THREAT LANDSCAPE

2025

2026

Built on Axur’s global monitoring data, the report quantifies the scale of 2025’s threat activity and the shifts that will define 2026.
Read now
Read now
No email required.
Malicious domains.
Compromised credentials.
Impersonations.
Data for sale on Dark Web.
Phishing.
Cyber attack plans.
Malicious domains.
Compromised credentials.
Impersonations.
Data for sale on Dark Web.
Phishing.
Cyber attack plans.

The year by the numbers

The most impactful trends and metrics from our annual report.
6 billion

New and unique credentials exposed.

395 million

Credit and debit cards exposed.

71,399

Phishing pages detected.

+1,000%

Growth in domain impersonation attempts.

The most target sectors

Who was hit hardest in 2025?

In 2025, Retail topped the list for total incidents, while Finance took the lead in phishing. Technology and Healthcare faced growing threats across the Deep & Dark Web, and the Public Sector entered the radar with a surge in stolen credentials.

#1

Retail & E-commerce

#2

Finance & Insurance

#3

Technology

#4

Health

#5

Public Sector

Key incidents and emerging threats of 2025

Read the full report
Read the full report

Supply chain attacks

Large-scale compromises in the npm ecosystem show that software supply chain risks increasing.

Fraudulent brand use

Brand impersonation reached unprecedented levels, with 454,000 incidents detected globally.

Deep & dark web

Activity linked to the technology sector increased from 16.8% to 22.5%, marking a 34% rise.

.app TLD

The adoption of rapid-site-building platforms has driven an increase in the use of the .app TLD.

Social media attacks rising

Attacks are growing across multiple vectors, including paid social ads.

Malicious or fraudulent content

In 2025, we’ve shut down one fraudulent asset every 90 seconds.

Hacktivism risks

Hacktivist groups are becoming more coordinated, increasingly targeting critical infrastructure.

Executive & VIPs

More than 19,000 fake profiles targeted leadership roles for scams.

Shadow IT

Untracked cloud assets keep expanding the external attack surface.
343k
In one year, we’ve taken down 343,000 fraudulent assets.
Takedown with Axur
Takedown with Axur

Explore real cases and insights from Axur’s security experts

Read the full report
Read the full report
"We’ve noticed a significant increase in scams leveraging voice automation and impersonation techniques. Fraudsters leverage fake Interactive Voice Response (IVR) systems and mass campaigns."
Laís Clesar, Research Team Manager at Axur
"Hacktivist groups linked to the political conflicts are showing greater coordination and targeting critical infrastructure, while traditional DDoS attacks persist. Some now develop ransomware for funding, blurring the line with state-sponsored activity."
Sérgio Costa, Researcher at Axur
“We’re seeing a rise in extortion cases solely related to data leaks, without necessarily involving encryption.”
Alisson Moretto, Head of Threat Hunting at Axur
Data leaks fuel a new wave of extortion
Download the full 2025 Threat Landscape Report.
No email required.
Read the full report
Read the full report
What's next?

Be prepared for 2026 challenges

01

Define agent autonomy

check icon
Define execution limits and audit controls.
check icon
Validate automated action paths.
02

Monitor external exposures

check icon
Track leaks beyond internal assets.
check icon
Detect brand and build artifacts early.
03
Secure critical assets
check icon
Enforce phishing-resistant MFA.
check icon
Restrict privileged and remote access.
04

Audit third-party components

check icon
Validate dependencies and APIs continuously.
check icon
Review partner code and access pipelines.
05

Adapt to digital sovereignty

check icon
Prepare for data-localization demands.
check icon
Adjust infrastructure for regional compliance.

See how 2026’s threats map to your attack surface

Talk to an Axur expert and understand how these trends impact your organization’s digital exposure.
Malicious domains.
Compromised credentials.
Impersonations.
Data for sale on Dark Web.
Phishing.
Cyber attack plans.
Malicious domains.
Compromised credentials.
Impersonations.
Data for sale on Dark Web.
Phishing.
Cyber attack plans.