Risky Tech Ranking: Q2 2025 Updates

Coalition’s Risky Tech Ranking is an evolving list of technology providers whose products were vulnerable to exploitation by threat actors. The ranking uses publicly available data to help businesses make better-informed decisions about the technologies they adopt.
At Coalition, we frequently encounter technology products and services that do not adequately safeguard businesses, including those that may become or wish to become Coalition policyholders. Ensuring that only trustworthy technology providers handle an organization’s sensitive electronic information is not only vital for Coalition policyholders, but also serves the broader public interest by contributing to a safer digital environment across the entire technology ecosystem.
The Risky Tech Ranking is updated on a quarterly basis, scoring vendors by multiplying the number of vulnerabilities impacting a vendor’s products by the average Coalition Exploit Scoring System (Coalition ESS) score. Below, we’ll examine noteworthy changes in vendor rankings and overall inputs in Q2 2025.
How the Risky Tech Ranking evolved in Q2
The total number of vendors scored by Coalition in the Risky Tech Ranking increased by 14% in Q2 2025, growing from 7,140 in Q1 to 8,145 in Q2.
The total number of contributing vulnerabilities decreased by 0.1%, dropping from 42,753 in Q1 to 42,716 in Q2. This is the result of a shift in common vulnerabilities and exposures (CVE) reporting patterns over the last five quarters. The previously steady increase in reported CVEs quarter-over-quarter has been replaced by more volatile quarterly numbers, including a drop in Q3 2024 compared to Q2 2024, and another in Q2 2025 compared to Q1 2025.
Changes among the top 5 rankings
Adobe (↓1)
Adobe fell out of the top 5, dropping from #5 to #6 due to a 45% decrease in its average Coalition ESS score despite a 15% increase in the total number of contributing vulnerabilities
Apache (↑4)
Apache rose into the top 5, climbing from #8 to #4 due to a 16% increase in the total number of contributing vulnerabilities.
Apple (↑1)
Apple jumped from #3 to #2 as a result of a 14% increase in the total number of contributing vulnerabilities.
Google (↓3)
Google fell from #2 to #5 due to both a 17% decrease in the total number of contributing vulnerabilities and a 33% decrease in its average Coalition ESS score.
Linux (↑1)
Linux jumped from #4 to #3 despite a 10% decrease in the total number of contributing vulnerabilities and a 14% decrease in its average Coalition ESS score, largely driven by more significant decreases among other vendors in the top 5 rankings.
New entries & exits from top 10
D-Link (↓4) dropped from #9 to #13.
Ivanti (↓2) fell from #10 to #12.
PHPGurukul (↑13) jumped from #22 to #9.
TOTOLINK (↑3) rose from #11 to #8.
Significant movement among the top 30
Samsung (↑21) jumped from #46 to #25.
Draytek (↑40) rose from #67 to #27
Progress (↓23) fell from #18 to #41
Campcodes (↓21) dropped from #26 to #47
ThimPress (↓77) fell from #30 to #107
Foxit Software (↓2,324 )
Fedora Project (↓6,180)
How the Risky Tech Ranking works and why it’s important
Technology products are frequently released with serious security flaws, putting businesses at risk before they even have a chance to defend themselves. In 2024, cyber criminals exploited more than 3,000 new vulnerabilities per month to carry out ransomware campaigns, steal sensitive data, or establish long-term access to critical systems for future nefarious activity. Consequently, software vulnerabilities were a leading cause of ransomware attacks last year.
The Risky Tech Ranking is designed not only to serve as an educational tool for businesses when making purchasing decisions, but also to push vendors to make their popular technologies more secure.
Vulnerability management is difficult. Every update takes time, testing, and can risk breaking important systems. With thousands of new vulnerabilities reported every month, staying on top of it all is overwhelming, even for teams doing everything right. For small and midsize businesses (SMBs), this task is even harder. SMBs often rely on outside technology and trust that it's secure. But without clear information about vendor security practices, that trust can backfire.
The Risky Tech Ranking helps close that gap by giving businesses better insight into the risks tied to the products they use. Read more about why we built the ranking and the full methodology of how it works.