The post Kaspersky security 2025 statistics: rising desktop threats appeared on BitcoinEthereumNews.com. Cybersecurity risks continued to climb worldwide as the latest Kaspersky Security Bulletin 2025 statistics report highlights a sharp rise in several key threat categories. Methodology and reporting period All statistics in this report are based on data from the Kaspersky Security Network (KSN), a global cloud service that aggregates telemetry from security components installed on user devices. Millions of Kaspersky customers around the world voluntarily contribute this information, enabling detailed tracking of emerging threats. The bulletin covers the period from November 2024 through October 2025. However, it is important to note that this edition does not include mobile-related data, which the company plans to disclose separately in its annual mobile malware report. That said, the current snapshot already shows a significant escalation in desktop and laptop attacks. Overall exposure of Windows and macOS users During the reporting period, 48% of Windows users and 29% of macOS users faced at least one cyberthreat detected by Kaspersky solutions. These figures characterize the broad reach of current attacks across both major desktop platforms. Moreover, they emphasize that Apple systems, while traditionally perceived as safer, remain a meaningful target for cybercriminals. The data suggests that almost one in two Windows users and nearly one in three macOS users encountered malicious activity of some kind. However, the specific type and origin of these threats can vary widely, from web-based infections to on-device payloads delivered through compromised software or removable media. Web versus on-device threats Across all platforms, 27% of Kaspersky users were exposed to web threats, while 33% of users were affected by on-device, or local, threats during the same period. These numbers indicate that attacks delivered directly to the device remain at least as significant as browser-based compromises. Moreover, organizations should account for both vectors in their endpoint protection strategies. The highest share of… The post Kaspersky security 2025 statistics: rising desktop threats appeared on BitcoinEthereumNews.com. Cybersecurity risks continued to climb worldwide as the latest Kaspersky Security Bulletin 2025 statistics report highlights a sharp rise in several key threat categories. Methodology and reporting period All statistics in this report are based on data from the Kaspersky Security Network (KSN), a global cloud service that aggregates telemetry from security components installed on user devices. Millions of Kaspersky customers around the world voluntarily contribute this information, enabling detailed tracking of emerging threats. The bulletin covers the period from November 2024 through October 2025. However, it is important to note that this edition does not include mobile-related data, which the company plans to disclose separately in its annual mobile malware report. That said, the current snapshot already shows a significant escalation in desktop and laptop attacks. Overall exposure of Windows and macOS users During the reporting period, 48% of Windows users and 29% of macOS users faced at least one cyberthreat detected by Kaspersky solutions. These figures characterize the broad reach of current attacks across both major desktop platforms. Moreover, they emphasize that Apple systems, while traditionally perceived as safer, remain a meaningful target for cybercriminals. The data suggests that almost one in two Windows users and nearly one in three macOS users encountered malicious activity of some kind. However, the specific type and origin of these threats can vary widely, from web-based infections to on-device payloads delivered through compromised software or removable media. Web versus on-device threats Across all platforms, 27% of Kaspersky users were exposed to web threats, while 33% of users were affected by on-device, or local, threats during the same period. These numbers indicate that attacks delivered directly to the device remain at least as significant as browser-based compromises. Moreover, organizations should account for both vectors in their endpoint protection strategies. The highest share of…

Kaspersky security 2025 statistics: rising desktop threats

Cybersecurity risks continued to climb worldwide as the latest Kaspersky Security Bulletin 2025 statistics report highlights a sharp rise in several key threat categories.

Methodology and reporting period

All statistics in this report are based on data from the Kaspersky Security Network (KSN), a global cloud service that aggregates telemetry from security components installed on user devices. Millions of Kaspersky customers around the world voluntarily contribute this information, enabling detailed tracking of emerging threats.

The bulletin covers the period from November 2024 through October 2025. However, it is important to note that this edition does not include mobile-related data, which the company plans to disclose separately in its annual mobile malware report. That said, the current snapshot already shows a significant escalation in desktop and laptop attacks.

