Don’t let overlooked obligations become incidents. Learn how.
Utility navigation bar redirect icon
Portal LoginSupportContact
Search
Close search
Huntress Logo in Teal
  • Platform Overview
    Managed EDR

    Get full endpoint visibility, detection, and response.

    Managed EDR

    Get full endpoint visibility, detection, and response.

    Managed ITDR

    Protect your Microsoft 365 identities and email environments.

    Managed ITDR

    Protect your Microsoft 365 identities and email environments.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed Security Awareness Training

    Empower your teams with science-backed security awareness training.

    Managed Security Awareness Training

    Empower your teams with science-backed security awareness training.

    Managed ISPM

    Continuous Microsoft 365 and identity hardening, managed and enforced by Huntress experts.

    Managed ISPM

    Continuous Microsoft 365 and identity hardening, managed and enforced by Huntress experts.

    Managed ESPM

    Proactively secure endpoints against attacks.

    Managed ESPM

    Proactively secure endpoints against attacks.

    Integrations
    Integrations
    Support Documentation
    Support Documentation
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
  • Threats We Stop
    Phishing
    Phishing
    Business Email Compromise
    Business Email Compromise
    Ransomware
    Ransomware
    Infostealers
    Infostealers
    View Allright arrowView Allright arrow
    Industries We Serve
    Education
    Education
    Financial Services
    Financial Services
    State and Local Government
    State and Local Government
    Healthcare
    Healthcare
    Law Firms
    Law Firms
    Manufacturing
    Manufacturing
    Utilities
    Utilities
    View Allright arrowView Allright arrow
    Tailored Solutions
    MSPs
    MSPs
    Resellers
    Resellers
    SMBs
    SMBs
    Compliance
    Compliance
    What Gets Overlooked Gets Exploited

    Most days, nothing happens. But one day, something will.

    Huntress Cybersecurity
    Cybercriminals Have Evolved

    Get the intel on today’s cybercriminal groups and learn how to protect yourself.

    Huntress Cybersecurity
  • Pricing
  • Community Series
    The Product Lab

    Shape the next big thing in cybersecurity together.

    The Product Lab

    Shape the next big thing in cybersecurity together.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    Resources
    Upcoming Events
    Upcoming Events
    Ebooks
    Ebooks
    On-Demand Webinars
    On-Demand Webinars
    Videos
    Videos
    Whitepapers
    Whitepapers
    Datasheets
    Datasheets
    Cybersecurity Education
    Cybersecurity 101
    Cybersecurity 101
    Cybersecurity Guides
    Cybersecurity Guides
    Threat Library
    Threat Library
    Real Tradecraft, Real Results
    Real Tradecraft, Real Results
    2026 Cyber Threat Report
    2026 Cyber Threat Report
    The Huntress Blog
    Huntress Lands on the Microsoft Marketplace
    Huntress Cybersecurity
    Huntress Lands on the Microsoft Marketplace
    Huntress Cybersecurity
    How Huntress & DEFCERT Are Streamlining CMMC Assessment Prep
    Huntress Cybersecurity
    How Huntress & DEFCERT Are Streamlining CMMC Assessment Prep
    Huntress Cybersecurity
    Live Hacking Into Microsoft 365 with Kyle Hanslovan
    Huntress Cybersecurity
    Live Hacking Into Microsoft 365 with Kyle Hanslovan
    Huntress Cybersecurity
  • Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    The Huntress SOC

    24/7 Security Operations Center

    The Huntress SOC

    24/7 Security Operations Center

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Community

    Get in touch with the Huntress Community team

    Community

    Get in touch with the Huntress Community team

    Compare Huntress
    Bitdefender
    Bitdefender
    Blackpoint
    Blackpoint
    Breach Secure Now!
    Breach Secure Now!
    Crowdstrike
    Crowdstrike
    Datto
    Datto
    SentinelOne
    SentinelOne
    Sophos
    Sophos
    Compare Allright arrowCompare Allright arrow
  • HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    Partners
    MSPs

    Join our partner community to deliver expert-led managed security.

