CYBERSECURITY TRENDS AND INTELLIGENCE
The threat intelligence report built to sharpen defenses
Read report
Key Findings
What’s in the threat report (and why you should care)
- Identity-based attacks remain the most frequent and persistent threat in this year’s report. In 2025, nearly half (47.7%) of all identity incidents resulted in attackers successfully gaining account access using stolen credentials.
- Endpoint attacks made up 29% of all incidents, and were less about innovation and more about refinement. Attackers stuck with what worked. Malware remained the dominant threat, with well-tested delivery methods like ClickFix and backdoored productivity apps.
- Cloud infrastructure threats may be low in volume (2.5% of incidents), but they’re high in risk. The presence of “lesser” threats like cryptocurrency miners often point to larger security gaps that must be addressed.

Timeline
Cybersecurity events in 2025
There’s never a dull moment in cybersecurity. This timeline chronologically lays out the hottest cyber news and intel, alongside trends that we experienced within Expel’s SOC.
BY THE NUMBERS
What Expel's SOC saw in 2025
Expel analysts have reviewed a full 365 days of incident data spanning 160+ cybersecurity tools and multiple attack surfaces. Here's what this threat intelligence report uncovered:
68.6%
Of incidents were identity attacks, down slightly from 2025.
47.7%
Of identity attacks resulted in successful authentication.
29%
Of all incidents were endpoint attacks–and over half of those were malware.
2.5%
Of all incidents were cloud infrastructure attacks. But don’t be fooled. They’re low volume—high risk.
About this research: Expel analysts reviewed security incidents investigated by Expel’s 24×7 SOC between January 1 and December 31, 2025, across 160+ cybersecurity tools and multiple attack surfaces—including identity, endpoint, cloud, and email environments. Findings represent real-world threat activity observed across Expel’s managed customer base.
