Skip to main content
HomeTopicsEmail

Email

We've curated 128 cybersecurity statistics about Email to help you understand how phishing attacks, spam filters, and encryption practices are evolving in 2025, ensuring your communication remains secure in an increasingly digital world.

Showing 101-120 of 128 results

In attachment-based campaigns, people were most likely to open certain file types: PDFs (53%), HTML files (28.5%), Word files (18.5%).

KnowBe44/28/2025
PhishingImpersonation

Bitcoin sextortion scams account for 12% of malicious PDF attachments.

Barracuda4/28/2025
ScamSextortion

68.6% of clicked links involved domain spoofing.

KnowBe44/28/2025
PhishingImpersonation

Link usage accounted for 75% of phishing attempts in Q1 2024.

VIPRE Security Group4/28/2025
Phishing

Link usage dropped by 42% in Q1 2025 compared to Q1 2024.

VIPRE Security Group4/28/2025
Phishing

Callback scams now account for nearly one in five attempts.

VIPRE Security Group4/28/2025
Scam

83% of malicious Microsoft documents contain QR codes designed to take users to phishing websites.

Barracuda4/28/2025
MicrosoftQR

As many as 20% of organizations experienced at least one attempted or successful account takeover (ATO) incident per month.

Barracuda4/28/2025
ATO

92% of the emails processed by VIPRE were spam.

VIPRE Security Group4/28/2025
Spam

Callback phishing accounted for 16% of phishing attempts in Q1 2025.

VIPRE Security Group4/28/2025
Phishing

SVG files are used in 34% of phishing attacks as favoured attachments.

VIPRE Security Group4/28/2025
PhishingSVG

PDF attachments are used in 36% of phishing attacks as favoured attachments

VIPRE Security Group4/28/2025
PhishingPDF

47% of email domains do not have Domain-based Message Authentication, Reporting and Conformance (DMARC) configured to protect against unauthorized use, including spoofing and impersonation attacks.

Barracuda4/28/2025
DMARC

60.7% of the phishing simulations that were clicked mentioned an internal team.

KnowBe44/28/2025
PhishingImpersonation

Internal communications are a significant driver of phishing failures. Emails impersonating internal teams, particularly HR and IT, received the most failures in phishing simulations.

KnowBe44/28/2025
PhishingHR

23% of HTML email attachments are malicious, making them the most weaponized text file type detected. More than three-quarters of the malicious files detected overall were HTML files.

Barracuda4/28/2025
HTML

68% of malicious PDF attachments contain QR codes designed to take users to phishing websites.

Barracuda4/28/2025
PDFQR

49.7% of clicked phishing simulations mentioned HR.

KnowBe44/28/2025
PhishingImpersonation

In attachment-based campaigns, people were most likely to open certain file types: PDFs (53%), HTML files (28.5%), Word files (18.5%).

KnowBe44/28/2025
PhishingImpersonation

35.9% of AI-generated content flows into email and messaging platforms.

Cyberhaven4/23/2025
AI