The window to stop a cyberattack has plummeted to just over an hour as attackers leverage artificial intelligence (AI), according to the 2026 Unit 42 Global IncidentThe window to stop a cyberattack has plummeted to just over an hour as attackers leverage artificial intelligence (AI), according to the 2026 Unit 42 Global Incident

AI-driven cyberattacks now breach systems in 72 minutes, study finds

2026/02/23 19:16
3 min read
For feedback or concerns regarding this content, please contact us at crypto.news@mexc.com

The window to stop a cyberattack has plummeted to just over an hour as attackers leverage artificial intelligence (AI), according to the 2026 Unit 42 Global Incident Response Report, noting that organizations must immediately align their operations with attacker speed.

The findings are based on a review of more than 750 incidents in 2025, which revealed that the time required for attackers to exfiltrate data dropped to 72 minutes, down from 285 minutes the year before.

This acceleration is driven by AI acting as a “force multiplier,” allowing threat actors to automate reconnaissance and exploit vulnerabilities within minutes of public disclosure.

By enhancing the efficiency of phishing and malware deployment, AI has effectively compressed the attack lifecycle and widened the gap between rapid-fire intrusions and manual defenses.

Of the incidents investigated by Unit 42, 90% were found to have identity weaknesses play a material role, as attackers increasingly bypass software exploits by “logging in” with stolen credentials or hijacked sessions.

This is primarily achieved through phishing and the exploitation of software vulnerabilities, which remain the most common entry points, each accounting for 22% of observed incidents, the report said.

Once inside, threat actors leverage these valid credentials to move faster and blend into normal business activity, often utilizing an organization’s own internal AI services to map systems and escalate their access.

This trend is fueled by a widespread governance gap where 99% of cloud identities, including human users and machine accounts, hold excessive permissions, providing quiet, high-leverage paths for lateral movement.

Also, the report found that software supply chain risk has shifted toward the misuse of trusted connectivity, with Software as a Service (SaaS) data relevance jumping to 23% in 2025.

Attackers also exploit interconnected Application Programming Interfaces (APIs) and poorly governed transitive libraries to achieve a “one-to-many” impact.

Meanwhile, nation-state actors from China, North Korea, and Iran have shifted their strategy toward long-term stealth by compromising deep infrastructure levels, such as virtualization and management layers, to maintain a permanent presence.

This refined tradecraft includes the use of highly deceptive “employment fraud,” where hackers create fake job portals and conduct fictitious interviews to trick unsuspecting employees into installing malware.

By prioritizing persistence over immediate disruption, these actors can remain hidden within a network for extended periods, turning legitimate corporate recruitment and information technology (IT) processes into direct paths for intelligence gathering.

To counter these threats, the report recommends that companies shift to Active Exposure Management by adopting integrated, automated containment, and treating identity as their primary security boundary.

Organizations are also advised to move beyond static scanning to actively govern third-party integrations and machine identities before they can be weaponized.

Unit 42 is the global threat intelligence and incident response arm of Palo Alto Networks, a leading cybersecurity firm that provides specialized expertise and tools to help organizations handle complex digital threats. — Edg Adrian A. Eva

Market Opportunity
LETSTOP Logo
LETSTOP Price(STOP)
$0.00663
$0.00663$0.00663
-10.40%
USD
LETSTOP (STOP) Live Price Chart
Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact crypto.news@mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

German Hacker Arrested in Bangkok Over Crypto Extortion, Faces 74 Cyber Crime Charges

German Hacker Arrested in Bangkok Over Crypto Extortion, Faces 74 Cyber Crime Charges

The post German Hacker Arrested in Bangkok Over Crypto Extortion, Faces 74 Cyber Crime Charges appeared on BitcoinEthereumNews.com. Thai police arrested a 27-year
Share
BitcoinEthereumNews2026/04/12 17:01
Arthur Hayes injects $1.1M more into HYPE as Bitwise pushes Hyperliquid ETF

Arthur Hayes injects $1.1M more into HYPE as Bitwise pushes Hyperliquid ETF

In a new on-chain move, the trader arthur hayes expanded his exposure to the HYPE token while the market tracks developments around Hyperliquid products. New $1
Share
The Cryptonomist2026/04/12 15:53
Ethereum unveils roadmap focusing on scaling, interoperability, and security at Japan Dev Conference

Ethereum unveils roadmap focusing on scaling, interoperability, and security at Japan Dev Conference

The post Ethereum unveils roadmap focusing on scaling, interoperability, and security at Japan Dev Conference appeared on BitcoinEthereumNews.com. Key Takeaways Ethereum’s new roadmap was presented by Vitalik Buterin at the Japan Dev Conference. Short-term priorities include Layer 1 scaling and raising gas limits to enhance transaction throughput. Vitalik Buterin presented Ethereum’s development roadmap at the Japan Dev Conference today, outlining the blockchain platform’s priorities across multiple timeframes. The short-term goals focus on scaling solutions and increasing Layer 1 gas limits to improve transaction capacity. Mid-term objectives target enhanced cross-Layer 2 interoperability and faster network responsiveness to create a more seamless user experience across different scaling solutions. The long-term vision emphasizes building a secure, simple, quantum-resistant, and formally verified minimalist Ethereum network. This approach aims to future-proof the platform against emerging technological threats while maintaining its core functionality. The roadmap presentation comes as Ethereum continues to compete with other blockchain platforms for market share in the smart contract and decentralized application space. Source: https://cryptobriefing.com/ethereum-roadmap-scaling-interoperability-security-japan/
Share
BitcoinEthereumNews2025/09/18 00:25

USD1 Genesis: 0 Fees + 12% APR

USD1 Genesis: 0 Fees + 12% APRUSD1 Genesis: 0 Fees + 12% APR

New users: stake for up to 600% APR. Limited time!