Annual Security Reports
Exploring cybersecurity trends, insights, and challenges.
Analysis Reports
Cloud Security
State-of-Container-Security (Annual Security Reports/2025/Bellsoft-State-of-Container-Security-2025.pdf) (2025) - Analyzes security findings and threat trends including key attack patterns, vulnerability data, and defensive recommendations drawn from data collected across hundreds of security practitioners. Findings span 10 or more priority risk areas, providing actionable guidance for organizations seeking to strengthen their security posture.
State Of Cloud Security (Annual Security Reports/2025/DataDog-State-of-Cloud-Security-2025.pdf) (2025) - Analyzes cloud security posture across AWS, Azure, and Google Cloud with a focus on identity risks, default security gaps, and the uneven adoption of guardrails like IMDSv2, data perimeters, and public access blocks. The study highlights persistent trouble spots such as long-lived credentials, overprivileged third-party roles, and aging workloads that miss secure defaults, even as multi-account governance and modern identity patterns gain traction.
Cloud Native Security and Usage Report (Annual Security Reports/2025/Sysdig-Cloud-Native-Security-Report-2025.pdf) (2025) - Analyzes cloud-native security trends and usage patterns in 2025. Key findings reveal a significant increase in the adoption of runtime security tools and a growing focus on securing AI/ML workloads, alongside persistent challenges in managing identities across human and machine interactions.
State of AI in the Cloud (Annual Security Reports/2025/Wiz-State-of-AI-in-the-Cloud-2025.pdf) (2025) - Analyzes the current state of AI in cloud environments, focusing on adoption rates, security challenges, and governance issues. Key findings reveal DeepSeek's rapid growth and the continued dominance of OpenAI, alongside a rising trend of self-hosted AI deployments and stabilized adoption of AI managed services.
Cybersecurity Report (Annual%20Security%20Reports/2026/Hornet-Cybersecurity-Report-2026.pdf) (2026) - Analyzes the evolving cybersecurity threat landscape by examining data from over 72 billion processed emails to identify critical shifts in attack vectors and organizational risk. Key findings reveal a 131 percent year over year surge in malware laden emails and a 29 percent increase in ransomware incidents, underscoring the urgent need for enhanced governance as 61 percent of security leaders report that artificial intelligence has directly amplified their exposure to sophisticated cyber threats.
State-of-Container-Security (2025) - Analyzes security findings and threat trends including key attack patterns, vulnerability data, and defensive recommendations drawn from data collected across hundreds of security practitioners. Findings span 10 or more priority risk areas, providing actionable guidance for organizations seeking to strengthen their security posture.
State Of Cloud Security (Annual%20Security%20Reports/2025/DataDog-State-of-Cloud-Security-2025.pdf) (2025) - Analyzes cloud security posture across AWS, Azure, and Google Cloud with a focus on identity risks, default security gaps, and the uneven adoption of guardrails like IMDSv2, data perimeters, and public access blocks. The study highlights persistent trouble spots such as long-lived credentials, overprivileged third-party roles, and aging workloads that miss secure defaults, even as multi-account governance and modern identity patterns gain traction.
Threat Horizons Report (Annual%20Security%20Reports/2025/Google-Cloud-Threat-Horizons-Report-2025.pdf) (2025) - Analyzes security findings and threat trends reported by Google for 2025, examining key attack patterns, vulnerability data, and defensive recommendations drawn from data collected across hundreds of security practitioners. Findings span 10 or more priority risk areas, providing actionable guidance for organizations seeking to strengthen their security posture.
Cloud Native Security and Usage Report (Annual%20Security%20Reports/2025/Sysdig-Cloud-Native-Security-Report-2025.pdf) (2025) - Analyzes cloud-native security trends and usage patterns in 2025. Key findings reveal a significant increase in the adoption of runtime security tools and a growing focus on securing AI/ML workloads, alongside persistent challenges in managing identities across human and machine interactions.
State of AI in the Cloud (Annual%20Security%20Reports/2025/Wiz-State-of-AI-in-the-Cloud-2025.pdf) (2025) - Analyzes the current state of AI in cloud environments, focusing on adoption rates, security challenges, and governance issues. Key findings reveal DeepSeek's rapid growth and the continued dominance of OpenAI, alongside a rising trend of self-hosted AI deployments and stabilized adoption of AI managed services.
State Of The Internet (2025) - Analyzes adversary infrastructure, focusing on command-and-control servers and surrounding tools used by threat actors. The report reveals trends in malware detection, C2 server time-to-live, open directory lifespans, and the use of residential proxy infrastructure, highlighting the importance of historical internet data for tracking malicious activities.
State Of Cloud Security (2025) - Analyzes cloud security posture across AWS, Azure, and Google Cloud with a focus on identity risks, default security gaps, and the uneven adoption of guardrails like IMDSv2, data perimeters, and public access blocks. The study highlights persistent trouble spots such as long-lived credentials, overprivileged third-party roles, and aging workloads that miss secure defaults, even as multi-account governance and modern identity patterns gain traction.