    MSPs

    Join our partner community to deliver expert-led managed security.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Tech Alliances

    Driving innovation through global technology Partnerships

    Tech Alliances

    Driving innovation through global technology Partnerships

    Microsoft Partnership

    A Level-Up for Your Business Security

    Microsoft Partnership

    A Level-Up for Your Business Security

  • Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Awards
    Awards
    Contact Us
    Contact Us
  • Portal Login
  • Support
  • Contact
  • Search
  • Get a Demo
  • Start for Free
Portal LoginSupportContact
Search
Close search
Get a Demo
Start for Free
HomeBlog
137 Key Cybersecurity Statistics for 2026 and Beyond
Published:
June 12, 2025

137 Key Cybersecurity Statistics for 2026 and Beyond

By:
Brenda Buckman
Share icon
Glitch effectGlitch effectGlitch effect

Top cybersecurity facts

Staying ahead in cybersecurity means getting the lay of the land—what's working, what's not, and what's changing. This cybersecurity data isn't just numbers; it’s deep insights into current digital defense risks, from password statistics revealing ongoing challenges to newer problems like remote work best practices.

  1. More than a quarter (28%) of cybersecurity professionals say that employees in remote and hybrid work environments using the same or weak passwords is their biggest challenge. (Huntress)

  2. Cyber safety concerns for remote and hybrid workers influenced 61% of businesses' decisions to return to the office after the COVID-19 pandemic. (Huntress)

  3. An overwhelming majority (90%) of cybersecurity professionals feel confident in their organization's ability to protect sensitive information in remote and hybrid work scenarios. (Huntress)

  4. Over three-fifths (64%) of respondents believe the shift to remote and hybrid work has positively impacted their ability to predict and prevent cybersecurity incidents. (Huntress)

  5. The most commonly implemented cybersecurity policies for remote and hybrid employees are regular cybersecurity training (84%), encrypted password managers (78%), and virtual private networks, or VPNs (64%). (Huntress)

  6. Only 2 in 5 IT professionals noted that their organization uses multi-factor authentication (MFA). (Huntress)

  7. Nearly two-fifths of organizations conduct cybersecurity training every quarter. (Huntress)

  8. 1 in 10 organizations conduct cybersecurity training once a year or less, and 5% lack a formal training schedule altogether. (Huntress)

  9. Almost one-third of respondents (32%) think overall employee cybersecurity awareness needs improvement, while 46% rate it as “meeting expectations.” (Huntress)


Cybercrime statistics

Some cyberattacks are much more frequent than others (shocker!), and knowing about the most common cyberattacks is a great starting point for strengthening your defenses. Below, we’ve rounded up key statistics on the patterns and common cybercrime tactics, covering everything from ransomware to identity threats. 

Cyberattack statistics

You hear all the buzzwords, but what are attackers really doing in the wild? We've reviewed the latest data to show you exactly which methods pop up most often.


  1. Infostealers were highly prevalent in 2024, responsible for 24% of cyber incidents. (Huntress)

  2. Remote access trojans (RATs) like AsyncRAT and Jupyter were used in over 75% of observed remote access attacks. (Huntress)

  3. In 2024, the most active campaign identified by Huntress targeted vulnerabilities CVE-2024-1709 and CVE-2024-1708 in ScreenConnect, representing two-thirds of identified traditional exploitation attempts. (Huntress)

  4. Across all scenarios monitored by Huntress in 2024, PowerShell was the scripting language of choice 45% of the time. (Huntress)

  5. Scripting abuse incidents involved MSHTA, WMI, and WScript in 8.4% of cases. (Huntress)

  6. Registry Run Keys was the top persistence method, used in almost half of the identified cases. (Huntress)

  7. Roughly 1 in 11 attackers who tried to use defense evasion techniques failed. (Huntress)

  8. Over half (55.7%) of evasive maneuvers used file name obfuscation. (Huntress)

  9. Registry Null Byte insertion was used for 40% of all evasion methods. (Huntress)

  10. At least 29 of 3,158 cyberattacks reported by the ITRC last year involved “credential stuffing” attacks using compromised logins and passwords, attacks that could have been prevented with MFA or passkeys. (ITRC)

Data breach statistics

Let's talk data breaches: here, we break down stats on how often they're happening and how much information is really being exposed.

