png"}],"author":"Aditi Chaudhary","twitter_card":"summary_large_image","twitter_creator":"@AditiCh17996036","twitter_misc":{"Written by":"Aditi Chaudhary","Est. reading time":"16 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/newsdata.io\/blog\/cyber-crimes-datasets\/","url":"https:\/\/newsdata.io\/blog\/cyber-crimes-datasets\/","name":"Cyber Crimes Datasets 2025","isPartOf":{"@id":"https:\/\/newsdata.io\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/newsdata.io\/blog\/cyber-crimes-datasets\/#primaryimage"},"image":{"@id":"https:\/\/newsdata.io\/blog\/cyber-crimes-datasets\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/newsdata.io\/blog\/wp-content\/uploads\/2025\/07\/dataset-11.png?fit=1499%2C840&ssl=1","datePublished":"2025-07-24T06:06:45+00:00","dateModified":"2025-07-25T04:59:29+00:00","author":{"@id":"https:\/\/newsdata.io\/blog\/#\/schema\/person\/531c7aac51910b5277dd51422cf0d964"},"description":"The article focuses on the Cyber Crimes happening worldwide. This article also provides a list of available datasets for the same.","breadcrumb":{"@id":"https:\/\/newsdata.io\/blog\/cyber-crimes-datasets\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/newsdata.io\/blog\/cyber-crimes-datasets\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/newsdata.io\/blog\/cyber-crimes-datasets\/#primaryimage","url":"https:\/\/i0.wp.com\/newsdata.io\/blog\/wp-content\/uploads\/2025\/07\/dataset-11.png?fit=1499%2C840&ssl=1","contentUrl":"https:\/\/i0.wp.com\/newsdata.io\/blog\/wp-content\/uploads\/2025\/07\/dataset-11.png?fit=1499%2C840&ssl=1","width":1499,"height":840},{"@type":"BreadcrumbList","@id":"https:\/\/newsdata.io\/blog\/cyber-crimes-datasets\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/newsdata.io\/blog\/"},{"@type":"ListItem","position":2,"name":"Cyber Crimes Datasets 2025"}]},{"@type":"WebSite","@id":"https:\/\/newsdata.io\/blog\/#website","url":"https:\/\/newsdata.io\/blog\/","name":"Newsdata.io - Stay Updated with the Latest News API Trends","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/newsdata.io\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/newsdata.io\/blog\/#\/schema\/person\/531c7aac51910b5277dd51422cf0d964","name":"Aditi Chaudhary","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/newsdata.io\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/331be6db4c207ba712e439ded52d96d1?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/331be6db4c207ba712e439ded52d96d1?s=96&d=mm&r=g","caption":"Aditi Chaudhary"},"description":"Aditi Chaudhary is an enthusiastic content writer at Newsdata.io, where she covers topics related to real-time news, News APIs, data-driven journalism, and emerging trends in media and technology. Aditi is passionate about storytelling, research, and creating content that informs and inspires. As a student of Journalism and Mass Communication with a strong interest in the evolving landscape of digital media, she aims to merge her creativity with credibility to expand her knowledge and bring innovation into every piece she creates.","sameAs":["https:\/\/www.linkedin.com\/in\/aditi-chaudhary-456076293\/","https:\/\/x.com\/AditiCh17996036"],"url":"https:\/\/newsdata.io\/blog\/author\/aditi\/"}]}},"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"https:\/\/i0.wp.com\/newsdata.io\/blog\/wp-content\/uploads\/2025\/07\/dataset-11.png?fit=1499%2C840&ssl=1","category":["Dataset"],"featured_image_url":"https:\/\/i0.wp.com\/newsdata.io\/blog\/wp-content\/uploads\/2025\/07\/dataset-11.png?fit=1499%2C840&ssl=1","_links":{"self":[{"href":"https:\/\/newsdata.io\/blog\/wp-json\/wp\/v2\/posts\/5969"}],"collection":[{"href":"https:\/\/newsdata.io\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/newsdata.io\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/newsdata.io\/blog\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/newsdata.io\/blog\/wp-json\/wp\/v2\/comments?post=5969"}],"version-history":[{"count":3,"href":"https:\/\/newsdata.io\/blog\/wp-json\/wp\/v2\/posts\/5969\/revisions"}],"predecessor-version":[{"id":5987,"href":"https:\/\/newsdata.io\/blog\/wp-json\/wp\/v2\/posts\/5969\/revisions\/5987"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/newsdata.io\/blog\/wp-json\/wp\/v2\/media\/5974"}],"wp:attachment":[{"href":"https:\/\/newsdata.io\/blog\/wp-json\/wp\/v2\/media?parent=5969"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/newsdata.io\/blog\/wp-json\/wp\/v2\/categories?post=5969"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/newsdata.io\/blog\/wp-json\/wp\/v2\/tags?post=5969"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}