Back to Home

Among the top vulnerabilities exploited in ICS/OT systems were internet-accessible devices (33%) and transient devices (27%).

Source

View Original Report

Published on 3/4/2025

Share or Copy this stat

Want More Statistics Like This?

Get the latest cybersecurity stats delivered to your inbox every week

Related Statistics

Browse more stats from OPSWAT & SANS Institute

Stay Ahead of Cyber Threats

Join 1,000+ security professionals getting weekly insights