• Each year, our compendium grows, and conveys the latest information from our data breach investigations and global threat intelligence. This includes critical findings about attackers, entry points, vulnerabilities and exploits. The report serves as a technical canvass of the intrusion landscape, and does so with the recognition that security is a business priority. As a collection, the report records the history and evolution of the cybercriminal and the data compromise. By itself, each edition presents the latest facts that security professionals can use to defend their organization's assets and make compelling cases to management about the challenges they face.

  • 2016 Global Security Report

    For the eighth consecutive year, we have produced the authoritative report into the evolution of the cyberthreat landscape and the actions of your adversaries. Based on findings from extensive data sources, including breach investigations, global threat intelligence, product telemetry and world-renowned research, this 90-page publication is your insider’s guide into the methods, motivations and means used by attackers to infiltrate and ransack your databases, networks and applications. Download it today – and keep it close by.

    Download the 2016 Global Security Report

  • Explore previous security reports

    • 2015

      Based on actual threat intelligence and forensic investigations, the 2015 Trustwave Global Security Report will take you for a wild ride through the dark and seedy criminal underground, where vulnerabilities and exploits, breaches and stolen data, and criminal blueprints and profits rule the day.

      Download the Report

    • 2014

      The 2014 Trustwave Global Security Report reveals who cyber criminals attack, what information they want and how they get it. Inside you'll find insightful stats and charts that illustrate threat trends. Use the report and the actionable advice inside it as you map out your future security programs.

      Download the Report

    • 2013

      This year, Trustwave analyzed hundreds of businesses, millions of passwords and billions of emails, all in an effort to expose the most critical and emerging security threats to organizations around the world. The results — along with real-world scenarios and actionable advice — make up the 2013 Trustwave Global Security Report.

      Download the Report

    • 2012

      The Trustwave 2012 Global Security Report was a reflection and analysis of investigations, research and other client engagements conducted throughout 2011. During that year, Trustwave SpiderLabs investigated more than 300 breaches and performed more than 2,000 penetration tests around the world.

      Download the Report

    • 2011

      The foundation of Trustwave’s Global Security Report for 2011 was data from real-world investigations and research that Trustwave SpiderLabs performed in 2010. To assist with the planning and security efforts of our readers, this report offered analyses of data compromise investigations, offensive exercises and defense strategies taken directly from Trustwave’s expansive global client base.

      Download the Report

    • 2010

      For 2010, Trustwave broadened the Breach Report beyond compromise trends and statistics to address the growing threats in the global marketplace, those that were seen in everyday practice. In addition to the analysis of breach investigations, this report provided detailed technical information on the top vulnerabilities encountered during the penetration tests we performed in 2009.

      Download the Report

    • 2009

      This report was an analysis of Trustwave’s investigations of credit card compromises through October 29, 2008.  We derived the information and statistics from 443 cases of cardholder data compromise investigated by Trustwave since 2001, the culmination of almost seven years of card compromise investigations.

      Download the Report