Threat Horizons Report (2025) - Analyzes security findings and threat trends reported by Google for 2025, examining key attack patterns, vulnerability data, and defensive recommendations drawn from data collected across hundreds of security practitioners. Findings span 10 or more priority risk areas, providing actionable guidance for organizations seeking to strengthen their security posture.
Estimating Return on Investment for the Cloud (2026) - Evaluates the economic impact of transitioning to a unified cloud security platform by comparing fragmented legacy toolsets against modern agentless and artificial intelligence capabilities. Analysis demonstrates that a representative mid-sized enterprise can achieve an annual cloud security return on investment of 198.33 percent, while simultaneously reducing operational friction through consolidated visibility and automated remediation workflows.
Cloud Threat Hunting And Defense Landscape (2025) - Analyzes the evolving cloud threat landscape by identifying five primary attack vectors posing significant risk to cloud environments. Key insights reveal that initial compromises often stem from misconfigured cloud endpoints or stolen credentials, while threat actors increasingly leverage cloud-native ransomware tactics and abuse legitimate SaaS/IaaS resources to complicate detection.
State of Cloud Security Report (2025) - Analyzes security challenges in multi-cloud environments, with a focus on AI risk, data exposure, and neglected assets. Key findings reveal that 62% of organizations have at least one vulnerable AI package, 38% expose sensitive databases to the public, and 13% possess a single asset with over 1,000 potential attack paths.
Cloud Native Security and Usage Report (2025) - Analyzes cloud-native security trends and usage patterns in 2025. Key findings reveal a significant increase in the adoption of runtime security tools and a growing focus on securing AI/ML workloads, alongside persistent challenges in managing identities across human and machine interactions.
The State of AWS Security (2026) - Examines the evolving AWS threat landscape, focusing on the transition from traditional misconfiguration exploits to sophisticated attacks involving autonomous agentic systems. Key findings reveal that 48 percent of cybersecurity professionals identify agentic AI as the primary attack vector for 2026, while historical data confirms that 99 percent of cloud security failures remain attributable to customer misconfigurations.
Cloud Compliance Pulse (2025) - Provides a half-yearly benchmark of cloud compliance and identity security posture across 50 organizations, utilizing automated control scans for a data-driven assessment. It reveals that 98% of firms exhibit at least one high-severity gap, with 70% of critical findings stemming from common issues like missing MFA on privileged accounts and excessive role privileges.
State Of Data Security Report (2025) - Analyzes the state of data security in 2025, focusing on the impact of AI adoption on data risk across 1,000 organizations. The report reveals that 90% of organizations have exposed sensitive cloud data, 88% have stale ghost users, and 99% have sensitive data dangerously exposed to AI tools, highlighting the urgent need for proactive AI security measures.
Cloud Data Security Snapshot (2025) - Analyzes current cloud data security exposure trends. A significant finding reveals that 54% of cloud environments have exposed assets containing sensitive data, highlighting the critical need for improved access controls and vulnerability management.
State of AI in the Cloud (2025) - Analyzes the current state of AI in cloud environments, focusing on adoption rates, security challenges, and governance issues. Key findings reveal DeepSeek's rapid growth and the continued dominance of OpenAI, alongside a rising trend of self-hosted AI deployments and stabilized adoption of AI managed services.
Vulnerabilities
Analyzes the 2026 Microsoft Vulnerability Report to assess shifting threat patterns and the evolving risk landscape within the Microsoft software ecosystem. While total vulnerability volume decreased by 6 percent to 1,273, the number of critical vulnerabilities doubled year over year to 157, with Elevation of Privilege remaining the dominant threat category at 40 percent of all findings.
Aanalyzes the financial impact of CVE management on organizations using containerized environments. Key findings indicate that mid-market organizations can unlock significant value through decreased risk $2.8M, increased revenue $2.2M, and faster innovation $3.3M by improving their CVE management practices and compliance.
Analyzes the global surge in cybersecurity vulnerabilities throughout 2025, documenting a record pace of disclosures and the increasing speed of weaponization by threat actors. Key findings reveal that over 21,500 vulnerabilities were cataloged by midyear, with 38 percent rated as high or critical severity, while 28 percent of observed exploits were launched within 24 hours of initial disclosure.
Analyzes the global state of full stack security by evaluating vulnerability data across web applications, APIs, and host systems to provide actionable risk management insights. Findings reveal that 53 percent of vulnerabilities discovered in 2024 were classified as high or critical severity, while the number of publicly reported exploits in the wild increased by 20 percent compared to the previous year.
Analyzes the 2025 Imperva Bad Bot Report, detailing the evolving landscape of automated internet traffic and its impact on businesses. Key findings reveal that automated traffic now surpasses human activity at 51%, with malicious bots comprising 37% of all internet traffic, driven significantly by the increasing accessibility and sophistication of AI-powered attack tools.