Overall exposure of Windows and macOS users

During the reporting period, 48% of Windows users and 29% of macOS users faced at least one cyberthreat detected by Kaspersky solutions. These figures characterize the broad reach of current attacks across both major desktop platforms. Moreover, they emphasize that Apple systems, while traditionally perceived as safer, remain a meaningful target for cybercriminals.

The data suggests that almost one in two Windows users and nearly one in three macOS users encountered malicious activity of some kind. However, the specific type and origin of these threats can vary widely, from web-based infections to on-device payloads delivered through compromised software or removable media.

Web versus on-device threats

Across all platforms, 27% of Kaspersky users were exposed to web threats, while 33% of users were affected by on-device, or local, threats during the same period. These numbers indicate that attacks delivered directly to the device remain at least as significant as browser-based compromises. Moreover, organizations should account for both vectors in their endpoint protection strategies.

The highest share of users affected by web threats was recorded in the CIS region, where 34% of users encountered online attacks. However, local threats were most prevalent in Africa, where they were detected on 41% of user systems. This regional divergence underlines how infrastructure, connectivity patterns, and local cybercrime ecosystems shape risk profiles.

Password stealers and spyware on the rise

Kaspersky reports that its solutions prevented nearly 1.6 times more password stealer attacks during the period compared to the previous year. This sharp growth shows that credential theft remains a core objective for many threat actors, whether they target individuals, enterprises, or financial platforms. Moreover, stolen passwords can fuel further intrusions and fraud.

The trend is even more pronounced in APAC, where detections of password stealers surged by 132% year-on-year. This APAC cyberthreat surge suggests that regional users and businesses are increasingly in the crosshairs of credential-focused campaigns, which often exploit phishing, malicious downloads, or compromised websites.

Alongside these figures, Kaspersky solutions also detected 1.5 times more spyware attacks than in the previous year. However, the bulletin does not just highlight the raw increase; it also implies growing sophistication in surveillance-focused malware, which can silently exfiltrate sensitive data or monitor user activity over extended periods.

Positioning within the wider Kaspersky Security Bulletin series

This installment of the Kaspersky Security Bulletin continues the annual tradition of outlining the most significant trends in attacks observed through KSN telemetry. The 2025 statistics section concentrates on desktop and laptop environments, with mobile insights to follow in a dedicated publication. That said, the figures already help contextualize the evolving strategies of cybercriminals.

Within this broader series, the current statistics refine the picture of how kaspersky security technologies interact with real-world threat campaigns. They show not only where attacks are most common, but also which techniques, such as password theft and spyware deployment, are gaining momentum across regions.

Outlook and where to find the full data

The numbers from November 2024 to October 2025 underscore a clear message: credential theft, spyware, and both web-based and local infections are intensifying in many parts of the world. Moreover, differing regional patterns in the CIS, Africa, and APAC highlight why security strategies must be tailored to local realities rather than relying solely on global averages.

Readers seeking deeper, country-level breakdowns and additional yearly web threat statistics can view the full report, which provides extended charts, comparative baselines with the previous year, and a more granular view of how these attacks evolve over time.

In summary, the Kaspersky Security Bulletin 2025 statistics show that nearly half of Windows users and a sizable share of macOS users faced cyber risks between late 2024 and late 2025, while password-stealing malware and spyware grew strongly in both global and regional terms.

Source: https://en.cryptonomist.ch/2025/12/02/kaspersky-security-bulletin-2025/

Market Opportunity
RISE Logo
RISE Price(RISE)
$0.005918
$0.005918$0.005918
-2.05%
USD
RISE (RISE) Live Price Chart
Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact service@support.mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

