2025 Talos Year in Review: Speed, Scale, and Staying Power

Summary: In 2025, adversary activity saw rapid exploitation of both new and long-standing vulnerabilities, targeting systems managing authentication and trust as well as central infrastructure for broader impact.

The pace and scale of cyber adversaries' activities in 2025 placed significant pressure on security teams. According to Cisco Talos, three key themes emerged: the rapid exploitation of new vulnerabilities, attacks on systems managing authentication and trust, and targeting centralized infrastructure for greater impact.

Firstly, adversaries exploited both newly disclosed vulnerabilities and those that had been known for years. The React2Shell vulnerability, which was publicly disclosed in December 2025, became the seventh-most-exploited CVE just three weeks after its disclosure. This underscores the increasing sophistication of automated exploit development and the rapid spread of public proof-of-concept code.

Secondly, attackers focused on systems that manage authentication, authorization, and device trust. Compromised credentials were often used to extend access through phishing attacks or abuse of identity controls within network infrastructure. Control over these identity systems frequently meant control over the broader environment.

Thirdly, threat actors targeted centralized infrastructure such as management platforms and shared frameworks. Approximately 25% of the Top 100 vulnerabilities affected widely used frameworks and libraries embedded deep in software stacks, underscoring their mass exploitation potential across various vendors and applications.

Key facts

  • Rapid exploitation of both new and long-standing vulnerabilities
  • Focus on systems managing authentication, authorization, and device trust
  • Targeting centralized infrastructure for broader impact

Why it matters

Understanding these trends is crucial for security teams to prioritize actions that reduce exposure and strengthen defenses against increasingly complex and widespread attacks.