Key Takeaways
- In 2023, ransomware attacks increased by 93% year-over-year, affecting over 2,200 organizations globally.
- Phishing remains the top initial access vector, involved in 36% of breaches according to the 2024 DBIR.
- DDoS attacks surged by 117% in 2023, with over 10 million incidents recorded.
- The average time to identify a breach was 204 days in 2023.
- Healthcare sector saw average breach cost of $10.93 million in 2023.
- 82% of breaches involved compromised identities.
- Phishing emails rose 58% to 3.4 billion in 2023.
- 90% of breaches start with phishing.
- Spear-phishing success rate is 70% higher than generic.
- Global cyber investment reached $188 billion in 2023.
- 93% of orgs increased security budgets in 2024.
- Zero-trust adoption grew to 81% of enterprises.
- 28,000 CVEs published in 2023, highest ever.
- 23% of vulnerabilities rated critical (CVSS 9.0+).
- Heartbleed (CVE-2014-0160) affected 17% of HTTPS servers.
Ransomware and phishing surged in 2023, driven by stolen credentials and rising human error.
Cyber Threats
Cyber Threats Interpretation
Data Breaches
Data Breaches Interpretation
Phishing
Phishing Interpretation
Security Investments
Security Investments Interpretation
Vulnerabilities
Vulnerabilities Interpretation
How We Rate Confidence
Every statistic is queried across four AI models (ChatGPT, Claude, Gemini, Perplexity). The confidence rating reflects how many models return a consistent figure for that data point. Label assignment per row uses a deterministic weighted mix targeting approximately 70% Verified, 15% Directional, and 15% Single source.
Only one AI model returns this statistic from its training data. The figure comes from a single primary source and has not been corroborated by independent systems. Use with caution; cross-reference before citing.
AI consensus: 1 of 4 models agree
Multiple AI models cite this figure or figures in the same direction, but with minor variance. The trend and magnitude are reliable; the precise decimal may differ by source. Suitable for directional analysis.
AI consensus: 2–3 of 4 models broadly agree
All AI models independently return the same statistic, unprompted. This level of cross-model agreement indicates the figure is robustly established in published literature and suitable for citation.
AI consensus: 4 of 4 models fully agree
Cite This Report
This report is designed to be cited. We maintain stable URLs and versioned verification dates. Copy the format appropriate for your publication below.
Marcus Engström. (2026, February 13). Computer Security Statistics. Gitnux. https://gitnux.org/computer-security-statistics
Marcus Engström. "Computer Security Statistics." Gitnux, 13 Feb 2026, https://gitnux.org/computer-security-statistics.
Marcus Engström. 2026. "Computer Security Statistics." Gitnux. https://gitnux.org/computer-security-statistics.
Sources & References
- Reference 1VERIZONverizon.com
verizon.com
- Reference 2CLOUDFLAREcloudflare.com
cloudflare.com
- Reference 3CROWDSTRIKEcrowdstrike.com
crowdstrike.com
- Reference 4AKAMAIakamai.com
akamai.com
- Reference 5AV-TESTav-test.org
av-test.org
- Reference 6NETSCOUTnetscout.com
netscout.com
- Reference 7MANDIANTmandiant.com
mandiant.com
- Reference 8IBMibm.com
ibm.com
- Reference 9MICROSOFTmicrosoft.com
microsoft.com
- Reference 10SOPHOSsophos.com
sophos.com
- Reference 11UNIT42unit42.paloaltonetworks.com
unit42.paloaltonetworks.com