Analyzes the monthly vulnerability landscape based on Secunia Research data, providing insights into emerging threats and trends. Key findings include a significant year-to-date increase in advisories and the identification of actively exploited zero-day vulnerabilities in critical software like Microsoft Windows and Google Chrome.
Analyzes the correlation between spikes in attacker activity and subsequent CVE disclosures, particularly in edge technologies. The report reveals that in 80% of analyzed cases, attacker activity spikes preceded new CVE disclosures within six weeks, offering defenders a critical window for proactive security measures.
Analyzes cybersecurity exposure trends across 3,000 small to midsize organizations, focusing on vulnerability detection and response metrics. Key findings reveal a 19% increase in high-severity issues driven by AI-weaponized legacy CVEs, alongside a significant improvement in critical remediation rates to 89% within 30 days.
Analyzes malware and vulnerability trends observed in the first half of 2024, focusing on exploitation of remote access and security software. Key insights reveal a significant 103% increase in Magecart infections and the continued dominance of infostealer malware, with operators actively refining evasion techniques.
Analyzes the cybersecurity landscape of the first half of 2025, covering mobile security, significant vulnerabilities, and APT operations. Key insights reveal a growing concern over the sustainability of critical infrastructure like CVE, alongside a surge in credential theft and sophisticated malware campaigns targeting both consumers and industrial systems.
In 2025, VulnCheck identified 884 Known Exploited Vulnerabilities KEVs for which evidence of exploitation was observed for the first time. Our analysis shows that 28.96% of KEVs in 2025 were exploited on or before the day their CVE was published, an increase from the 23.6% observed in our 2024 trends in exploitation report.
Aanalyzes the financial impact of CVE management on organizations using containerized environments. Key findings indicate that mid-market organizations can unlock significant value through decreased risk $2.8M, increased revenue $2.2M, and faster innovation $3.3M by improving their CVE management practices and compliance.
Analyzes the global surge in cybersecurity vulnerabilities throughout 2025, documenting a record pace of disclosures and the increasing speed of weaponization by threat actors. Key findings reveal that over 21,500 vulnerabilities were cataloged by midyear, with 38 percent rated as high or critical severity, while 28 percent of observed exploits were launched within 24 hours of initial disclosure.
Investigates the evolving security landscape of decentralized edge infrastructure, focusing on the increasing exploitation of routers, firewalls, and remote access gateways. Data from the sensor network reveals a 40 percent increase in unique IP addresses attempting to identify misconfigured edge devices, highlighting a critical trend where the time between vulnerability disclosure and weaponization has compressed from weeks to mere hours for edge facing hardware.
Examines the evolution of mass internet exploitation and the rapid weaponization of newly disclosed vulnerabilities observed through a global network of passive sensors. Data indicates that attackers are increasingly prioritizing N-day vulnerabilities that have remained unpatched for 30 to 90 days, while simultaneously leveraging legitimate administrative tools to facilitate post-exploitation activities and evade traditional signature-based detection systems across the global IPv4 space.
Examines the 2026 cybersecurity threat landscape based on Hornetsecurity's analysis of over 72 billion emails processed, highlighting evolving attack vectors and defensive strategies. Key findings reveal a 131% surge in malware-laden emails, a 29% increase in ransomware victim organizations, and a growing reliance on AI by threat actors alongside increased investment in AI-powered defenses.
Analyzes cybersecurity exposure trends across 3,000 small to midsize organizations, focusing on vulnerability detection and response metrics. Key findings reveal a 19% increase in high-severity issues driven by AI-weaponized legacy CVEs, alongside a significant improvement in critical remediation rates to 89% within 30 days.
Examines the security landscape of network edge devices, focusing on the prevalence of vulnerabilities within unsupported and end of life hardware. Key findings reveal that 42.5 percent of exploited vulnerabilities affect end of life or likely end of life devices, while 65 percent of vulnerabilities targeted by botnets specifically impact these unsupported products.
Analyzes the correlation between spikes in attacker activity and subsequent CVE disclosures, particularly in edge technologies. The report reveals that in 80% of analyzed cases, attacker activity spikes preceded new CVE disclosures within six weeks, offering defenders a critical window for proactive security measures.
Examines the 2026 cybersecurity threat landscape based on Hornetsecurity's analysis of over 72 billion emails processed, highlighting evolving attack vectors and defensive strategies. Key findings reveal a 131% surge in malware-laden emails, a 29% increase in ransomware victim organizations, and a growing reliance on AI by threat actors alongside increased investment in AI-powered defenses.
Analyzes the global surge in cybersecurity vulnerabilities throughout 2025, documenting a record pace of disclosures and the increasing speed of weaponization by threat actors. Key findings reveal that over 21,500 vulnerabilities were cataloged by midyear, with 38 percent rated as high or critical severity, while 28 percent of observed exploits were launched within 24 hours of initial disclosure.
