State of Cyber 2025–2026
One year of continuous data collection. Every publicly claimed ransomware attack, every CISA KEV addition, every major breach, and every attributed threat actor — tracked, analyzed, and visualized.
Source: CyberPrism production database. Ransomware: real-time collection via ransomware.live (Mar 2025–Mar 2026). KEV: full CISA catalog enriched with AI analysis; monthly charts show 2025+ additions only. Breaches: RSS feeds and HIBP (seeded May 2025, includes some backfill). Threat actors: cumulative from public threat intelligence.
Ransomware — 8,099 Incidents
Attacks escalated through 2025. Q4 averaged 815 attacks per month versus Q2's 550 — a 48% increase. Qilin grew 10x in 9 months to become the dominant group. Clop returned from a 6-month dormancy with mass exploitation of Oracle E-Business Suite (CVE-2025-61882). TheGentlemen emerged from zero to the fastest-growing group by Q1 2026.
Monthly Ransomware Volume
Top 10 Ransomware Groups
Targeted Sectors
Top 15 Targeted Countries
Day-of-Week Pattern
40% of ransomware incidents have infostealer involvement — stolen credentials are the dominant initial access vector. The ransomware → infostealer → breach pipeline is circular and self-reinforcing.
CISA Known Exploited Vulnerabilities — 294 Added in 2025
CISA's KEV catalog grew 20% in 2025, from 1,239 to 1,533 entries (245 in 2025, 49 more in Q1 2026). Microsoft alone accounts for nearly 1 in 4 actively exploited vulnerabilities across the full catalog. Vendor rankings reflect the complete KEV catalog (since 2021), not just 2025 additions.
Monthly KEV Additions (2025–2026)
Top Vendors in KEV (Full Catalog)
CVE Age When Added to KEV (2025+ additions)
60% of newly added KEVs are from the current year — but 10% are 5+ years old. Attackers don't need zero-days when legacy systems remain unpatched.
Data Breaches — 98 Breaches, 3.88 Billion Accounts
CyberPrism's breach database was seeded in May 2025, backfilling some historical entries alongside new disclosures. The mean breach size is 40.8 million accounts, but the median is just 690K — extreme skew from a handful of billion-record stealer log compilations. Stealer log dumps dominate the top spots, while traditional corporate breaches (Under Armour, Canadian Tire, Coupang) cluster in the 10M–70M range.
Top 15 Breaches by Affected Accounts (Log Scale)
Most Commonly Exposed Data Types
Nearly every breach exposes email and physical addresses. Passwords are exposed in over a third. Financial data (credit cards, SSN) is rarer but devastating when present.
Threat Actors — 72 Mapped, 504 Referenced
CyberPrism's threat actor database is enriched from threat intelligence feeds and public reporting — these are cumulative figures, not limited to 2025 activity. China accounts for over half of all attributed threat actors — more than Russia, North Korea, and Iran combined. The “Big Four” account for 93% of all attributed actors. Notably, Intellexa (commercial spyware) ties Seashell Blizzard (Russia/GRU) for the most CVEs exploited.
Threat Actor Origin Countries
Top CVE Exploiters
Commercial spyware (Intellexa/Predator) is as prolific as nation-state actors in CVE exploitation. Mercenary spyware is no longer a niche concern — it's a top-tier threat.
Cross-Domain Insights
Ransomware + Infostealers
40% of ransomware incidents have infostealer involvement. Combined with 36% of breaches exposing passwords, stolen credentials are the dominant initial access vector. The pipeline is circular and self-reinforcing.
Manufacturing Under Siege
Manufacturing is #1 in ransomware targeting (943 attacks) and #4 in threat actor targeting. High revenue, low security maturity, and OT dependence make it the preferred target for financially motivated attackers.
The Long Tail of Vulnerabilities
10% of 2025's KEV additions were for vulnerabilities 5+ years old. Attackers don't need zero-days when legacy systems remain unpatched. The KEV catalog is as much about historical debt as current threats.
China's Scale Advantage
With 51 attributed threat actors — more than Russia, North Korea, and Iran combined — China operates the largest known state-sponsored cyber capability. Their targeting of Government, Defense, and Technology aligns with strategic intelligence priorities.
Track threats in real-time
CyberPrism delivers personalized vulnerability intelligence, threat actor tracking, and breach monitoring — tailored to your tech stack.