Skip to main content
HomeTopicsAntivirus/Anti-malware

Antivirus/Anti-malware

Cybersecurity statistics about antivirus/anti-malware

Showing 761-780 of 9942 results

Certificate lifetimes are set to shorten to 200 days in 2026, 100 days in 2027, and 47 days by 2029.

CSC12/6/2025
SSL CertificatesCertificate Management

The mean DNS resolution rate for phishing operators was 96.16%, indicating high availability and minimal downtime.

SicuraNext12/6/2025

51.54% of the phishing infrastructure is directly hosted, while 48.46% is protected by CDN/proxy services.

SicuraNext12/6/2025
PhishingPhishing Infrastructure

67% of ransomware reports that provided the communication method indicated that threat actors communicated with their intended targets via messages sent over The Onion Router protocol.

FinCEN12/6/2025
RansomwareRansomware Communication Methods

95% of cybersecurity professionals reported that they have at least one skill need in 2025, marking a 5% increase from 2024.

ISC212/6/2025
Skills GapWorkforce

49% of IT leaders globally either don't track AI usage at all or address AI on a reactive basis.

Cato Networks12/6/2025
Shadow AIAI Governance

77% of payments leaders identify fraud and cybersecurity risks as the primary barriers preventing innovation within their organisations.

ACI Worldwide & Globant12/6/2025
Payments LeadersFraud

Let’s Encrypt, Google®, and Amazon® issued 66% of all analyzed SSL certificates.

CSC12/6/2025
SSL CertificatesCertificate Authorities

Over the past four months, 20 distinct phishing clusters were identified based on shared infrastructure fingerprints.

SicuraNext12/6/2025
PhishingPhishing Infrastructure

In 2024, ransomware incidents reported to FinCEN decreased to 1,476 incidents, reflecting $734 million in the aggregate value of reported payments.

FinCEN12/6/2025

88% of cybersecurity professionals have experienced at least one significant cybersecurity consequence in their organizations due to a skills shortage.

ISC212/6/2025
Skills ShortageWorkforce

73% of organizations report confidentiality with proven technical assurances as a benefit of Confidential Computing.

Confidential Computing Consortium12/6/2025
Confidential ComputingTechnical assurance

61% of IT leaders globally found unauthorized AI tools in their environments.

Cato Networks12/6/2025
Shadow AIAI Governance

9% of IT leaders globally believe their organization has a 'highly effective' defense against AI-generated cyber threats.

Cato Networks12/6/2025
Shadow AIAI Governance

68% of organizations report better regulatory compliance as a benefit of Confidential Computing.

Confidential Computing Consortium12/6/2025
Confidential ComputingRegulatory Compliance

71% of public cloud users are the most likely to implement Confidential Computing technology, compared to 45% of hybrid/distributed cloud users.

Confidential Computing Consortium12/6/2025
Confidential ComputingCloud Computing

13% of organizations reported having strong visibility into how AI systems handle sensitive data.

Cybersecurity Insiders & Cyera12/6/2025
AI ToolsData Security

76% of respondents reported that autonomous AI agents are the hardest systems to secure.

Cybersecurity Insiders & Cyera12/6/2025
AI ToolsAutonomous AI Agents

57% of organizations reported lacking the ability to block risky AI actions in real time.

Cybersecurity Insiders & Cyera12/6/2025
AI ToolsAI Risks

In the last quarter, over 42,000 validated URLs and domains were identified as actively serving phishing kits, command-and-control infrastructure, or payload delivery.

SicuraNext12/6/2025
PhishingPhishing Kits