Investigates the evolving security landscape of decentralized edge infrastructure, focusing on the increasing exploitation of routers, firewalls, and remote access gateways. Data from the sensor network reveals a 40 percent increase in unique IP addresses attempting to identify misconfigured edge devices, highlighting a critical trend where the time between vulnerability disclosure and weaponization has compressed from weeks to mere hours for edge facing hardware.
Examines the evolution of mass internet exploitation and the rapid weaponization of newly disclosed vulnerabilities observed through a global network of passive sensors. Data indicates that attackers are increasingly prioritizing N-day vulnerabilities that have remained unpatched for 30 to 90 days, while simultaneously leveraging legitimate administrative tools to facilitate post-exploitation activities and evade traditional signature-based detection systems across the global IPv4 space.
Examines the current state of artificial intelligence integration within security operations centers, highlighting the operational challenges caused by fragmented toolsets and the evolving role of analysts. Key findings reveal that while 79 percent of organizations have adopted artificial intelligence, 80 percent rely on disconnected point solutions, and 92 percent of security leaders identify trust as the primary barrier to further expansion, specifically citing the need for greater transparency in how automated systems reach their conclusions.
In 2025, VulnCheck identified 884 Known Exploited Vulnerabilities KEVs for which evidence of exploitation was observed for the first time. Our analysis shows that 28.96% of KEVs in 2025 were exploited on or before the day their CVE was published, an increase from the 23.6% observed in our 2024 trends in exploitation report.
Examines the security landscape of network edge devices, focusing on the prevalence of vulnerabilities within unsupported and end of life hardware. Key findings reveal that 42.5 percent of exploited vulnerabilities affect end of life or likely end of life devices, while 65 percent of vulnerabilities targeted by botnets specifically impact these unsupported products.
Data Breaches
Commercial Directors and Officers Insurance Insights (2026) - Examines the evolving landscape of directors and officers liability, highlighting how geopolitical instability, cyber threats, and artificial intelligence are driving increased litigation and regulatory scrutiny. Key findings reveal that the average settlement value for securities class actions rose by 27 percent to 56 million dollars in the first half of 2025, while global business insolvencies are projected to increase by 6 percent in 2025 and 5 percent in 2026.
Information Risk Insights Study (2025) - Analyzes incident probability and the increasing risks associated with third-party relationships. A key finding is that incident probability has almost quadrupled in the last 15 years, driven in part by threat actors exploiting trusted relationships with external service providers to compromise target organizations.
Cybersecurity Statistics (2026) - Analyzes the global cybersecurity landscape by evaluating incident volumes, financial impacts, and evolving threat vectors across diverse industries. Key findings reveal a 32 percent year over year increase in global ransomware attacks reaching 7,419 incidents in 2025, while reported cybercrime losses surged to 16.6 billion dollars according to FBI data.
Cost Of A Data Breach Report (2025) - Analyzes the financial impact of data breaches, with a significant focus on the emerging risks and benefits associated with artificial intelligence adoption. While global average breach costs declined to USD 4.44 million due to AI-powered defenses, findings reveal that 97% of AI-related breaches lacked proper access controls, and 16% involved AI-driven attacks.
Annual Data Breach Report (2025) - Analyzes the U.S. data breach landscape in the first half of 2025, identifying a persistent dominance of cyberattacks and supply chain vulnerabilities. Key findings highlight a sharp decline in victim notices despite steady compromise volumes, alongside a concerning trend where 69% of breach notifications fail to disclose specific attack vectors.
Ripples Across The Risk Surface (2025) - Investigates the prevalence and financial impact of multi-party ripple incidents, which occur when a single cybersecurity breach propagates across multiple organizations. Analysis of over 1,500 incidents reveals that while ripple events are less frequent than single-party breaches, they routinely trigger losses 10 times higher for the generating firm. Furthermore, the data indicates that downstream costs for receiving organizations have risen steadily over time, with median per-firm losses for generators reaching 4.7 million dollars compared to 1.8 million dollars for receivers.
Annual Insurance Review (2026) - Examines the evolving landscape of insurance risks, focusing on the intersection of artificial intelligence, cybersecurity, and emerging litigation trends in the United States. Key findings indicate that while cyber claim frequency remained stable, severity dropped by 50 percent year over year due to improved incident response, even as business email compromise and funds transfer fraud accounted for 60 percent of total cyber claims.
Third Party Breach Report (2025) - Analyzes the landscape of third-party cyber risk and its impact on organizations globally. Key findings indicate a significant increase in third-party breaches, with Retail & Hospitality and Technology sectors experiencing the highest exposure, and file transfer software vulnerabilities emerging as a primary attack vector.
Data Breach Investigations Report (2025) - Analyzes data breach trends and patterns from 2025. Key findings reveal a significant increase in social engineering attacks and a persistent reliance on easily exploitable web application vulnerabilities, highlighting the need for improved employee security awareness training and robust application security measures.
