Flashpoint

15 STATS2 REPORTS

All Statistics

The theft of credentials via information-stealing malware has skyrocketed by 800% since the start of 2025.

FlashpointFlashpoint’s Global Threat Intelligence Index: 2025 Midyear Edition·Jul 31, 2025
InfostealerCredentials

Vulnerability disclosures increased by 246% since the start of 2025.

FlashpointFlashpoint’s Global Threat Intelligence Index: 2025 Midyear Edition·Jul 31, 2025
Vulnerability disclosures

Ransomware has risen by 179% since the start of 2025.

FlashpointFlashpoint’s Global Threat Intelligence Index: 2025 Midyear Edition·Jul 31, 2025
Ransomware

Over the past four months, data breaches surged by 235%.

FlashpointFlashpoint’s Global Threat Intelligence Index: 2025 Midyear Edition·Jul 31, 2025
Data breaches

Publicly-available exploits rose by 179% since the start of 2025.

FlashpointFlashpoint’s Global Threat Intelligence Index: 2025 Midyear Edition·Jul 31, 2025
Publicly-available exploits

Unauthorized access accounted for nearly 78% of all reported data breach incidents

FlashpointFlashpoint’s Global Threat Intelligence Index: 2025 Midyear Edition·Jul 31, 2025
Data breaches

Over 1.8 billion credentials were stolen in the first half of 2025 alone. The 1.8 billion stolen credentials represent an 800% increase.

FlashpointFlashpoint’s Global Threat Intelligence Index: 2025 Midyear Edition·Jul 31, 2025
Credentials

The volume of disclosed vulnerabilities is up by a staggering 246% since February 2025.

FlashpointFlashpoint’s Global Threat Intelligence Index: 2025 Midyear Edition·Jul 31, 2025
Vulnerabilities

N-day vulnerabilities represent over 80% of all Known Exploited Vulnerabilities (KEVs) tracked over the past four years.

FlashpointN-Day Vulnerability Trends: The Shrinking Window of Exposure and the Rise of “Turn-Key” Exploitation ·Feb 11, 2025
VulnerabilitiesExploit TrendsN-Day VulnerabilitiesKEVs

Average Time to Exploit (TTE) declines year-by-year: 745 days in 2020, 518 days in 2021, 405 days in 2022, 296 days in 2023, 115 days in 2024, and 44 days in 2025.

FlashpointN-Day Vulnerability Trends: The Shrinking Window of Exposure and the Rise of “Turn-Key” Exploitation ·Feb 11, 2025
Vulnerability ManagementAverage Time To ExploitTTE

In 2025, 37 N-day vulnerabilities and 52 zero-day vulnerabilities specifically targeted security and perimeter software.

FlashpointN-Day Vulnerability Trends: The Shrinking Window of Exposure and the Rise of “Turn-Key” Exploitation ·Feb 11, 2025
VulnerabilitiesN-Day VulnerabilitiesZero-Day VulnerabilitiesSecurity SoftwarePerimeter Software

Of the 65 CVEs discussed by the BlackBasta ransomware group, 54 are Known Exploited Vulnerabilities (KEVs).

FlashpointN-Day Vulnerability Trends: The Shrinking Window of Exposure and the Rise of “Turn-Key” Exploitation ·Feb 11, 2025
RansomwareVulnerabilitiesBlackBastaCVEs

The Lazarus threat actor group has over 40 distinct designations across the industry.

FlashpointN-Day Vulnerability Trends: The Shrinking Window of Exposure and the Rise of “Turn-Key” Exploitation ·Feb 11, 2025
Threat ActorsAttributionLazarus

Exploit weaponization can occur in under 24 hours.

FlashpointN-Day Vulnerability Trends: The Shrinking Window of Exposure and the Rise of “Turn-Key” Exploitation ·Feb 11, 2025
ExploitationExploit Weaponization

Most large organizations have accurate inventories for only about 25% of their total assets.

FlashpointN-Day Vulnerability Trends: The Shrinking Window of Exposure and the Rise of “Turn-Key” Exploitation ·Feb 11, 2025
Asset ManagementEnterprise SecurityAsset Inventory