Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Former Defense Contractor Boss Gets 7+ Years for Selling Zero Days

February 25, 2026

CISA Flags Four Security Flaws Under Active Exploitation in Latest KEV Update

February 25, 2026

44% Surge in App Exploits as AI Speeds Up Cyber-Attacks, IBM Finds

February 25, 2026
Facebook X (Twitter) Instagram
Wednesday, February 25
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»Cyber Security»AI Accelerates Attacker Breakout Time to Just Four Minutes
Cyber Security

AI Accelerates Attacker Breakout Time to Just Four Minutes

Team-CWDBy Team-CWDFebruary 24, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


AI is helping threat actors to accelerate attacks, but it can also empower incident responders to quickly contain threats, ReliaQuest has claimed in a new report.

The firm’s Annual Cyber-Threat Report 2026 is based on an analysis of customer incidents.

It found that breakout time last year took on average just 34 minutes; 29% quicker than in 2024. The fastest ever recorded time taken from access to lateral movement was just four minutes – 85% faster than the year before.

The fastest recorded exfiltration time was just six minutes; down from 4 hours 29 minutes in 2024.

ReliaQuest said these stats can be explained by the growing use of automation and AI, with 80% of ransomware groups using one or both in their attacks last year.

AI is also being used prior to attacks, the report claimed. It can help threat actors with reconnaissance by automating the analysis of social media profiles, corporate websites and public data sources in order to identify high-value targets and draft convincing social engineering scripts.

Read more on AI-driven threats: Automation and Vulnerability Exploitation Drive Mass Ransomware Breaches.

Elsewhere, the report revealed that a quarter of attacks used social engineering for initial access last year, with ClickFix responsible for delivering most (59%) of the top malware families.

The social engineering technique is also the reason why drive-by-compromise is now the top initial access technique, just ahead of phishing.

Common Security Failures

ReliaQuest also revealed why many incident responders are struggling to match the speed and sophistication of modern threat groups. The most common security control failures it found in 2025 were:

  • Insufficient  logging which allows attacks to go undetected
  • Unmanaged devices without security controls like endpoint protection or monitoring agents
  • Insecure VPNs lacking MFA or device-based certificates, which allow attackers to exploit stolen credentials
  • External exposure via vulnerabilities in internet-facing devices
  • Helpdesk procedural flaws which make organizations easy targets for social engineering attacks
  • Poor password policy and controls such as weak, reused, or poorly rotated passwords, and gaps in MFA and local admin password management, enabling quick privileged access and lateral movement
  • Overprivileged and misconfigured cloud accounts, enabling access to these environments

Fighting AI with AI

Mike McPherson, SVP of GreyMatter Operations at ReliaQuest, said AI and automation have “changed the game” in cybersecurity – for attackers and defenders.

“Thankfully defenders can outperform adversaries with agentic AI and achieve an average containment time of four minutes. This speed is essential to rival the breakout times observed this year – a race that manual response, at 16 hours on average without automation, cannot win,” he continued.

“Agentic AI enables organizations to move to predictive security – by analyzing vast datasets of rich threat intelligence, agents can adapt this intel to a customer’s unique environment and close gaps before a threat actor may attack.”

ReliaQuest urged network defenders to ensure all devices and access paths are visible to their security operations (SecOps) teams – especially edge devices. It added that they must continuously manage risk across the external attack surface by maintaining a current inventory of assets and remediating any new exposures.

Finally, CISOs should strengthen identity controls, with high-assurance verification for helpdesk resets and identity changes, minimal standing privileges, and phishing-resistant privileged access.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleAI-powered Cyber-Attacks Up Significantly, Warns CrowdStrike
Next Article Apple Tests End-to-End Encrypted RCS Messaging in iOS 26.4 Developer Beta
Team-CWD
  • Website

Related Posts

Cyber Security

National Gas CTO Darren Curley on IT/OT Security Integration

February 20, 2026
Cyber Security

Industrial-Scale Fake Coretax Apps Drive $2m Fraud in Indonesia

February 19, 2026
Cyber Security

Why Your Organization Should Start Quantum Preparedness Today

February 19, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

How cybercriminals are targeting content creators

November 26, 2025

The hidden risks of browser extensions – and how to avoid them

September 13, 2025

What are brushing scams and how do I stay safe?

December 24, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.