Security Report

Awesome Annual Security Reports

Source: Awesome Annual Security Reports
The reports in this collection are limited to content which does not require a paid subscription, membership, or service contract. https://github.com/jacobdjwilson/awesome-annual-security-reports/

Definition: The cybersecurity landscape is constantly evolving, making it hard for CIOs, CISOs, and security leaders to keep up. They’re flooded with annual reports from research consultancies, industry working groups, non-profits, and government agencies, and sifting through marketing material to find actionable insights is a major challenge. This list aims to cut through the noise by providing a vendor-neutral resource for the latest security trends, tools, and partnerships. It curates information from trusted sources, making it easier for security leaders to make informed decisions.

Disclaimer: The reports in this collection are limited to content which does not require a paid subscription, membership, or service contract. There are a variety of different business models and drivers that would cause information to be put behind a paywall, I would like to respect those companies and individuals. Consult the original authors for licensing of any report content.

Limitations: This is not a repository for project-specific documents such as white papers, intelligence reports, technical specifications, or standards. While all user-submitted uploads or report requests are welcome, we should draw a box around this awesome list.

Accessibility When possible, all reports will be sourced from their original authors and uploaded to Hybrid Analysis via GitHub action to provide an added level of confidence. The resulting analysis link will be included in the PDF commit notes. Additionally, all PDF reports will be converted to Markdown using AI, based on the AI Prompts defined in this repository.

Acknowledgement: I would like to give recognition for other works that inspired this collection. Richard Stiennon produces an annual, comprehensive industry analysis that surpasses the scope of this list and deserves attention. Additionally, Rick Howard‘s cyber cannon list of must-read books is an invaluable resource, catering to both leadership and practitioner levels within the field.


  • SearchLightCyber: The Correlation Between Dark Web Exposure and Cybersecurity Risk 2025

    The Marsh McLennan and Searchlight Cyber study shows a clear, statistically significant correlation between an organization’s exposure on multiple dark web sources and an increased likelihood of suffering a cyber incident within 12 months. The report highlights that specific indicators—especially Compromised Users and Dark Web Market Listings—carry the largest individual risk multipliers and that combining…

  • RecordedFuture Payment Fraud Intelligence Report 2025

    The report documents an increasingly industrialized payment-fraud landscape in 2025, driven by scalable Magecart e-skimmers, large purchase-scam networks, OTP interception, and growing AI enablement that together expand attack surfaces and complicate liability. Recommended defenses emphasize intelligence-driven, cross-functional fusion of CTI and fraud operations, proactive detection, and AI-assisted predictive controls. #Magecart #AcceptCar

  • Visa Biannual Threats Report 2025

    The Visa Biannual Threats Report (July–December 2024) details rising payments ecosystem threats—enumeration, provisioning fraud, malicious mobile apps, NFC relay attacks, digital skimming, ransomware, and consumer-targeted scams—while describing Visa PERC’s detection, disruption, and mitigation capabilities. Key metrics include a 22% increase in enumeration transactions, about US$1.1B in follow-on fraud from enumeration over a year, US$357M in…

  • SANS SOC Survey 2025

    The 2025 SANS SOC Survey evaluates how modern SOCs are staffed, structured, and equipped, highlighting persistent strengths (widespread 24/7 coverage, strong EDR adoption) alongside recurring gaps (staffing shortages, manual metrics, and uncoordinated AI/ML use). The report emphasizes reactive incident response, widespread SIEM data dumping, and growing—but uneven—cloud and AI integration across vendors and product briefings.…

  • SecurityScorecard Third-Party Breach Report 2025

    The 2025 SecurityScorecard Global Third-Party Breach Report analyzes 1,000 breaches and finds that 35.5% of 2024 incidents originated via third parties, a 6.5% rise from 2023, underscoring growing supply‑chain exposure and attacker emphasis on vendor access. The report highlights file transfer software, cloud services, state‑sponsored supply‑chain campaigns (notably linked to Chinese groups), prolific ransomware actors…

  • Mimecast: The State of Human Risk 2025

    The 2025 State of Human Risk report shows that human behavior—not technology gaps—is now the dominant driver of breaches, with attackers leveraging AI-powered phishing, collaboration tools, and credential misuse to bypass traditional defenses. High-impact incidents such as the Change Healthcare breach illustrate the massive financial and operational consequences and underscore the urgent need for Human…

  • K7Security Cyber Threat Monitor Report 2025

    K7Security’s Q2 2025-26 Cyber-Threat-Monitor highlights a 19% global Infection Rate driven by persistent exploitation of legacy flaws (notably MS17-010/EternalBlue), widespread adware and hack-tool prevalence on Windows, and dominant Trojan activity on Android (86%) and macOS (88%). Executive findings emphasize “vulnerability debt,” human-centric phishing, supply-chain and edge-device attacks, and recommendations to prioritize patching, MFA, behavioral detection,…