  1. Just over one-third (35%) of all victim notices contained attack vector details. (ITRC)

  2. In contrast, nearly two-thirds (65%) of all victim notices didn't contain attack vector details. (ITRC)

  3. The Ticketmaster Entertainment, LLC security incident was considered a top compromise in 2024 by victim notice count, with 560 million victim notices. (ITRC)

  4. The number of victim notices saw a dramatic increase, jumping by 211% (!) between 2023 and 2024. (ITRC)

  5. In 2024 alone, there were a total of 3,158 compromises. (ITRC)

  6. Victim notices surpassed 1.3 billion in 2024. (ITRC)

  7. Cyberattacks represented more than 2,500 of all breaches, making them the most common type. (ITRC)

  8. The total number of data breaches recorded in 2024 was 2,850. (ITRC)

  9. Out of 3,158 total compromises reported by the ITRC, data exposures amounted to 18 incidents in 2024. (ITRC)

  10. There were two data leaks registered in 2024 by the ITRC. (ITRC)

  11. Although publicly traded companies accounted for only 7% of all compromised organizations (221 companies), they were responsible for over 72% of victim notices, amounting to 939 million in 2024. (ITRC)

  12. When examining the 133 cyberattacks against publicly traded companies that led to a data breach notice, stolen credentials emerged as the most common attack vector. (ITRC)

  13.  At least 114 out of 3,158 compromises involved files being attached to emails or included in physical correspondence. (ITRC)

  14. It's estimated that 1,965 of the compromises reported during 2024 could have been prevented, including three of the five major breaches that resulted in 860 million victim notices. (ITRC)

Identity threat statistics

Identity threats are where things get personal. We're talking about access to accounts and potential hijacking of information, and here's exactly where we're seeing the biggest problems with identity theft and abuse.


  1. Nearly half (45.5%) of identity threat detections in 2024 resulted from access rule violations, such as attempts to reach resources from restricted VPNs or unapproved locations. (Huntress)

  2. Modifications to Inbox Rules frequently involved moving content to the RSS Feeds folder, accounting for half of the malicious activity. (Huntress)

  3. More than a third (35.4%) of suspicious Inbox Rule activity included moving content to the Conversation History Folder. (Huntress)

  4. Nearly 6% of all ITDR events during the year involved attackers trying to hijack or steal user tokens. (Huntress)

  5. NordVPN was the most common VPN used for abuse, making up 20% of all incidents identified. (Huntress)

Phishing statistics

A phishing attack is more than just a minor annoyance—it's often the first step in a much bigger cyberattack. These stats will give you a clearer picture of what types of phishing are out there, who's being targeted, and how often it's successful.

  1. E-signature impersonation was the most notable phishing email theme, making up almost one-third of identified phishing attempts. (Huntress)

  2. While QR codes represented more than 8% of phishing attacks in 2024, an increase is anticipated for 2025. (Huntress)

  3. Microsoft-branded emails were the most frequent for impersonated brands among 285 groups, comprising nearly 40% of incidents. (Huntress)

  4. DocuSign was the second most commonly imitated brand, accounting for a quarter of incidents. (Huntress)

Ransomware statistics

Ransomware attacks have morphed from simple data encryption to highly organized extortion. Here’s what you need to know to stay prepared and defend against these costly attacks.


  1. Over half of the ransomware incidents were linked to RansomHub, Lynx, and Akira. (Huntress)

  2. The average time-to-ransom observed was close to 17 hours. (Huntress)

  3. On average, 18 actions are performed by threat actors before ransomware is triggered. (Huntress)

  4. The presence of ransomware, whether with or without encryption, showed significant growth from 32% to 44%—a 37% increase over the prior year's report. (Verizon)

  5. The average ransom amount decreased to $115,000 in 2024, down from $150,000 in 2023. (Verizon)

  6. Nearly two-thirds (64%) of victim organizations opted not to pay the ransoms. (Verizon)

  7. Ransomware factored into 39% of all breaches, while a vast majority (88%) of breaches affecting small and medium-sized businesses (SMBs) involved ransomware. (Verizon)

Hacking statistics

It's good to know about cyberattacks in general, but what are hackers doing in practice? What software do they use? How do they get in?