(2025) - Analyzes the financial impact of data breaches, with a significant focus on the emerging risks and benefits associated with artificial intelligence adoption. While global average breach costs declined to USD 4.44 million due to AI-powered defenses, findings reveal that 97% of AI-related breaches lacked proper access controls, and 16% involved AI-driven attacks.
(2025) - Analyzes the landscape of third-party cyber risk and its impact on organizations globally. Key findings indicate a significant increase in third-party breaches, with Retail & Hospitality and Technology sectors experiencing the highest exposure, and file transfer software vulnerabilities emerging as a primary attack vector.
Cybersecurity Statistics Report(2026) - Examines the evolving cybersecurity landscape and the financial impact of data breaches across various industries in 2026. Global cybercrime costs are projected to reach 10.5 trillion dollars this year, while organizations utilizing artificial intelligence for security operations achieve detection times 108 days faster than those relying on traditional methods. These findings underscore the critical necessity for proactive defense strategies and automated incident response to mitigate the rising frequency of ransomware and credential theft attacks.
Ripples Across The Risk Surface(2025) - Investigates the prevalence and financial impact of multi-party ripple incidents, which occur when a single cybersecurity breach propagates across multiple organizations. Analysis of over 1,500 incidents reveals that while ripple events are less frequent than single-party breaches, they routinely trigger losses 10 times higher for the generating firm. Furthermore, the data indicates that downstream costs for receiving organizations have risen steadily over time, with median per-firm losses for generators reaching 4.7 million dollars compared to 1.8 million dollars for receivers.
Cost Of A Data Breach Report (2025) - Analyzes the financial impact of data breaches, with a significant focus on the emerging risks and benefits associated with artificial intelligence adoption. While global average breach costs declined to USD 4.44 million due to AI-powered defenses, findings reveal that 97% of AI-related breaches lacked proper access controls, and 16% involved AI-driven attacks.
Cybersecurity Statistics Report (2026) - Examines the evolving cybersecurity landscape and the financial impact of data breaches across various industries in 2026. Global cybercrime costs are projected to reach 10.5 trillion dollars this year, while organizations utilizing artificial intelligence for security operations achieve detection times 108 days faster than those relying on traditional methods. These findings underscore the critical necessity for proactive defense strategies and automated incident response to mitigate the rising frequency of ransomware and credential theft attacks.
Annual Insurance Review (2026) - Examines the evolving landscape of insurance risks, focusing on the intersection of artificial intelligence, cybersecurity, and emerging litigation trends in the United States. Key findings indicate that while cyber claim frequency remained stable, severity dropped by 50 percent year over year due to improved incident response, even as business email compromise and funds transfer fraud accounted for 60 percent of total cyber claims.
Third Party Breach Report (2025) - Analyzes the landscape of third-party cyber risk and its impact on organizations globally. Key findings indicate a significant increase in third-party breaches, with Retail & Hospitality and Technology sectors experiencing the highest exposure, and file transfer software vulnerabilities emerging as a primary attack vector.
Physical Security
OT Cybersecurity Report A Year in Review(2025) - Analyzes the 2025 OT/ICS cybersecurity landscape, focusing on adversary tactics and defender progress. Key findings reveal a rise in OT-centric cyber operations fueled by geopolitical tensions, particularly the Ukraine-Russia conflict, and the increasing activity of threat groups like KAMACITE and ELECTRUM.
Networks OT IoT Security Report(2025) - Analyzes operational technology and internet of things cybersecurity trends in the second half of 2024. Key findings reveal a significant increase in sophisticated attacks targeting industrial control systems, highlighting the growing need for robust security measures in critical infrastructure.
OT Cybersecurity Report A Year in Review(2025) - Analyzes the 2025 OT/ICS cybersecurity landscape, focusing on adversary tactics and defender progress. Key findings reveal a rise in OT-centric cyber operations fueled by geopolitical tensions, particularly the Ukraine-Russia conflict, and the increasing activity of threat groups like KAMACITE and ELECTRUM.
Security Megatrends(2026) - Examines the evolving landscape of security technology and its integration into broader business operations. Key insights reveal a significant shift towards AI-driven software solutions and the reinvention of hardware to provide richer data, while security solutions increasingly lose their traditional boundaries to create unified, intelligent systems.
State of Physical Security(2026) - Analyzes the current state of physical security, focusing on global trends and challenges in 2026. This report explores how the industry is adapting and how strategic innovation¹ is redefining what’s possible in physical security. Technology must be managed and deployed with intention, not for its own sake.
Networks OT IoT Security Report(2025) - Analyzes operational technology and internet of things cybersecurity trends in the second half of 2024. Key findings reveal a significant increase in sophisticated attacks targeting industrial control systems, highlighting the growing need for robust security measures in critical infrastructure.
