CyberSecStats #18 - Monthly statistics round-up May/June 2025
Hello! Laura from CyberSecStats here with a monthly email of 100+ cybersecurity statistics pulled from vendor reports and research papers.
All of the statistics and data points below were published by cybersecurity vendors in the past month (May/June 2025) and include direct links back to their publisher/source.
Cybersecurity incident experiences
- 88% of CIOs faced cybersecurity incidents in the last 12 months. (Logicalis)
- 43% of CIOs suffered multiple breaches. (Logicalis)
- 78% of CIOs say breach frequency is steady or rising. (Logicalis)
- 76% of CISOs reported major impacts from breaches. 36% faced downtime, 30% had data exposed, and 28% incurred financial loss. (Pentera)
- 75% of incidents involve unmanaged assets. (Trend Micro)
Ransomware trend data
- The number of unique ransomware groups that reported a victim has risen from 41 in 2023 to 77 in 2024, an increase of nearly 88%.
- Ransomware attacks rose 25% in 2024. (Bitsight)
- The number of ransomware leak sites increased by 53%. (Bitsight)
- Ransomware cyber insurance claims frequency dropped 3%. (Coalition)
- The number of publicly disclosed victims rose 25% (Apr 2024–Mar 2025), after an 81% surge prior. (Black Kite)
- 96 ransomware groups are now active. (Black Kite)
- SMBs in the $4M–$8M range were hit most often. (Black Kite)
- Ransomware caused 67% of known third-party breaches. (Black Kite)
- Ransom payment values declined by 35%. (Black Kite)
Cybersecurity concerns
- Only 58% of CIOs are confident in their ability to identify potential security gaps. (Logicalis)
- Top concerns for CIOs regarding cybersecurity risk include: malware and ransomware (42%), data breaches (37%), AI-driven attacks (34%), and phishing (33%). (Logicalis)
- 68% say media reports of high-profile breaches have elevated cybersecurity on the C-suite agenda. (LevelBlue)
- 58% view external threats (like malicious actors and state-affiliated groups) as more significant than internal threats (42%). (Cisco)
DDoS attacks
- 50%+ teams struggle to coordinate teams during DDoS attacks. (Corero)
- 68% report challenges showing the ROI of DDoS protection to leadership. (Corero)
Cloud incidents and security trends
- On average, organizations detect 17 cloud vulnerabilities weekly. (Prowler)
- Teams sift through ~7,000 alerts to find one real cloud threat. (ARMO)
- 45% report frequent false positives from cloud tools. (ARMO)
- 63% use over five runtime cloud security tools. (ARMO)
- ~1/3 of cloud assets are neglected, each with ~115 vulnerabilities. (Orca Security)
- 36% of organizations have at least one cloud asset with 100+ attack paths. (Orca Security)
- Top tech expected to impact cloud security in the next three years: AI/ML analytics (27%), open-source tools (17%), and automated threat response (16%). (Prowler)
- Expected gaps (in the next 12 months): budget (45%), talent (42%), and automation (34%). (Prowler)
- 37% failed audits due to cloud security issues in the past year. (Prowler)
AI-driven attack data
- AI-driven attacks now occur as frequently as phishing, placing AI firmly among the top three cybersecurity threats. (Logicalis)
- 42% of executives believe AI-powered threats will happen. (LevelBlue)
- 59% say AI is making threats harder for employees to spot. (LevelBlue)
- Only 49% believe staff fully understand AI-related risks. (Cisco)
Vulnerabilities and vulnerability management
- 57% say automation speeds up vulnerability response. (Optiv)
- 74% identify a lack of understanding of every potential source of vulnerability as their biggest challenge to effective vulnerability management. (Optiv)
- 91% face delays in remediation. (Seemplicity)
- 61% measure vulnerability remediation success by number of fixes; 54% by fewer breaches. (Seemplicity)
- 1 in 5 organizations take 4 or more days to fix critical vulnerabilities. (Seemplicity)
- Nearly 40% still rely on manual workflows for most of their vulnerability remediation processes. (Seemplicity)
- Total number of software vulnerabilities rose 61% YoY in 2024.(Action1)
- Critical vulnerabilities rose by 37.1% in 2024. (Action1)
- Known exploited vulnerabilities surged 96%. (Action1)
Cybersecurity budget and spending trends
- 79% of companies are adjusting their cybersecurity budgets; 71% report increases.(Optiv)
- Average enterprise security budget: $24M. (Optiv)
- 67% of companies now use risk/threat assessments to guide budgets, up from 53% in 2024. (Optiv)
- 30% say limited budget blocks adoption of new solutions. (Seemplicity)
- U.S. enterprises spend ~$187K yearly on pentesting - 11% of a $1.77M average security budget. (Pentera)
- 85% of CISOs say the volume of nation-state threats influence their budget. (Trellix)