Let’s break down hacking statistics and highlight the tools and methods you need to know to strengthen your cyber defenses and get on a hacker's "do not engage" list


  1. Cobalt Strike is still the most prevalent hacking tool, used for over 31% of hacks in 2024. (Huntress)

  2. PSExec, AD Explorer, and SDelete were the most frequently used Sysinternals tools by attackers in 2024. (Huntress)

  3. ConnectWise ScreenConnect was the most exploited remote access tool, used in nearly three-quarters of cases. (Huntress)

  4. Mimikatz and generic malware were the top tools for gaining access to system credentials, together making up 55%. (Huntress)

  5. Domain enumeration accounted for the main hands-on-keyboard (HOK) activity in 2024. (Huntress)


Cost of cyberattacks stats

The costs of cyberattacks aren't limited to immediate expenses; they also include factors like cyber insurance trends, business disruptions, data recovery, and damage to customer trust. These stats break down the costs involved and give you a real sense of the financial risks you might be dealing with.


  1. 1 in 4 IT security professionals cite cost as the main factor why organizations choose not to get cyber insurance. (Huntress)

  2. More than half (55%) of the surveyed IT security professionals strongly agree that their organization has the budget to protect itself against cybersecurity threats. (Huntress)

  3. The cyber insurance market is expected to grow 8% from 2024, with a market premium projection of $16.6 billion in 2025. (Swiss Re Group)

  4. 34% of healthcare IT professionals say financial loss has the biggest impact after a cyber threat. (Huntress)

  5. More than 1 in 4 healthcare IT professionals cite budget constraints as a top threat. (Huntress)

  6. The average global cost of a data breach soared to $4.88 million in 2024, reflecting a 10% increase from 2023. (IBM)

  7.  Business downtime and post-breach customer support, and remediation were the main factors for the cost increase of global data breaches in 2024. (IBM)

  8. More than 50% of organizations said they pass on the costs of data breaches to customers. (IBM)

  9. Organizations that used comprehensive security AI and automation in prevention saved an average of $2.22 million in 2024. (IBM)

  10. Malicious insider attacks account for the highest costs, with an average cost of $4.99 million. (IBM)

  11. In 2024, the average cost of a data breach in the United States reached $9.36 million. (Statista)

  12. In 2023, Canada had the second-highest costs, after the US, with data breach costs averaging $5.13 million. (Statista)

  13. The healthcare sector worldwide reported the highest data breach costs in 2024, averaging approximately $9 million. (Statista)

  14. Financial institutions followed with the highest data breach costs in 2024, with an average cost of $6 million. (Statista)

  15. "Detection and escalation" emerged as the most expensive component of data breaches globally, averaging $1.63 million. (Statista)

  16. "Lost business" was the second most costly aspect of data breaches. (Statista)

Cybersecurity workforce stats

Having the right people is key to a strong cybersecurity plan. The problem is that many companies just can't find enough qualified people to hire or keep around. Knowing what's happening in hiring can help tackle these skill shortages and roadblocks.


  1. About 1 in 7 of healthcare IT professionals cited difficulty hiring qualified cybersecurity professionals as an obstacle to adequate cybersecurity. (Huntress)

  2. Over half of breached organizations are facing high levels of security staffing shortages in 2024, a 26.2% increase from 2023. (IBM)

  3. More than 20% of organizations used some type of Gen AI security tools to help close the skills gap. (IBM)

  4. The majority (60%) of surveyed international practitioners and decision-makers agree that skills gaps substantially affect their organization's security, and over half (58%) say it's a big risk. (ISC2)

  5. Two-thirds of surveyed cybersecurity decision-makers reported experiencing a staffing shortage. (ISC2)

  6. In 2024, 25% of surveyed practitioners and decision-makers reported layoffs, and 37% reported budget cuts in their cybersecurity departments. (ISC2)

  7. IT professionals cite a lack of skills as the most challenging aspect of their work over the past 12 months. (ISC2)

  8. The sectors of hosted/cloud services, telecommunications, and aerospace saw the biggest impact from cybersecurity budget cuts during 2024. (ISC2)