- Reference 12PALOALTONETWORKSpaloaltonetworks.com
paloaltonetworks.com
- Reference 13CISCOcisco.com
cisco.com
- Reference 14IC3ic3.gov
ic3.gov
- Reference 15CVEDETAILScvedetails.com
cvedetails.com
- Reference 16RAPID7rapid7.com
rapid7.com
- Reference 17PROGRESSprogress.com
progress.com
- Reference 18IDENTITYTHEFTCENTERidentitytheftcenter.org
identitytheftcenter.org
- Reference 19FTCftc.gov
ftc.gov
- Reference 20CISAcisa.gov
cisa.gov
- Reference 21HHShhs.gov
hhs.gov
- Reference 22ITGOVERNANCEitgovernance.eu
itgovernance.eu
- Reference 23STANLEYBLACKANDDECKERstanleyblackanddecker.com
stanleyblackanddecker.com
- Reference 24MGMRESORTSmgmresorts.com
mgmresorts.com
- Reference 25RISKBASEDSECURITYriskbasedsecurity.com
riskbasedsecurity.com
- Reference 26FLEXERAflexera.com
flexera.com
- Reference 27HEARTBLEEDheartbleed.com
heartbleed.com
- Reference 28TENABLEtenable.com
tenable.com
- Reference 29SHADOWSERVERshadowserver.org
shadowserver.org
- Reference 30VERACODEveracode.com
veracode.com
- Reference 31MSRCmsrc.microsoft.com
msrc.microsoft.com
- Reference 32GOOGLEPROJECTZEROgoogleprojectzero.blogspot.com
googleprojectzero.blogspot.com
- Reference 33NVDnvd.nist.gov
nvd.nist.gov
- Reference 34GREENBONEgreenbone.net
greenbone.net
- Reference 35BITSIGHTbitsight.com
bitsight.com
- Reference 36SUPPORTsupport.apple.com
support.apple.com
- Reference 37CYBEREASONcybereason.com
cybereason.com
- Reference 38APWGapwg.org
apwg.org
- Reference 39PROOFPOINTproofpoint.com
proofpoint.com
- Reference 40KNOWBE4knowbe4.com
knowbe4.com
- Reference 41LOOKOUTlookout.com
lookout.com
- Reference 42FBIfbi.gov
fbi.gov
- Reference 43DARKTRACEdarktrace.com
darktrace.com
- Reference 44MCAFEEmcafee.com
mcafee.com
- Reference 45PONEMONponemon.org
ponemon.org
- Reference 46ZSCALERzscaler.com
zscaler.com
- Reference 47MARKETSANDMARKETSmarketsandmarkets.com
marketsandmarkets.com
- Reference 48GRANDVIEWRESEARCHgrandviewresearch.com
grandviewresearch.com
- Reference 49GARTNERgartner.com
gartner.com
- Reference 50OKTAokta.com
okta.com
- Reference 51FORTUNEBUSINESSINSIGHTSfortunebusinessinsights.com
fortunebusinessinsights.com
- Reference 52ESECURITYPLANETesecurityplanet.com
esecurityplanet.com
- Reference 53PWCpwc.com
pwc.com
- Reference 54IDCidc.com
idc.com
- Reference 55MARSHmarsh.com
marsh.com
- Reference 56SPLUNKsplunk.com
splunk.com
- Reference 57ISC2isc2.org
isc2.org
- Reference 58SANSsans.org
sans.org
- Reference 59FIREEYEfireeye.com
fireeye.com
- Reference 60TRANSPARENCYREPORTtransparencyreport.google.com
transparencyreport.google.com
- Reference 61SECsec.gov
sec.gov
- Reference 62BLOGblog.twilio.com
blog.twilio.com
- Reference 63SYNOPSYSsynopsys.com
synopsys.com
- Reference 64ZERODAYINITIATIVEzerodayinitiative.com
zerodayinitiative.com
- Reference 65SONATYPEsonatype.com
sonatype.com
- Reference 66MELTDOWNATTACKmeltdownattack.com
meltdownattack.com
- Reference 67QUALYSqualys.com
qualys.com
- Reference 68PTSECURITYptsecurity.com
ptsecurity.com
- Reference 69IVANTIivanti.com
ivanti.com
- Reference 70ADOBEadobe.com
adobe.com
- Reference 71PHISHMEphishme.com
phishme.com
- Reference 72HELPNETSECURITYhelpnetsecurity.com
helpnetsecurity.com
- Reference 73ZDNETzdnet.com
zdnet.com
- Reference 74INTERPOLinterpol.int
interpol.int
- Reference 75BARRACUDAbarracuda.com
barracuda.com
- Reference 76DILIGENTdiligent.com
diligent.com
- Reference 77EXABEAMexabeam.com
exabeam.com
- Reference 78SWISSREswissre.com
swissre.com







