Skip to main content
HomeTopicsRead.ai

Read.ai

Cybersecurity statistics about read.ai

Showing 401-420 of 9942 results

68% of enterprise leaders use SIEM integration for visibility of backbone traffic.

Arelion2/5/2026
Security MonitoringNetwork Visibility

77% of enterprise leaders say data sovereignty requirements heavily influence their choice of backbone provider.

Arelion2/5/2026
Data SovereigntyNetwork Infrastructure

85% of hackers believe reporting critical vulnerabilities is more important than making money.

Bugcrowd2/5/2026
Responsible DisclosureEthics

Women represent just 5% of the hacker community.

Bugcrowd2/5/2026

Cyber criminals are responsible for nearly six times more cyber incidents than state-sponsored actors.

Forescout Technologies Inc2/5/2026
CybercrimeState-Sponsored Threats

Exploits against IoT devices increase from 16% to 19%, with IP cameras and NVRs the most frequent targets.

Forescout Technologies Inc2/5/2026
IoT SecurityIP Cameras

Exploits targeting network infrastructure devices represent 19% of all observed exploits, making them the second most common attack category.

Forescout Technologies Inc2/5/2026
Network DevicesInfrastructure Security

Two of the top 10 most exploited Autonomous Systems from 2024 drop off the top-10 list in 2025, while three new Autonomous Systems had not previously ranked in the top 500.

Forescout Technologies Inc2/5/2026

242 vulnerabilities are added to the CISA Known Exploited Vulnerabilities catalog, a 30% year-over-year increase, and 285 vulnerabilities are added to the Vedere Labs KEV, a 213% year-over-year increase.

Forescout Technologies Inc2/5/2026
VulnerabilitiesKEV

Discovery activity accounts for 91% of post-exploitation actions, up from 25% in 2023.

Forescout Technologies Inc2/5/2026

48% of enterprise leaders are not fully confident they could demonstrate compliance with data protection regulations.

Arelion2/5/2026
Regulatory ComplianceData Protection

Only 52% of enterprise leaders feel very confident about the security of data travelling across their own networks.

Arelion2/5/2026
Network SecurityData Protection

Attacks using OT protocols surge by 84%, led by Modbus (57%), Ethernet/IP (22%), and BACnet (8%).

Forescout Technologies Inc2/5/2026
Operational TechnologyOT Protocols

62% of organizations experience deepfake incidents.

Vention2/5/2026
DeepfakesCybersecurity

98% of hackers remain proud of their work.

Bugcrowd2/5/2026

81% of banks experienced at least one unauthorized network access incident in the past year.

Wipfli2/5/2026
BanksFinancial industry

16% of banks have an enterprise-wide AI roadmap.

Wipfli2/5/2026
BanksFinancial industry

32% of cybersecurity leaders report AI-related attacks.

Vention2/5/2026
CybersecurityAI Attacks

Only 28% of leaders in France feel certain they meet regulatory requirements, compared to 60% in the UK.

Arelion2/5/2026
Regulatory ComplianceFrance

56% of hackers say geopolitics now outweighs pure curiosity as a driving factor in hacking.

Bugcrowd2/5/2026
GeopoliticsMotivation