Executive Summary: 2025 Threat Detection Report
This report gives you a curated snapshot of what we observed across our customers’ environments so you can:
- Get up to speed on the changing cyber threat landscape
- Adjust your strategic planning and cybersecurity program roadmap
- Take control of your attack surface with recommended actions
Your guide to the year’s cyber threats and risks
Key trends, top 10 threats, and the most prevalent adversary techniques that evaded expansive security controls—giving you insights to prioritize and focus.
- 93,000 higher severity threats analyzed
- 4x increase in identity-enabled attacks
- Infostealers are surging
- LLMJacking attacks target cloud infrastructure
- 3 of the top 5 techniques are cloud-native