HomeTopicsVec

Vec

Cybersecurity statistics about vec

Showing 1-20 of 25 results

Phishing (including malspam, vishing, and malvertising) was the dominant intrusion vector, accounting for approx. 60% of cases..

Vulnerability exploitation accounted for 21.3% of initial access vectors.

Insider threats accounted for 0.8% of initial access vectors.

Botnet accounted for 9.9% of initial access vectors.

Malicious applications accounted for 8% of initial access vectors.

69% of 2025's breach notices did not include an attack vector. This is an increase from 65% for the full year 2024.

Junior sales staff were among the most vulnerable roles, engaging with read VEC attacks at a rate of 86%.

Conversely, EMEA organisations show the highest reporting rate for BEC, at 4.22%

In EMEA, the VEC engagement rate exceeds Business Email Compromise (BEC) by 90%.

7% of VEC engagements came from employees who had engaged with a previous attack.

The overall reporting rate for advanced text-based email threats was just 1.46%.

Telecommunications saw the highest VEC engagement rate at 71.3%.

Employees in large enterprises engaged with malicious vendor messages 72% of the time after reading them, taking follow-up actions such as replying or forwarding.

Repeat engagement with VEC in EMEA is the highest of any region, over twice that of BEC.

The second-ranked industry for VEC engagement rate was the energy/utilities sector (56%).

EMEA organisations demonstrate the lowest reporting rate for VEC, at 0.27%.

In just 12 months, attackers attempted to steal more than $300 million via VEC.

Employees in large enterprises engaged with malicious vendor messages 72% of the time after reading them, taking follow-up actions such as replying or forwarding.

The overall reporting rate for advanced text-based email threats was just 1.46%.

Exploits continue to be the most common initial infection vector (33%).