Vulnerability exploitation led to malware deployment as a follow-up activity in 68% of cases.
Vulnerability exploitation led to malware deployment as a follow-up activity in 68% of cases. — This cybersecurity statistic was published by ENISA in October 2025. It covers topics including Europe, Vulnerability exploitation, Malware. The original data appears in ENISA Threat Landscape 2025. For the full methodology and detailed findings, refer to the original report.
Share or Copy this stat
Frequently Asked Questions
What does this statistic say?
Vulnerability exploitation led to malware deployment as a follow-up activity in 68% of cases. This data was published by ENISA and covers Europe, Vulnerability exploitation, Malware.
Where does this data come from?
This statistic comes from ENISA Threat Landscape 2025, published by ENISA on October 1, 2025. You can view the original report at https://www.enisa.europa.eu/publications/enisa-threat-landscape-2025.
What cybersecurity topics does this cover?
This statistic relates to Europe, Vulnerability exploitation, Malware. Browse more statistics on Europe or from ENISA.