Skip to main content

CISA

Cybersecurity reports and statistics published by CISA

8 categories1 reports

Research Reports

Reports and publications from CISA

Recent Statistics & Reports

Average remediation time for critical-severity KEVs improved by 50%, reducing from 60 days to 30 days.

1/1/2025
KEV

Only 2% of organizations implemented DMARC, SPF, and STARTTLS together for their email security.

1/1/2025
Email securityDMARCSPF

The five most commonly exploited services in critical infrastructure sectors were File Transfer Protocol (FTP), Remote Desktop Protocol (RDP), Remote Procedure Call (RPC), Server Message Block (SMB), Internet Relay Chat (IRC).

1/1/2025
Exploitable services

SSL vulnerability remediation times improved significantly, dropping from 200 days in August 2022 to under 50 days in 2024.

1/1/2025
SSL

Top publicly exposed OT/ICS protocols observed in 2024 included Open Platform Communications Unified Architecture (OPC UA) – 43%, Distributed Network Protocol (DNP) – 22%, Niagara-Fox – 21%, Ethernet/IP – 10%, Modbus – 4%.

1/1/2025
OTICS

Five sectors with the highest occurrences of exposed OT protocols were: Government Facilities – 63%, Information Technology – 10%, Energy – 10%, Healthcare and Public Health – 5%, Financial Services – 4%.

1/1/2025
OT

79% of private sector organizations reduced exploitable services, while SLTT (State, Local, Tribal, and Territorial) entities experienced a 95% increase in exploitable services over the analysis period.

1/1/2025
Exploitable servicesPrivate sector

Organizations enrolled in CISA’s Vulnerability Scanning service saw a steady decline in KEVs on their networks.

1/1/2025
KEV

Cisco-related vulnerabilities accounted for 9.8% of all observed KEVs.

1/1/2025
KEV

Cyber Hygiene (CyHy) service enrollment increased by 201% from August 2022 to August 2024. The highest enrollment increases were observed in the following sectors: communications (300% increase), emergency services (268% increase), critical manufacturing (243% increase), water and wastewater systems (242%).

1/1/2025
Cyber hygiene

45% of all vulnerabilities detected were SSL misconfigurations, but this percentage dropped to 33.5% by mid-2024.

1/1/2025
MisconfigurationSSLVulnerabilities

1% of organizations had no email security controls.

1/1/2025
Email security

SSL remediation time decreased from 197 days in August 2022 to just 12 days in August 2024.

1/1/2025
SSL

Cloud service providers began offering automated security.txt file generation to improve adoption.

1/1/2025
Cloud

The number of exploitable services per organization decreased from 12 in August 2022 to 8 in August 2024.

1/1/2025
Exploitable services

SMB vulnerabilities declined by 72%, while RPC accounted for 92% of all exploitable service tickets.

1/1/2025
SMBVulnerabilities

International entities experienced a 65% decrease in exploitable service instances.

1/1/2025
Exploitable services

Only 2% of organizations implemented DMARC, SPF, and STARTTLS together for their email security.

1/1/2025
Email securityDMARCSPF

Government Services and Facilities had the highest OT protocol exposure, at 63%.

1/1/2025
OT

Most security.txt files were hosted on port 443 (46%), while 18% were on unsecured ports like 80 and another 18% were on pots like 8080 that are not as safe but can be configured manually to support the necessary encryption.

1/1/2025
security.txtPort 443

Showing first 20 results