  9. Conversely, public sector positions, nonprofits, the military, and legal fields experienced the least disruption due to cybersecurity budget reductions in 2024. (ISC2)

  10. IT professionals cited budget as the number one cause for both their talent and skills gaps. (ISC2)

  11. Cybersecurity professionals place the highest priority on striking a balance between personal fulfillment and professional growth in their careers. (ISC2)

  12. According to the average response, IT professionals generally feel they’re at an appropriate organizational level within their respective companies. (ISC2)

  13. Nearly 1 in 5 cybersecurity professionals explicitly said they’re actively seeking new job opportunities in cybersecurity. (ISC2)

  14. A majority (62%) of professionals transitioned into cybersecurity roles directly from institutions of higher learning. (ISC2)

  15. IT professionals widely regard their cybersecurity certifications as valuable, with 86% affirming this sentiment. (ISC2)

  16. Notably, among those entering cybersecurity within the past year, the proportion of 39-to-49-year-olds has seen a consistent yearly increase, jumping from 18% in 2022 to 35% in 2024. (ISC2)

  17. A large portion of hiring managers (59%) admit they lack sufficient knowledge about generative AI to pinpoint the top skills professionals need in an AI-centric workplace. (ISC2)

  18. Just over half (51%) of cybersecurity experts believe that non-technical or “soft” skills will become more important for cyber professionals in the era of AI. (ISC2)


Cybersecurity by industry 

Some industries are shiny temptations that threat actors just can't resist (ahem, finance), while others might seem a little less exciting, but still hold plenty of valuable info. Here's how these threats change depending on the type of organization.

Cybersecurity in education statistics

Schools and universities might not seem like the first places hackers would go, but they hold tons of personal data—student records, research, you name it.

Plus, most schools are working with tight budgets and small IT teams, which can make defending against attacks even tougher. Here are some stats that drive home the cybersecurity challenges the education sector is up against.


  1. In 2024, education was the most targeted industry, accounting for 21% of cyberattacks. (Huntress)

  2. Errors continue a gradual three-year increase, accounting for 29% of breaches in education, with misdelivery being the most frequent type. (Verizon)

  3. External actors are responsible for more than half of the attacks in the education industry, with organized crime groups behind 59% of those incidents. (Verizon)

  4. In education data breaches, personal data (58%) and internal data (49%) are the most commonly compromised types of information. (Verizon)

  5. There were 162 recorded compromises within the education sector in 2024 out of 3,158 total compromises. (ITRC)


Cybersecurity in finance statistics

It shouldn’t be shocking that the finance industry is a prime target for cyberattacks. With the potential high rewards come more sophisticated attempts, ranging from system intrusions to social engineering. 


  1. The financial sector was the most breached industry in 2024, with 737 recorded compromises out of 3,158 overall. (ITRC)

  2. A majority of breaches in the financial industry (74%) involve system intrusion, social engineering, or basic web application attacks. (Verizon)

  3. Because complex attacks are becoming more common against the financial and insurance vertical, system intrusion continues to be the leading pattern observed in financial sector breaches. (Verizon)

  4. Hacking is the most frequent type of action taken in financial sector breaches, accounting for 45% of incidents. (Verizon)

  5. Approximately one-third of attempts by threat actors in the financial industry are successful. (Verizon)

Cybersecurity in healthcare statistics

The healthcare industry has always been at the top of the list for cyberattacks, mainly because it has tons of confidential patient details. So when it comes to cybersecurity within the healthcare sector, it's a constant struggle for organizations to protect that data and keep everything running smoothly in their facilities.


