VendorsCISA
CISA
Cybersecurity reports and statistics published by CISA
8 categories1 reports
Research Reports
Reports and publications from CISA
Recent Statistics & Reports
Average remediation time for critical-severity KEVs improved by 50%, reducing from 60 days to 30 days.
1/1/2025•
KEV
Only 2% of organizations implemented DMARC, SPF, and STARTTLS together for their email security.
1/1/2025•
Email securityDMARCSPF
The five most commonly exploited services in critical infrastructure sectors were File Transfer Protocol (FTP), Remote Desktop Protocol (RDP), Remote Procedure Call (RPC), Server Message Block (SMB), Internet Relay Chat (IRC).
1/1/2025•
Exploitable services
SSL vulnerability remediation times improved significantly, dropping from 200 days in August 2022 to under 50 days in 2024.
1/1/2025•
SSL
Top publicly exposed OT/ICS protocols observed in 2024 included Open Platform Communications Unified Architecture (OPC UA) – 43%, Distributed Network Protocol (DNP) – 22%, Niagara-Fox – 21%, Ethernet/IP – 10%, Modbus – 4%.
1/1/2025•
OTICS
Five sectors with the highest occurrences of exposed OT protocols were: Government Facilities – 63%, Information Technology – 10%, Energy – 10%, Healthcare and Public Health – 5%, Financial Services – 4%.
1/1/2025•
OT
79% of private sector organizations reduced exploitable services, while SLTT (State, Local, Tribal, and Territorial) entities experienced a 95% increase in exploitable services over the analysis period.
1/1/2025•
Exploitable servicesPrivate sector
Organizations enrolled in CISA’s Vulnerability Scanning service saw a steady decline in KEVs on their networks.
1/1/2025•
KEV
Cisco-related vulnerabilities accounted for 9.8% of all observed KEVs.
1/1/2025•
KEV
Cyber Hygiene (CyHy) service enrollment increased by 201% from August 2022 to August 2024. The highest enrollment increases were observed in the following sectors: communications (300% increase), emergency services (268% increase), critical manufacturing (243% increase), water and wastewater systems (242%).
1/1/2025•
Cyber hygiene
45% of all vulnerabilities detected were SSL misconfigurations, but this percentage dropped to 33.5% by mid-2024.
1/1/2025•
MisconfigurationSSLVulnerabilities
1% of organizations had no email security controls.
1/1/2025•
Email security
SSL remediation time decreased from 197 days in August 2022 to just 12 days in August 2024.
1/1/2025•
SSL
Cloud service providers began offering automated security.txt file generation to improve adoption.
1/1/2025•
Cloud
The number of exploitable services per organization decreased from 12 in August 2022 to 8 in August 2024.
1/1/2025•
Exploitable services
SMB vulnerabilities declined by 72%, while RPC accounted for 92% of all exploitable service tickets.
1/1/2025•
SMBVulnerabilities
International entities experienced a 65% decrease in exploitable service instances.
1/1/2025•
Exploitable services
Only 2% of organizations implemented DMARC, SPF, and STARTTLS together for their email security.
1/1/2025•
Email securityDMARCSPF
Government Services and Facilities had the highest OT protocol exposure, at 63%.
1/1/2025•
OT
Most security.txt files were hosted on port 443 (46%), while 18% were on unsecured ports like 80 and another 18% were on pots like 8080 that are not as safe but can be configured manually to support the necessary encryption.
1/1/2025•
security.txtPort 443
Showing first 20 results