A Radical Neural Network Approach to Modeling Shock Dynamics

A Radical Neural Network Approach to Modeling Shock Dynamics

This paper introduces a non-diffusive neural network (NDNN) method for solving hyperbolic conservation laws, designed to overcome the shortcomings of standard Physics-Informed Neural Networks (PINNs) in modeling shock waves. The NDNN framework decomposes the solution domain into smooth subdomains separated by discontinuity lines, identified via Rankine-Hugoniot conditions. This approach enables accurate tracking of entropic shocks, shock generation, and wave interactions, while reducing the diffusive errors typical in PINNs. Numerical experiments validate the algorithm’s potential, highlighting its promise for extending shock-wave computations to higher-dimensional problems.
Share
Hackernoon2025/09/19 18:38
A Netflix ‘KPop Demon Hunters’ Short Film Has Been Rated For Release

A Netflix ‘KPop Demon Hunters’ Short Film Has Been Rated For Release

The post A Netflix ‘KPop Demon Hunters’ Short Film Has Been Rated For Release appeared on BitcoinEthereumNews.com. KPop Demon Hunters Netflix Everyone has wondered what may be the next step for KPop Demon Hunters as an IP, given its record-breaking success on Netflix. Now, the answer may be something exactly no one predicted. According to a new filing with the MPA, something called Debut: A KPop Demon Hunters Story has been rated PG by the ratings body. It’s listed alongside some other films, and this is obviously something that has not been publicly announced. A short film could be well, very short, a few minutes, and likely no more than ten. Even that might be pushing it. Using say, Pixar shorts as a reference, most are between 4 and 8 minutes. The original movie is an hour and 36 minutes. The “Debut” in the title indicates some sort of flashback, perhaps to when HUNTR/X first arrived on the scene before they blew up. Previously, director Maggie Kang has commented about how there were more backstory components that were supposed to be in the film that were cut, but hinted those could be explored in a sequel. But perhaps some may be put into a short here. I very much doubt those scenes were fully produced and simply cut, but perhaps they were finished up for this short film here. When would Debut: KPop Demon Hunters theoretically arrive? I’m not sure the other films on the list are much help. Dead of Winter is out in less than two weeks. Mother Mary does not have a release date. Ne Zha 2 came out earlier this year. I’ve only seen news stories saying The Perfect Gamble was supposed to come out in Q1 2025, but I’ve seen no evidence that it actually has. KPop Demon Hunters Netflix It could be sooner rather than later as Netflix looks to capitalize…
Share
BitcoinEthereumNews2025/09/18 02:23
Headwind Helps Best Wallet Token

Headwind Helps Best Wallet Token

The post Headwind Helps Best Wallet Token appeared on BitcoinEthereumNews.com. Google has announced the launch of a new open-source protocol called Agent Payments Protocol (AP2) in partnership with Coinbase, the Ethereum Foundation, and 60 other organizations. This allows AI agents to make payments on behalf of users using various methods such as real-time bank transfers, credit and debit cards, and, most importantly, stablecoins. Let’s explore in detail what this could mean for the broader cryptocurrency markets, and also highlight a presale crypto (Best Wallet Token) that could explode as a result of this development. Google’s Push for Stablecoins Agent Payments Protocol (AP2) uses digital contracts known as ‘Intent Mandates’ and ‘Verifiable Credentials’ to ensure that AI agents undertake only those payments authorized by the user. Mandates, by the way, are cryptographically signed, tamper-proof digital contracts that act as verifiable proof of a user’s instruction. For example, let’s say you instruct an AI agent to never spend more than $200 in a single transaction. This instruction is written into an Intent Mandate, which serves as a digital contract. Now, whenever the AI agent tries to make a payment, it must present this mandate as proof of authorization, which will then be verified via the AP2 protocol. Alongside this, Google has also launched the A2A x402 extension to accelerate support for the Web3 ecosystem. This production-ready solution enables agent-based crypto payments and will help reshape the growth of cryptocurrency integration within the AP2 protocol. Google’s inclusion of stablecoins in AP2 is a massive vote of confidence in dollar-pegged cryptocurrencies and a huge step toward making them a mainstream payment option. This widens stablecoin usage beyond trading and speculation, positioning them at the center of the consumption economy. The recent enactment of the GENIUS Act in the U.S. gives stablecoins more structure and legal support. Imagine paying for things like data crawls, per-task…
Share
BitcoinEthereumNews2025/09/18 01:27