  1. Of the cyberattacks monitored by Huntress in 2024, healthcare was the second most targeted industry, accounting for 17% of attacks. (Huntress)

  2. One-third of IT professionals identify data breaches as their leading cybersecurity concern in the healthcare sector. (Huntress)

  3. Phishing attacks were reported as the most common type of cybersecurity incident healthcare organizations saw in 2024, with 40% of respondents citing them. (Huntress)

  4. Over half (52%) of healthcare IT professionals believe cyber threats most significantly impact their organization by disrupting patient care. (Huntress)

  5. A majority of surveyed healthcare IT professionals expressed confidence in their organization's preparedness for a major cyberattack within the next year; 37% are very confident and 53% are somewhat confident. (Huntress)

  6. About two-thirds of surveyed healthcare IT professionals complete cybersecurity training at least semi-annually. (Huntress)

  7. Improving security awareness training is the primary focus for 37% of healthcare IT professionals in 2025. (Huntress)

Cybersecurity in manufacturing statistics

Manufacturing facilities run on complex systems, managing everything from supply chains to production lines. That means cybersecurity in manufacturing isn't just about keeping intellectual property safe but also about making sure everyday production continues without a hitch.

Here are statistics that show what's happening in cybersecurity within the manufacturing world.


  1. Manufacturing was the least targeted industry, accounting for 9% of Huntress-identified cyberattacks in 2024. (Huntress)

  2. Malware was the number one threat targeting manufacturing in 2024, representing 17% of attacks. (Huntress)

  3. Malware disguised as Adobe components made up 23% of all methods used in the manufacturing sector. (Huntress)

  4. Manufacturing environments saw high numbers of RAT installations in 2024, with AsyncRAT, Trickbot, NetSupport, and NewCoreRAT as the most frequently detected families. (Huntress)

  5. Domain passwords were the primary target of information theft in manufacturing, with attackers migrating to higher-priority machines as fast as possible. (Huntress)

Cybersecurity in state and local government statistics

Government data is often highly sensitive, holding information that could impact entire communities. Would we want personal details or vital infrastructure plans to fall into the wrong hands? Absolutely not, which is why the increasing frequency of cyberattacks on state and local governments demands urgent attention.


  1. Over 10% of the cyberattacks Huntress saw in 2024 targeted government agencies. (Huntress)

  2. Infostealer threats were the most prevalent type of threat for government environments, accounting for 21% of threats. (Huntress)

  3. In 2024, the main attack on government organizations was mainly malicious scripts built on PowerShell and JavaScript, often connected to SOCGholish and AsyncRAT. (Huntress)

  4. Hacking tools like Cobalt Strike and BloodHound were used more often against government entities than other industries. (Huntress)

AI cybersecurity statistics

Generative AI (Gen AI) is making a big splash in cybersecurity, both as a powerful tool for defense and as a potential weapon in the hands of threat actors. These statistics reveal how teams are navigating AI adoption, policies, and attacks. 


  1. The majority of surveyed IT security professionals say AI-powered attacks are the biggest threat with the potential to impact cyber insurance in 2025. (Huntress)

  2. Two-thirds of surveyed cybersecurity professionals feel confident that their expertise will enhance Gen AI technology. (ISC2)

  3. Almost half (45%) of cybersecurity teams are using Gen AI within their toolsets. (ISC2)

  4. More than half (54%) of cybersecurity professionals report facing data privacy and security problems due to the organizational implementation of Gen AI.  (ISC2)

  5. While 90% of surveyed cybersecurity professionals say their organizations have at least some Gen AI policies in place, the majority (65%) believe more regulations are needed. (ISC2)

  6. A majority (68%) of professionals say they plan to effectively integrate generative AI into their roles within the next two years. (ISC2)

  7. Over two-thirds of respondents noted that Gen AI has been a significant topic of discussion among their organization's leadership. (ISC2)

  8. More than half (54%) of IT professionals believe Gen AI will benefit cybersecurity on a broad scale. (ISC2)

  9. Just 60% of respondents reported that their cybersecurity team participates in formulating regulations and guidelines for generative AI. This figure drops to 50% for organizations with 20,000 or more employees. (ISC2)

  10. 1 in 7 employees regularly accessed generative AI systems on their corporate devices at least once every two weeks. (Verizon)

  11. Among these employees, a large percentage used non-corporate emails as account identifiers (72%), while a smaller but still notable portion used corporate emails without proper integrated authentication (17%), suggesting usage outside official policies. (Verizon)

Cybersecurity trends

Keeping up with current trends isn't just about knowing what's flashy; it's about understanding where the real risks are. This section dives into what's hot in cybersecurity right now, from how attackers are getting in to what kinds of tech we're using (or maybe not using enough).


