.png)
More than half of the most dangerous exploitation attempts observed across the internet came from IPs with no prior history in GreyNoise data. GreyNoise measured 212 exploitation attempts per second across H2 2025 β and the patterns inside that volume expose specific, measurable gaps in common edge defense strategies.
The 2026 GreyNoise State of the Edge Report analyzes 2.97 billion malicious sessions from 3.8 million unique source IPs. It shows exactly which vendors are targeted, where attack infrastructure concentrates, where reputation-based defenses have coverage gaps, and what defenders can do about it.
The Verizon 2025 DBIR documented an 8x increase in edge device exploitation β edge vulnerabilities jumped from 3% to 22% of all vulnerability exploitation breaches. Mandiant M-Trends 2025 found the top four most frequently exploited vulnerabilities were all in edge devices β Palo Alto PAN-OS, Ivanti Connect Secure, Ivanti Policy Secure, and Fortinet FortiClient EMS. CISA issued Binding Operational Directive 26-02, requiring federal agencies to address end-of-support edge devices. This report puts numbers behind those findings.
Fill out the form to download your free copy.
More than half of the most dangerous exploitation attempts observed across the internet came from IPs with no prior history in GreyNoise data. GreyNoise measured 212 exploitation attempts per second across H2 2025 β and the patterns inside that volume expose specific, measurable gaps in common edge defense strategies.
The 2026 GreyNoise State of the Edge Report analyzes 2.97 billion malicious sessions from 3.8 million unique source IPs. It shows exactly which vendors are targeted, where attack infrastructure concentrates, where reputation-based defenses have coverage gaps, and what defenders can do about it.
The Verizon 2025 DBIR documented an 8x increase in edge device exploitation β edge vulnerabilities jumped from 3% to 22% of all vulnerability exploitation breaches. Mandiant M-Trends 2025 found the top four most frequently exploited vulnerabilities were all in edge devices β Palo Alto PAN-OS, Ivanti Connect Secure, Ivanti Policy Secure, and Fortinet FortiClient EMS. CISA issued Binding Operational Directive 26-02, requiring federal agencies to address end-of-support edge devices. This report puts numbers behind those findings.
Fill out the form to download your free copy.