Risky Tech Ranking: Q3 2025 Updates

Coalition’s Risky Tech Ranking is an evolving list of technology providers whose products were vulnerable to exploitation by threat actors. The ranking uses publicly available data to help businesses make more thoughtful decisions about the technologies they adopt.
At Coalition, we frequently encounter technology products and services that do not adequately safeguard businesses, many of which are used by businesses that may become or wish to become Coalition policyholders. Ensuring that only trustworthy technology handles an organization’s sensitive electronic information is not only vital for Coalition policyholders, but also serves the broader public interest by contributing to a safer digital environment across the entire technology ecosystem.
The Risky Tech Ranking is updated on a quarterly basis, scoring vendors by multiplying the number of vulnerabilities impacting a vendor’s products by the average Coalition Exploit Scoring System (Coalition ESS) score. Below, we’ll examine noteworthy changes in vendor rankings and contributing vulnerabilities in Q3 2025.
How the Risky Tech Ranking evolved in Q3
The total number of vendors scored by Coalition in the Risky Tech Ranking increased by 8% in Q3 2025, growing from 8,145 in Q2 to 8,771 in Q3.
The total number of contributing vulnerabilities also increased by 4%, growing from 42,716 in Q2 to 44,365 in Q3.
Overall, Q3 2025 saw relative stability among the top 10 positions in the Risky Tech Ranking, while a few new household-name vendors climbed into the top 30.
Changes among the top 5 rankings
Cisco (↑5)
Cisco climbed into the top 5, rising from #10 to #5, due to a 4% increase in the total number of contributing vulnerabilities.
Google (↑1)
Google rose one spot in the top 5, moving from #5 to #4, driven by an 11% increase in the total number of contributing vulnerabilities.
New entries & exits from the top 10
D-Link (↑3) rose from #13 to #10. D-Link has fluctuated between #9 and #13 throughout 2025, experiencing both quarterly increases and decreases in the total number of contributing vulnerabilities.
TOTOLINK (↓5) dropped from #8 to #13. This change interrupts the rise of the previous three quarters and returns TOTOLINK to the position it had at the beginning of 2025.
Significant movement among the top 30
Notably, Citrix and Nvidia entered the top 30 for the first time in Q3:
Campcodes (↑27) returned to the top 20, jumping from #47 to #20.
Citrix (↑46) climbed from #69 to #23.
Nvidia (↑30) rose from #57 to #27.
How the Risky Tech Ranking works and why it’s important
Technology products are frequently released with serious security flaws, putting businesses at risk before they have a chance to defend themselves. In 2024, cyber criminals exploited more than 3,000 new vulnerabilities per month to carry out ransomware campaigns, steal sensitive data, or establish long-term access to critical systems for future nefarious activity. Consequently, software vulnerabilities were a leading cause of ransomware attacks last year.
The Risky Tech Ranking is designed not only to serve as an educational tool for businesses when making purchasing decisions, but also to encourage vendors to make their popular technologies more secure.
Vulnerability management is difficult. Every update takes time, testing, and can risk breaking important systems. With thousands of new vulnerabilities reported every month, staying on top of it all is overwhelming, even for teams doing everything right. For small and midsize businesses (SMBs), this task is even harder. SMBs often rely on outside technology and trust that it's secure. But without clear information about vendor security practices, that trust can backfire.
The Risky Tech Ranking helps close that gap by giving businesses better insight into the risks tied to the products they use. Read more about why we built the ranking and the full methodology of how it works.