  1. Vulnerability exploitation saw yet another year of growth as an initial breach access vector in 2024, now accounting for one-fifth of all breaches. (Verizon)

  2. Credential abuse is still the single most common breach vector year over year. (Verizon)

  3. Targeting edge devices and VPNs for vulnerability exploitation surged to 22%, representing nearly an eightfold increase from the mere 3% seen in the previous year's report. (Verizon)

  4. Only slightly more than half (54%) of edge device vulnerabilities were fully remediated throughout the year, with a median resolution time of 32 days. (Verizon)

  5. The involvement of third parties in breaches doubled, going up from 15% to 30%. (Verizon)

  6. Three-fifths of breaches still involve a human element in 2024, maintaining a consistent level compared to 2023. (Verizon)

  7. The median time to address leaked secrets discovered in a GitHub repository stood at 94 days. (Verizon)

  8. Espionage-motivated breaches witnessed significant growth, now comprising 17% of breaches. (Verizon)

  9. Espionage-motivated breaches used vulnerability exploitation as their primary initial access vector, a substantial 70% of the time, highlighting the danger of running unpatched services. (Verizon)

  10. Nearly 28% of incidents involving state-sponsored actors had a financial motive. (Verizon)

  11. Credential logs showed that 30% of compromised systems could be identified as enterprise-licensed devices. (Verizon)

  12. In 46% of compromised systems where corporate logins were found in compromised data, those systems were unmanaged and hosted both personal and business credentials. (Verizon)

Understanding cybersecurity risks 

Cybersecurity statistics paint a complex and ever-changing picture. We've seen the rise of sophisticated attacks, the ongoing challenge of human error, and the growing importance of AI’s role in both defense and offense.

These threats can seem overwhelming, but with our in-depth understanding of how threat actors think, we know what to look for. Huntress gives you fully managed endpoint detection and response (EDR), so you've got 24/7 support from security experts ready to respond to threats.

FAQ

How many people get hacked a year?

The exact number varies depending on how you define “hacking”, but the ITRC reports over 1.3 billion victims from 3,158 compromises in 2024. 

Where do most cyber incidents begin?

Around 90% of cyber incidents start with phishing emails, making them the main entry point for cyberattacks.

How many businesses get hacked a day? 

Verizon reported 3,049 incidents for small businesses (less than 1,000 employees) and 982 incidents for large businesses (more than 1,000 employees) in 2024.




Summarize this postClose Speech Bubble
ChatGPTClaudePerplexityGoogle AI

See Huntress in action

Our platform combines a suite of powerful managed detection and response tools for endpoints and Microsoft 365 identities, science-backed security awareness training, and the expertise of our 24/7 Security Operations Center (SOC).

Book a Demo
Share
Facebook iconTwitter X iconLinkedin iconDownload icon

Sign Up for Huntress Updates

Get insider access to Huntress tradecraft, killer events, and the freshest blog updates.
Privacy • Terms
By submitting this form, you accept our Terms of Service & Privacy Policy
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Huntress Managed Security PlatformManaged EDRManaged EDR for macOSManaged EDR for LinuxManaged ITDRManaged SIEMManaged Security Awareness TrainingManaged ISPMManaged ESPMBook a Demo
PhishingComplianceBusiness Email CompromiseEducationFinanceHealthcareManufacturingState & Local Government
Managed Service ProvidersResellersIT & Security Teams24/7 SOCCase Studies
BlogResource CenterCybersecurity 101Upcoming EventsSupport Documentation
Our CompanyLeadershipNews & PressCareersContact Us
Huntress white logo

Protecting 215k+ customers like you with enterprise-grade protection.

Privacy PolicyCookie PolicyTerms of UseCookie Consent
Linkedin iconTwitter X iconYouTube iconInstagram icon
© 2025 Huntress All Rights Reserved.

Join the Hunt

Get insider access to Huntress tradecraft, killer events, and the freshest blog updates.

By submitting this form, you accept our Terms of Service & Privacy Policy