• 96% of incidents involving lateral movement ended with the release of ransomware
  • 100% of security incidents involved at least one unprotected or rogue endpoint
  • 1 in 10 detected vulnerabilities had a known exploit
  • Top ransomware families detected included Akira, Qilin, RansomHub, and Cactus
  • The most detected vulnerability dated from 2013 (CVE-2013-2566)
  • 44% of server security breaches involved the clearing of activity logs
  • 34% of cases involving fileless malware used PowerShell as the primary execution method
  • 44% of firewall-related incidents involved password-spraying
  • The average severity score of detected vulnerabilities was 5.9
  • 42% of suspicious privilege escalations added users to high-risk Windows groups