Analyzes the current state of DevSecOps by investigating the prevalence of exploitable vulnerabilities and the risks associated with rapid software dependency updates. Findings indicate that 87 percent of organizations maintain at least one exploitable vulnerability in deployed services, while 41 percent of organizations fail to pin GitHub Actions to a specific hash, significantly increasing exposure to supply chain attacks.
Analyzes the prevalence of secrets sprawl in 2024, focusing on the types of secrets exposed and their locations within software development lifecycles. Key findings reveal that generic secrets comprise 58% of all detected leaks, private repositories are eight times more likely to contain secrets than public ones, and collaboration tools represent a significantly overlooked source of exposure.
Examines the security posture of code repositories and CI/CD pipelines, highlighting the deep connection between code and cloud environments. It reveals that 61% of organizations have secrets exposed in public repositories , with GitHub dominating the VCS landscape but also exhibiting a significantly higher ratio of public repositories with insecure workflow permissions and weak branch protection.
Cyber Threat Report(Annual%20Security%20Reports/2025/ASD-Cyber-Threat-Report-2025.pdf) (2025) - Analyzes the Australian cyber threat landscape for 2023-2024, focusing on state actors, critical infrastructure attacks, cybercrime, hacktivism, and national resilience efforts. Key findings highlight a significant increase in ransomware attacks targeting critical infrastructure and a concerning rise in hacktivism motivated by geopolitical events.
Digital Banking Fraud Trends in Latin America (2026) - Examines the current threat landscape and digital banking fraud trends across Latin America, drawing on data from 36 financial institutions. Key findings reveal a 155% increase in social engineering scam cases and.
Cybersecurity and Resilience Report (2025) - Surveys the FDICs comprehensive strategy for strengthening both its internal cybersecurity and the resilience of the financial services sector. Key initiatives include significant policy updates in 2024, such as Directive 1.
(2025) - Highlights the increasing prevalence and impact of application-layer attacks targeting custom code, APIs, and application logic. The report reveals that applications face an average of 81 confirmed attacks per month, coupled with nearly 30 serious vulnerabilities, while the rapid adoption of AI and LLMs has led to massive increases in AI-related APIs and CVEs.
Analyzes the current state of DevSecOps by investigating the prevalence of exploitable vulnerabilities and the risks associated with rapid software dependency updates. Findings indicate that 87 percent of organizations maintain at least one exploitable vulnerability in deployed services, while 41 percent of organizations fail to pin GitHub Actions to a specific hash, significantly increasing exposure to supply chain attacks.
(2025) - Analyzes the prevalence of secrets sprawl in 2024, focusing on the types of secrets exposed and their locations within software development lifecycles. Key findings reveal that generic secrets comprise 58% of all detected leaks, private repositories are eight times more likely to contain secrets than public ones, and collaboration tools represent a significantly overlooked source of exposure.
(2025) - Outlines key security risks associated with the growing adoption of SaaS applications, including trends in usage across industries and specific SaaS app statistics. Key findings reveal a significant increase in shadow SaaS deployments and the rapid growth of AI-powered tools, posing substantial and largely unmanaged security risks.
(2026) - Examines the evolving landscape of software supply chain security, highlighting how attackers increasingly exploit open-source ecosystems and CI/CD workflows to achieve persistence. Research reveals a 73% increase in malicious open-source packages during 2025, with npm accounting for nearly 90% of all detections while PyPI experienced a 43% reduction in malware following the implementation of mandatory security controls.
Analyzes the correlation between spikes in attacker activity and subsequent CVE disclosures, particularly in edge technologies. The report reveals that in 80% of analyzed cases, attacker activity spikes preceded new CVE disclosures within six weeks, offering defenders a critical window for proactive security measures.
Analyzes malware and vulnerability trends observed in the first half of 2024, focusing on exploitation of remote access and security software. Key insights reveal a significant 103% increase in Magecart infections and the continued dominance of infostealer malware, with operators actively refining evasion techniques.
Examines the current state of artificial intelligence integration within security operations centers, highlighting the operational challenges caused by fragmented toolsets and the evolving role of analysts. Key findings reveal that while 79 percent of organizations have adopted artificial intelligence, 80 percent rely on disconnected point solutions, and 92 percent of security leaders identify trust as the primary barrier to further expansion, specifically citing the need for greater transparency in how automated systems reach their conclusions.
In 2025, VulnCheck identified 884 Known Exploited Vulnerabilities KEVs for which evidence of exploitation was observed for the first time. Our analysis shows that 28.96% of KEVs in 2025 were exploited on or before the day their CVE was published, an increase from the 23.6% observed in our 2024 trends in exploitation report.
AI SOC Report (2026) - Analyzes the state of security operations in 2025 by examining over 25 million alerts across global enterprise environments to identify critical gaps in threat detection and triage. Key findings reveal that nearly 2 percent of low-severity endpoint alerts represent genuine security incidents, demonstrating that current industry reliance on aggressive alert suppression frequently allows active threats to bypass traditional defense mechanisms.
