Ransomware, espionage and data breaches? Yep – Verizon just dropped a 117-page thriller

After Verizon's Q1 earnings report, the US's largest mobile carrier followed up with another eye-opening update on online security and the outlook isn't looking great.
Verizon has just dropped its annual Data Breach Investigations Report and this year, it has gone all out with data collection. The company has analyzed over 12,000 confirmed breaches, providing deep insights into trends like ransomware attacks and espionage-driven breaches.
The key takeaways from Verizon's 117-page Data Breach Investigations Report? Things are getting worse on pretty much every front. For starters, there has been a 34% spike in attacks that exploit system vulnerabilities – zero-day exploits are especially on the rise, hitting perimeter hardware and VPNs hard. Ransomware isn't slowing down either, now showing up in 44% of breaches – up 37% from last year – even though the average payout actually dropped.
One of the more concerning trends? Breaches involving third parties have doubled, jumping from 15% to 30%. This throws a spotlight on the dangers lurking in supply chains and partner networks. Human error is still a major player, too, with around 60% of breaches involving people in some way – social engineering and credential abuse are the usual suspects.
There were also a few standout cases involving credential reuse in third-party environments. One stat that really pops: when secrets were leaked on GitHub, it took a median of 94 days to fix the issue. Verizon also found that 30% of compromised systems tied to info-stealer malware were clearly company-owned, but nearly half of them weren't managed properly and contained both personal and work logins. That is a big red flag, especially in BYOD setups or when employees stretch company policies.
Espionage-motivated breaches are creeping up, too, now making up 17% of all cases. But here is the twist – about 28% of incidents tied to state-sponsored groups weren't about spying at all but were financially motivated.
And, of course, AI is starting to show up in the mix. While generative AI hasn't taken over the world (yet), threat actors are already using it. One of Verizon's partners noted that AI-generated content in malicious emails has doubled in the last two years.
Verizon has just dropped its annual Data Breach Investigations Report and this year, it has gone all out with data collection. The company has analyzed over 12,000 confirmed breaches, providing deep insights into trends like ransomware attacks and espionage-driven breaches.
The DBIR's findings underscore the importance of a multi-layered defense strategy. Businesses need to invest in robust security measures, including strong password policies, timely patching of vulnerabilities, and comprehensive security awareness training for employees.
– Chris Novak, Vice President, Global Cybersecurity Solutions, Verizon Business, April 2025
This year's DBIR findings reflect a mixed bag of results. Glass-half-full types can celebrate the rise in the number of victim organisations that did not pay ransoms with 64% not paying vs 50% two years ago. The glass-half empty personas will see in the DBIR that organisations that don't have the proper IT and cybersecurity maturity – often the SMB sized organisations, are paying the price for their size with ransomware being present in 88% of breaches. While there is no magic pill to swallow that will alleviate the pain of cybersecurity attacks, Verizon's leadership in educating the public on the types of attacker motives, tactics and techniques is a key head start in raising global awareness and cyber readiness.
– Craig Robinson, Research Vice President, Security Services at IDC, April 2025
Espionage-motivated breaches are creeping up, too, now making up 17% of all cases. But here is the twist – about 28% of incidents tied to state-sponsored groups weren't about spying at all but were financially motivated.
And, of course, AI is starting to show up in the mix. While generative AI hasn't taken over the world (yet), threat actors are already using it. One of Verizon's partners noted that AI-generated content in malicious emails has doubled in the last two years.
Plus, 15% of employees are hitting up GenAI tools from their work devices at least every couple of weeks. Alarmingly, a significant portion of these employees were using non-corporate emails (72%) or corporate emails without proper authentication (17%), suggesting that many are bypassing corporate policies.
Now, if you think about it, you have probably encountered a data breach, phishing attack, or scam at least once. T-Mobile's users, for example, are already receiving their disappointing data breach settlement checks. Verizon itself has faced its own breaches in the past, including one where a subsidiary paid $16 million after three breaches exposed subscribers to attacks.
On the bright side, Verizon Business recently rolled out a new cybersecurity solution called Trusted Connection. It is built to give companies stronger protection across the board – from devices and networks to cloud apps. But still, based on these numbers, it's clear we're going to need every tool we can get.
On the bright side, Verizon Business recently rolled out a new cybersecurity solution called Trusted Connection. It is built to give companies stronger protection across the board – from devices and networks to cloud apps. But still, based on these numbers, it's clear we're going to need every tool we can get.
Things that are NOT allowed: