Introduction
Top threats
The following chart illustrates the specific threats Red Canary detected most frequently across our customer environments in 2024.
In addition to the top 10, read our Field Guide to the other threat clusters that our Intelligence team is tracking.
We ranked these threats by the percentage of customer organizations affected to prevent a single, major security event from skewing the metrics. We excluded threat detections associated with customer confirmed testing.
As discussed in our Methodology section, we choose to define “threats” broadly as malware, tools, threat groups, or activity clusters – in short, any suspicious or malicious activity that represents a risk to you or your organization
These are the most prevalent threats occurring in our customer environments, so we can assume they are prevalent elsewhere. We include advice for responding to each threat and offer detection opportunities so you can better defend your organization. Some defenders may be able to take our detection guidance and apply it directly, while others may not. Regardless, defenders without a detection engineering function can still make use of the actionable analysis of each threat written by our Intelligence experts.