On October 28, 2025, cyber-insurance provider At-Bay released its 2025 InsurSec Rankings Report, an analysis of over 100,000 policy years of claims data. The report reveals that email and remote access technologies were the initial access vectors for 90% of all cyber insurance claims in 2024. A striking finding is that businesses using on-premise VPNs from vendors like Cisco and Citrix are five to seven times more likely to experience a ransomware attack than those using other solutions. The report also notes a 30% year-over-year increase in email-related claims, driven by sophisticated, AI-powered fraud. The data positions Managed Detection and Response (MDR) as the most effective security control for reducing ransomware risk, while Sophos was ranked as the highest-performing email security solution.
The report analyzes claims data from 2021 through Q1 2025 to identify the technologies and attack vectors most frequently associated with financial losses. Key findings include:
The report's findings point to specific, well-understood TTPs that continue to plague organizations.
Remote Access (T1133 - External Remote Services): On-premise VPN appliances are a single point of failure. They are frequently targeted by threat actors who exploit unpatched vulnerabilities (T1190 - Exploit Public-Facing Application) to gain initial access to a network. Once compromised, these devices provide a direct and often privileged entry point into the corporate environment.
Email-Based Attacks (T1566 - Phishing): Email remains the most reliable way to target employees. The rise of AI-powered tools allows attackers to scale sophisticated social engineering campaigns, making them harder to detect. A successful phish can yield credentials or lead to malware deployment, both of which can be precursors to a ransomware attack.
The report, from an insurer's perspective, directly ties these threat vectors to financial impact.
D3FEND Technique: The report's emphasis on MDR points to the value of continuous monitoring techniques like
D3-UBA - User Behavior AnalysisandD3-NTA - Network Traffic Analysis.
D3FEND Countermeasure: The report suggests moving away from risky technologies and adopting better security services. This aligns with
Hardencountermeasures likeD3-MFA - Multi-factor Authenticationand considering modern alternatives to VPNs.
Enforce MFA on all remote access solutions to mitigate the risk of credential-based attacks.
Mapped D3FEND Techniques:
Aggressively patch vulnerabilities in VPN appliances and other internet-facing systems.
Mapped D3FEND Techniques:
Move towards a Zero Trust Network Access (ZTNA) model to replace traditional VPNs, providing granular access control and reducing the attack surface.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats