{
	"id": "0a76ac9c-c5c2-40ab-be3f-ff2601ab7d54",
	"created_at": "2026-04-06T00:21:11.073159Z",
	"updated_at": "2026-04-10T13:11:54.930459Z",
	"deleted_at": null,
	"sha1_hash": "1a1c197d9e429d57abca9e55a23c0977ba853ce4",
	"title": "2025 Global Threat Report",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 3570346,
	"plain_text": "2025 Global Threat Report\r\nBy CrowdStrike\r\nPublished: 2025-02-27 · Archived: 2026-04-02 11:40:33 UTC\r\nCrowdStrike 2026\r\nGlobal Threat Report\r\nCrowdStrike 2026\r\nGlobal Threat Report\r\n27 sec: the fastest recorded eCrime breakout time\r\n89% increase in attacks by AI-enabled adversaries\r\n82% of detections in 2025 were malware-free\r\nhttps://www.crowdstrike.com/resources/reports/2019-crowdstrike-global-threat-report\r\nPage 1 of 12\n\nhttps://www.crowdstrike.com/resources/reports/2019-crowdstrike-global-threat-report\r\nPage 2 of 12\n\nAI threats have reached a critical turning point\r\nIncrease in attacks by AI-enabled adversaries\r\nAI is now a dual threat: It acts as a force multiplier for cyberattacks while introducing a new attack surface. \r\n90+ organizations had legitimate AI tools exploited to generate malicious commands and steal sensitive data.\r\nChatGPT was mentioned in criminal forums 550% more than any other model.\r\nThe race against time: breakout speed accelerates\r\nThe race against time: breakout speed accelerates\r\nAs adversaries move faster than ever, the window for detection and response continues to shrink, demanding real-time visibility and automated response capabilities.\r\nhttps://www.crowdstrike.com/resources/reports/2019-crowdstrike-global-threat-report\r\nPage 3 of 12\n\nhttps://www.crowdstrike.com/resources/reports/2019-crowdstrike-global-threat-report\r\nPage 4 of 12\n\nhttps://www.crowdstrike.com/resources/reports/2019-crowdstrike-global-threat-report\r\nPage 5 of 12\n\n27 sec\r\nFastest eCrime breakout time on record\r\nhttps://www.crowdstrike.com/resources/reports/2019-crowdstrike-global-threat-report\r\nPage 6 of 12\n\n65%\r\nIncrease in average breakout speed year over year\r\nEdge device and cross-domain attacks escalate\r\nEdge device and cross-domain attacks escalate\r\nBy exploiting visibility gaps, adversaries move fluidly across identity, cloud, and virtual environments while\r\navoiding heavily monitored endpoints to evade detection.\r\nhttps://www.crowdstrike.com/resources/reports/2019-crowdstrike-global-threat-report\r\nPage 7 of 12\n\nhttps://www.crowdstrike.com/resources/reports/2019-crowdstrike-global-threat-report\r\nPage 8 of 12\n\nhttps://www.crowdstrike.com/resources/reports/2019-crowdstrike-global-threat-report\r\nPage 9 of 12\n\nhttps://www.crowdstrike.com/resources/reports/2019-crowdstrike-global-threat-report\r\nPage 10 of 12\n\n40%\r\nOf vulnerabilities exploited by China-nexus adversaries targeted edge devices\r\n266%\r\nIncrease in cloud-conscious intrusions by state-nexus threat actors\r\nKnow them. Find them.\r\nStop them.\r\nExplore the Adversary Hub to learn how the world’s most dangerous threat actors are targeting organizations like\r\nyours.\r\nhttps://www.crowdstrike.com/resources/reports/2019-crowdstrike-global-threat-report\r\nPage 11 of 12\n\nFAQs\r\nThe CrowdStrike Counter Adversary Operations team performs research that identifies new adversaries, monitors\r\ntheir activities, and captures emerging cyber threat developments. This intelligence is used to conduct proactive\r\nthreat hunting across the customer base to enable the detection of new and evolving adversary tradecraft.\r\nSource: Based on the CrowdStrike’s Counter Adversary Operations team’s proprietary threat intelligence gathered\r\nin 2025.\r\nSource: https://www.crowdstrike.com/resources/reports/2019-crowdstrike-global-threat-report\r\nhttps://www.crowdstrike.com/resources/reports/2019-crowdstrike-global-threat-report\r\nPage 12 of 12",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"MISPGALAXY",
		"Malpedia"
	],
	"origins": [
		"web"
	],
	"references": [
		"https://www.crowdstrike.com/resources/reports/2019-crowdstrike-global-threat-report"
	],
	"report_names": [
		"2019-crowdstrike-global-threat-report"
	],
	"threat_actors": [],
	"ts_created_at": 1775434871,
	"ts_updated_at": 1775826714,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/1a1c197d9e429d57abca9e55a23c0977ba853ce4.pdf",
		"text": "https://archive.orkl.eu/1a1c197d9e429d57abca9e55a23c0977ba853ce4.txt",
		"img": "https://archive.orkl.eu/1a1c197d9e429d57abca9e55a23c0977ba853ce4.jpg"
	}
}