Skip to main content
HomeTopicsGemini 2.5 Pro

Gemini 2.5 Pro

Cybersecurity statistics about gemini 2.5 pro

Showing 1-20 of 9942 results

In 2025, 36% of AI-related KEVs involved an API attack surface.

Wallarm2/22/2026
AI-related VulnerabilitiesAPI Security

99% of API vulnerabilities are remotely exploitable.

Wallarm2/22/2026
API SecurityRemote Exploitation

In 2025, 17% of 67,058 published vulnerabilities (11,053 vulnerabilities) were API-related.

Wallarm2/22/2026
API SecurityVulnerabilities

72% of organizations experience at least one mobile app security incident in the past year.

Guardsquare2/22/2026
Mobile SecurityApplication Security

Ransomware attacks against industrial organizations increased 64% year-over-year.

Dragos2/22/2026
RansomwareIndustrial Security

Organizations with comprehensive OT visibility detect and contain OT ransomware incidents in an average of 5 days, compared to the industry-wide average of 42 days.

Dragos2/22/2026
Operational TechnologyIncident Response

In June 2025, BAUXITE deployed two custom wiper malware variants against Israeli targets.

Dragos2/22/2026
Wiper MalwareCyber Conflict

The average dwell time for ransomware in OT environments is 42 days.

Dragos2/22/2026
RansomwareOperational Technology

KAMACITE conducted sustained reconnaissance of U.S. industrial devices from March through July 2025.

Dragos2/22/2026
ReconnaissanceOperational Technology

25% of ICS-CERT and NVD vulnerabilities have incorrect CVSS scores.

Dragos2/22/2026
VulnerabilitiesVulnerability Scoring

70% of global ransomware activity targets English-speaking countries.

Nozomi Networks2/22/2026
RansomwareRansomware Targets

In the second half of 2025, 40% of all ransomware attacks targeted US-based companies.

Nozomi Networks2/22/2026
RansomwareRansomware Targets

In the second half of 2025, ransomware attacks against Canada and the UK accounted for a combined 30% of attacks.

Nozomi Networks2/22/2026
RansomwareRansomware Targets

Scattered Spider accounted for 42.9% of all actor-related alerts in the second half of 2025.

Nozomi Networks2/22/2026
Threat ActorsRansomware

Only 2% of organizations in industrial and critical infrastructure environments use enterprise-grade authentication such as 802.1X.

Nozomi Networks2/22/2026
Wireless SecurityAuthentication

62% of security professionals are blind to shadow or undocumented APIs.

Rein Security2/22/2026
APIsApplication Security

73% of SCA users lack visibility into whether flagged vulnerabilities are exploitable in production.

Rein Security2/22/2026
Software Composition AnalysisVulnerability Management

46% of security teams struggle to correlate Model Context Protocol (MCP) actions with execution outcomes.

Rein Security2/22/2026

48% of security teams report blind spots around prompt injection chains or tool-chaining abuse in AI-native applications.

Rein Security2/22/2026
Prompt InjectionAI Security

88% of CISOs and AppSec executives are willing to replace API security solutions.

Rein Security2/22/2026
API SecurityApplication Security