  • Rapid7 Threat Landscape Report Q3 2025

    The Q3 2025 Rapid7 Threat Landscape Report documents accelerating zero-day and mass-exploitation activity, consolidation and innovation among ransomware groups (notably Qilin), increasing supply-chain and nation‑state espionage, and the operationalization of AI for social engineering and evasive malware. Major metrics include 53 newly observed exploited CVEs, 88 active ransomware leak-site groups, and U.S. victims accounting for…

  • Eset Threat Report 2025

    The H1 2025 ESET Threat Report documents rapid shifts in the threat landscape—highlighting the explosive rise of ClickFix social engineering, SnakeStealer’s emergence as the top infostealer, Android adware surges driven by Kaleidoscope, and a dramatic increase in NFC fraud. It also covers coordinated disruptions of Lumma Stealer and Danabot, growing ransomware infighting (including RansomHub and…

  • Descope State of Customer Identity Report 2025

    The report highlights a clear industry shift toward phishing-resistant, passwordless authentication and shows how identity strategy is increasingly tied to user experience and regulatory requirements. Key stats and trends call out broad passwordless adoption and rising threats like AI-driven social engineering that require adaptive, behavior-based defenses. #Descope #Passkeys

  • BioCatch Global Scams Report 2025

    BioCatch’s Global Scams Report 2025 documents a rapid, global escalation in authorized push payment (APP) scams driven by real-time payments, social engineering, and GenAI-enabled scaling, and highlights the industrialization of fraud including trafficked scam compounds. The report pairs regional breakdowns, hard statistics, and a case study to show steep rises in vishing, smishing, romance, and…

  • AppOmni State of SaaS Security Report 2025

    The State of SaaS Security 2025 Report documents a sharp rise in SaaS-related incidents despite widespread confidence in protections, highlighting misconfigurations, permission issues, and weak continuous oversight as primary drivers. The report urges a shift to continuous monitoring, clear ownership, and governance for AI-enabled integrations to close the gap between perceived visibility and actual security.…

  • OPSWAT State of File Security Report 2025

    This Ponemon Institute report, sponsored by OPSWAT, summarizes survey responses from 612 U.S. IT and security practitioners about file security risks, controls, technologies, and AI adoption. Key takeaways include high incident frequency and cost (average $2.7M), dominant insider and file-visibility risks, concern over macro-based and zero-day malware, and increasing use of CDR, DLP, multiscanning, SBOMs,…

  • Latio AI Security Report 2025

    Latio’s 2025 AI Security Market Report cuts through marketing-driven confusion to map a fragmented AI security landscape, define four primary use-case categories, and explain the specific risks each category addresses. It highlights how VC-fueled hype has blurred vendor distinctions, stresses that tool choice should be guided by an organization’s risk profile, technology stack, and priorities,…

  • GuidePoint Identity and Access Management Maturity Report 2025

    The GuidePoint / Ponemon 2025 Identity and Access Management (IAM) Maturity Report finds most organizations remain in early-to-mid IAM maturity, with pervasive manual processes, underinvestment in IAM, and 50% of organizations experiencing an identity-based security incident in the prior 12 months. High performers (23% of respondents) show measurable benefits from automation and advanced identity technologies,…

  • Hiya: State of the Call 2025

    Hiya’s State of the Call 2025 analyzes 262.8 billion calls and surveys of 12,003 consumers, 1,802 workers, and 600 IT/security leaders to highlight five major voice-call trends: ongoing reliance on voice, pervasive trust and security issues, a sharp rise in AI-generated deepfakes, measurable financial losses, and gaps in protective investments. The report finds 25% of…

  • Elastic State of Detection Engineering 2025

    The 2025 State of Detection Engineering at Elastic summarizes detection engineering work from October 2023 to October 2024, covering real-world incident responses, rule development lifecycles, CI/Detections-as-Code practices, and extensive telemetry and integration enhancements across endpoint, cloud, and SaaS platforms. Key highlights include rapid coverage for the CUPS RCE disclosures, detection and analysis of activity group…

  • TRM Global Crypto Policy Review Outlook 2025

    TRM Labs’ Global Crypto Policy Review & Outlook 2025/26 surveys policy developments across 30 jurisdictions, showing stablecoins at the center of regulatory efforts, rising institutional adoption, and clearer rules reducing illicit activity among regulated VASPs. The report highlights critical incidents and coordination gaps—most notably North Korea’s $1.5 billion hack of Bybit—and calls for consistent cross-jurisdictional…

  • Yubico Global State of Authentication Report 2025

    Yubico’s 2025 Global State of Authentication report exposes a large gap between perceived and actual authentication security: employees and organizations rely heavily on passwords and SMS while many lack up-to-date training, and AI-driven attacks are increasing both threat sophistication and user concern. The report urges widespread MFA adoption—especially device-bound passkeys and hardware security keys—supported by…

  • N2K WiCyS Cyber Talent Study 2025

    The 2025 WiCyS Cyber Talent Study, analyzed by skillrex using an N2K diagnostic mapped to the NICE Framework, evaluates 604 WiCyS members and finds the community outperforming peers across most NICE Categories and many Specialty Areas. The report shows a roughly 4‑point composite advantage (~10%), highlights strong leadership and governance capabilities and measurable gains from…


More Report: https://www.hendryadrian.com/category/security-report