AI Security Report (2025) - Examines the multifaceted AI security landscape, aiming to clarify prevalent confusion around use cases and differentiate between existing and AI-native solutions. The report emphasizes that while many underlying security challenges are familiar, agentic AI architectures significantly elevate runtime risk due to their access to sensitive data and ability to take actions.
State Of Shadow AI Report (2025) - Examines the pervasive adoption and inherent security risks of unsanctioned AI tools across enterprises. Key findings reveal OpenAI accounts for 53% of all shadow AI usage, while many popular tools lack fundamental security controls and persist unsanctioned for over 400 days on average.
Global Mobile Threat Report (2025) - Analyzes the evolving global mobile threat landscape, detailing prevalent attack vectors targeting enterprise mobile devices and applications. Key findings highlight a surge in mobile phishing, the pervasive risk of unupgradable devices 25.3%, and the growing threat of sideloaded applications present on nearly a quarter of enterprise devices.
(2025) - Surveys homeowner practices regarding smart lock and electronic keypad access code sharing and management. Key findings reveal that 78% of holiday travelers share codes, with 22% of homeowners never changing their access codes.
(2026) - Analyzes the current state of DevSecOps by investigating the prevalence of exploitable vulnerabilities and the risks associated with rapid software dependency updates. Findings indicate that 87 percent of organizations maintain at least one exploitable vulnerability in deployed services, while 41 percent of organizations fail to pin GitHub Actions to a specific hash, significantly increasing exposure to supply chain attacks.
(2026) - Examines the evolving landscape of application security, emphasizing the transition toward executive accountability and the integration of secure by design principles within modern development lifecycles. Key findings indicate that 50 percent of C level executives will have cybersecurity risk performance metrics tied to their employment contracts by 2026, while the proliferation of complex API architectures and generative artificial intelligence continues to expand the attack surface and increase the risk of systemic data exposure.
- The State of AI (2026) - Examines the current landscape of AI agent adoption and deployment across enterprises, based on a survey of over 500 technical leaders. Key findings reveal that 57% of organizations deploy agents.
- Digital Banking Fraud Trends in Latin America (2026) - Examines the current threat landscape and digital banking fraud trends across Latin America, drawing on data from 36 financial institutions. Key findings reveal a 155% increase in social engineering scam cases and.
- Travel Threat Landscape Report (2025) - Analyzes the cyber threat landscape targeting the travel and tour operations industry, highlighting recent cyber events and future predictions.
- Cybersecurity and Resilience Report (2025) - Surveys the FDICs comprehensive strategy for strengthening both its internal cybersecurity and the resilience of the financial services sector. Key initiatives include significant policy updates in 2024, such as Directive 1.
- Top Cloud and AI Infrastructure Trends (2026) - Surveys the top cloud and AI infrastructure trends for 2026, identifying leading private companies and market dynamics. Key findings reveal aggregate AI capital expenditure spending is approaching $1 trillion annually.
- The State Of Network Security In Transportation And Logistics (2025) - Analyzes the network security landscape in the transportation and logistics sector, highlighting priorities, challenges, and technology adoption. The report reveals that staying ahead of cybersecurity threats is a top concern 81%, while GenAI readiness remains low, with only 28% having implemented related solutions.
- Annual Threat Report (2026) - Analyzes the evolving threat landscape within the global health sector, focusing on the systemic risks posed by ransomware, supply chain exploitation, and the integration of insecure medical devices. Key findings from a survey of nearly 250 industry professionals reveal that while ransomware remains a top concern, 100 percent of respondents identified artificial intelligence enabled attacks as the primary emerging threat for 2026, alongside a persistent vulnerability to third party breaches that continue to compromise millions of patient records.
- AI Medical Device Cybersecurity Regulations and Risks (2026) - Examines the cybersecurity landscape for artificial intelligence enabled medical devices by evaluating regulatory mandates, technical standards, and emerging threat vectors. Key findings reveal that 53 percent of connected medical devices harbor critical vulnerabilities, while the rapid proliferation of over 1,000 authorized AI devices necessitates rigorous secure by design practices to mitigate risks like adversarial attacks and data poisoning.
- Threat Intelligence Report (2025) - Analyzes the 2025 threat landscape for the telecommunications sector, identifying a strategic shift from opportunistic attacks to coordinated, infrastructure-level campaigns targeting core networks and lawful interception systems. Key insights include the finding that 63% of operators faced living off the land techniques, while high-impact incidents like the Salt Typhoon campaign underscore the growing persistence of state-sponsored actors.
- Research Energy Sector Exposure Assessment (2025) - Analyzes the external exposures of 21 leading U.S. energy providers to assess their security posture and identify systemic risks. The study found nearly 40,000 hosts with over 58,000 exposed services, including a significant number running on non-standard ports, and identified 43 CVEs common to at least 45% of the organizations, indicating potential systemic vulnerabilities.
- Global Crypto Policy Review Outlook (2025) - Analyzes global cryptocurrency policy developments and their impact on institutional adoption. Key findings indicate that over 70% of reviewed jurisdictions advanced stablecoin regulation, while approximately 80% saw financial institutions announce new digital asset initiatives, driven by increasing regulatory clarity.
- Manufacturing Risk Radar Report (2025) - Analyzes the evolving threat landscape for the manufacturing sector in 2025. Key findings highlight the increasing convergence of IT and OT systems, a persistent rise in ransomware attacks, and the need for enhanced security measures across all attack stages.
- Global Automotive Cybersecurity Report (2026) - Analyzes security findings and threat trends reported by Upstream for 2026, examining key attack patterns, vulnerability data, and defensive recommendations. Key findings reveal that the integration of Physical AI and Large Language Models has created a double-edged sword for the industry.
- The State of Healthcare Cybersecurity (2025) - Analyzes the evolving threat landscape within the healthcare sector, focusing on the systemic vulnerabilities and ransomware risks facing medical organizations in the United States. Key findings reveal that nearly 400 healthcare organizations reported cyberattacks in 2024, while 52 percent of global ransomware incidents occurred within the United States, underscoring the urgent need for improved endpoint security and proactive vulnerability management to protect critical patient data.
- Biannual Threats Report (2025) - Analyzes the payments ecosystem's threat landscape, focusing on evolving fraud tactics and scams. Key insights reveal a significant increase in ransomware and data breach incidents, alongside sophisticated fraud schemes leveraging malicious mobile applications and NFC technology.
Read Replied Compromised Employee Engagement Trends (2025) - Analyzes employee engagement trends with vendor email compromise attacks, revealing significant behavioral blind spots. The report highlights a 44.2% overall employee engagement rate with VEC messages and a failure to report 98.5% of text-based advanced attacks, underscoring the urgent need to reduce exposure to malicious content.
Ransomware Report (2025) - Focuses on the evolving ransomware landscape in 2025, highlighting the increasing complexity and volatility of threats. The report reveals the integration of AI and LLMs by ransomware groups, the rise of quadruple extortion tactics, and the weaponization of compliance regulations, alongside regional trends and the blurring lines between cybercrime and hacktivism.
Tracking Ransomware (2026) - Investigates the evolving ransomware landscape in early 2026, highlighting a shift toward user-mediated access, browser-centric exploitation, and psychological coercion over traditional encryption. Data indicates that ransomware activity reached 683 incidents in January 2026, representing a significant increase from the 511 incidents recorded in January 2025, while professional services and manufacturing remain the most targeted sectors for extortion.
Threat Report (2025) - Examines prevalent cyber threats and their impact on ordinary users during Q2/2025. Notable insights reveal the first instance of AI-powered ransomware, a staggering 340% increase in Facebook-based financial scams, and a 317% rise in malicious push notifications.
GRIT Ransomware Annual Report (2026) - Threat actors continue to evolve in their tactics, techniques, and procedures with AI/LLM enabling more rapid adaptation and continuing to reduce barriers to entry for less-skilled and unskilled actors. Key findings include an in-depth look at the RansomHub threat actor and a spotlight on critical infrastructure vulnerabilities, along with an analysis of post-compromise detection methods.
Threat Landscape Report Q3 (2025) - Analyzes the evolving global threat landscape in the third quarter of 2025, focusing on ransomware trends, nation-state espionage, and the exploitation of critical infrastructure. Key findings reveal that 88 distinct ransomware groups were active during this period, with the business services sector emerging as the primary target, accounting for 18 percent of all reported leak site posts.
Ransomware Threat Landscape (2026) - Analyzes the evolving ransomware threat landscape and the shift toward encryptionless extortion tactics during 2025. While traditional ransomware attacks saw a marginal 0.8 percent increase, the total volume of extortion incidents surged by 23 percent when accounting for data theft operations that bypass file encryption entirely.
Ransomware Trends (2025) - Analyzes the evolving ransomware threat landscape and proactive resilience strategies for 2025. Key findings reveal a slight decrease in overall attack impact, a significant decline in ransom payments, and a rise in data exfiltration attacks as threat actors adapt to increased law enforcement pressure.
Email Threat Report (2025) - Examines email-based threat trends and evolving social engineering tactics observed in Q2 2025, emphasizing human-centered attacks. Key findings highlight the sustained targeting of manufacturing and retail, a significant shift towards customized phishing deployments, and BEC scams increasingly localized to Scandinavian languages.
Threatlabz Ransomware Report (2025) - Examines the current ransomware landscape, detailing top trends, targets, and evolving attack methodologies. Key findings reveal a 145.9% surge in blocked ransomware attempts and a 92.7% increase in data exfiltration, signaling a broader shift towards data-only extortion, with generative AI further enhancing attack sophistication.