Rapid7 report shows exploited high and critical vulnerabilities more than doubled to 146 in 2025

Reuters03-18
Rapid7 report shows exploited high and critical vulnerabilities more than doubled to 146 in 2025

Rapid7 published its 2026 Global Threat Landscape Report, which found that exploited high and critical-severity vulnerabilities more than doubled from 71 in 2024 to 146 in 2025. The report said the median time from vulnerability publication to inclusion in the CISA KEV catalog fell to 5 days from 8.5 days. It also reported that valid accounts with missing or lax multi-factor authentication accounted for 43.9% of incident response investigations in 2025. Ransomware was involved in 42% of Rapid7 MDR incident response investigations, and total ransomware leak posts rose 46.4% to 8,835 in 2025.

Disclaimer: This news brief was created by Public Technologies (PUBT) using generative artificial intelligence. While PUBT strives to provide accurate and timely information, this AI-generated content is for informational purposes only and should not be interpreted as financial, investment, or legal advice. Rapid7 Inc. published the original content used to generate this news brief on March 18, 2026, and is solely responsible for the information contained therein.

At the request of the copyright holder, you need to log in to view this content

Disclaimer: Investing carries risk. This is not financial advice. The above content should not be regarded as an offer, recommendation, or solicitation on acquiring or disposing of any financial products, any associated discussions, comments, or posts by author or other users should not be considered as such either. It is solely for general information purpose only, which does not consider your own investment objectives, financial situations or needs. TTM assumes no responsibility or warranty for the accuracy and completeness of the information, investors should do their own research and may seek professional advice before investing.

Comments

We need your insight to fill this gap
Leave a comment