GLOBAL CYBERTHREAT OUTLOOK

2026 Lumen Defender Threatscape Report

Take an inside look at modern cyberthreats and what their trajectories signal for the future.

GLOBAL CYBERTHREAT OUTLOOK

2026 Lumen Defender Threatscape Report

Take an inside look at modern cyberthreats and what their trajectories signal for the future.

Cover image of document reading “Lumen Defender Threatscape Report” surrounding by text from the report.

Exposing the setup before the breach

Access key insights to learn how to stop cyberthreats before they start.

Exposing the setup before the breach

Access key insights to learn how to stop cyberthreats before they start.

Illustrated map of the continental US with lines depicting network routes across the county.

Unmatched global network visibility   

As the #1 globally peered network,1 Lumen watches threat actors assemble their tools and map routes across the public internet—spotting the heist infrastructure long before the breach begins.

Unmatched global network visibility   

As the #1 globally peered network,1 Lumen watches threat actors assemble their tools and map routes across the public internet—spotting the heist infrastructure long before the breach begins.

200B+

NetFlow sessions monitored daily

200B+

NetFlow sessions monitored daily

14.8M

new malicious IPs and domains classified monthly

14.8M

new malicious IPs and domains classified monthly

2.3M

unique threats detected daily

2.3M

unique threats detected daily

99%

public IPv4 visibility

99%

public IPv4 visibility

Resources

FAQs

It’s a detailed analysis of the latest cyberthreats and emerging trends observed across the Lumen global network, compiled by the Black Lotus Labs research team.

Black Lotus Labs is the threat intelligence and research arm of Lumen Technologies. The team specializes in tracking, analyzing and disrupting advanced cyberthreats across the global internet.

Black Lotus Labs leverages one of the world's largest and most deeply peered networks to observe malicious activity at scale, then performs advanced analytics and hands-on research to help you stay ahead of evolving threats.

The Lumen Threatscape Report helps security leaders move from reacting to breaches to disrupting attacks before they begin. The report reveals how threat actors use generative AI to build and rotate infrastructure—targeting edge devices, proxy networks and internet-based services long before impact.

Our global network visibility and advanced threat intelligence help you identify malicious infrastructure early and stop threats before they reach your environment. Block malicious traffic and mitigate attacks at the network edge with Lumen Defender℠, Lumen® DDoS Mitigation Service and Lumen® Adaptive Network Security.

Questions? Let’s talk.

Contact our team to get the assistance and answers you’re looking for.

Questions? Let’s talk.

Contact our team to get the assistance and answers you’re looking for.

Start chat

Request a
Sales callback

Call Sales
800‑871‑9244

1 The Center for Applied Internet Data Analysis (CAIDA), AS rank, January 2025.