- Among SMBs with fewer than 50 employees, more than half allocate less than 1% of their annual budget to cybersecurity. (CrowdStrike)
Security tool opinions from CIOs
- 50% of CIOs say they've overinvested in unnecessary tools. (Logicalis)
- 50% admit they're not using all features of their security tools. (Logicalis)
- 50% of tech leaders lack tools that fit their business needs. (Logicalis)
- 41% of CIOs don't believe their current security investments fully meet their organization's needs. (Logicalis)
AI cybersecurity tool adoption and benefits
- Only 29% of executives hesitate to adopt AI due to cybersecurity ramifications. (LevelBlue)
- 43% of organizations use AI to anticipate and prevent attacks. (MixMode)
- Among organizations using AI in the SOC, 57% report faster alert resolution, 55% say it frees up analyst bandwidth, 50% cite better real-time threat detection . (MixMode)
- AI improved prioritisation of threats (56%), SOC team efficiency (51%), threat analysis speed (43%), job satisfaction (70%). (MixMode)
- Only 11% of organizations fully trust AI for mission-critical tasks. (Splunk)
- 46% of respondents say their organizations use AI/ML to prevent cyberattacks. (Optiv)
- 70% of organizations say integrating AI tools with legacy systems is difficult. (MixMode)
- 59% cite a lack of internal expertise to validate AI vendor claims. (MixMode)
- Barriers to AI adoption: high implementation and maintenance costs (73%), lack of in-house expertise (64%), difficulty integrating the technology with existing systems (58%). (FIS and Oxford Economics)
- 73% of respondents report investing in AI-specific security tools, using either new budgets or reallocating existing resources. (Thales)
- Among those focused on AI security, most buy from cloud providers; nearly half turn to startups. (Thales)
- Key drivers for AI/ML adoption: efficiency (41%) and competitive edge (40%). (Optiv)
AI application usage risks and fears
- 68% of organizations have data leakage incidents due to employees sharing sensitive data with AI tools. (Metomic)
- Only 23% of organizations have implemented comprehensive AI security policies. (Metomic)
- Less than 10% of enterprises have implemented data protection policies and controls for AI applications. (Skyhigh Security)
- 11% of files uploaded to AI applications include sensitive corporate content. (Skyhigh Security)
Credential security
- Stolen credentials are the second highest initial infection vector, making up 16% of investigations. (Mandiant)
- 35%+ had an account compromised due to weak passwords last year. (FIDO Alliance)
- 1.7 billion stolen credential records were shared in underground forums. (Fortinet)
- Among the roles most vulnerable to credential theft, 28% were in Project Management, followed by Consulting (12%) and Software Development (10.7%). (KELA)
- Ransomware followed stolen credentials within 2.5 weeks on average. (KELA)
- Password cracking is 20% faster than in 2024 using consumer GPUs. (Hive Systems)
- Valid credentials were used in 48.6% of initial access cases. (eSentire)
- 76% of CIOs see credential leaks as a growing threat. (Logicalis)
Infostealer use
- Infostealer cases rose 31% YoY. (eSentire)
- 35 unique infostealers detected in 2024, up from 26 in 2023. (eSentire)
- Infostealer activity has surged 266% in recent years. (KELA)
Social engineering trends and types
- Callback phishing made up 16% of phishing attempts in Q1 2025. (VIPRE Security Group)
- Vishing (voice-call phishing) tactics grew by 28%. (Zimperium)
- Smishing attacks grew by 22%. (Zimperium)
- Over 60% of top-clicked phishing emails were related to HR and IT. (KnowBe4)
- 60.7% of phishing clicks mentioned an internal team. (KnowBe4)
BEC (and VEC) compromise
- BEC/user account compromises rose 70% in 2024. (eSentire)
- 60% of cyber insurance claims stemmed from BEC and funds transfer fraud. (Coalition)
- 29% of BEC cases led to funds transfer fraud. (Coalition)
- BEC claim severity jumped 23%. (Coalition)
- Email-based BEC attacks surged 70% YoY. (Cofense)
- 72% of large enterprise employees acted on malicious vendor emails. (Abnormal AI)
Post-quantum cryptography
- A cryptanalytically relevant quantum computer capable of breaking common public key schemes is expected by 2030. (Utimaco)
- PQC migration status: 20% started, 34% plan to in 1–3 years, 21% in 3–5 years, 25% have no plans. (Utimaco)
- 63% prefer a hybrid approach (classical + PQC); 26% favor larger symmetric keys. (Utimaco)
- 95% lack a quantum computing roadmap. (ISACA)
- Only 5% have a defined strategy. (ISACA)
- 62% worry quantum will break current encryption; just 5% consider it a near-term priority. (ISACA)
- Only 5% have implemented quantum-safe encryption. (DigiCert)
- 46.4% say much of their encrypted data could be at risk. (DigiCert)
- 63% cite future encryption compromise as the top quantum threat. (Thales)