Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

AWS Warns Hackers Have Abused Cisco Firewall Zero-Day Since January

March 19, 2026

UNC6426 Exploits nx npm Supply-Chain Attack to Gain AWS Admin Access in 72 Hours

March 19, 2026

Vidar Stealer 2.0 Exploits Fake Game Cheats on GitHub, Reddit

March 19, 2026
Facebook X (Twitter) Instagram
Thursday, March 19
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»AI-Enabled Adversaries Compress Time-to-Exploit – Infosecurity Magazine
News

AI-Enabled Adversaries Compress Time-to-Exploit – Infosecurity Magazine

Team-CWDBy Team-CWDMarch 18, 2026No Comments2 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


AI and automation helped threat actors to rapidly accelerate attacks in 2025, collapsing the “predictive window” between vulnerability disclosure and exploitation, according to Rapid7.

The security vendor’s new 2026 Global Threat Landscape Report is based on Rapid7 MDR incident response investigations and other internal data.

It claimed that “what once unfolded over weeks now materializes in days, and in some cases, minutes.”

To that end, the median time between publication of a vulnerability and its inclusion on CISA’s Known Exploited Vulnerabilities (KEV) catalog dropped from 8.5 days to five days, while mean time dropped from 61 days to 28.5 days.

Read more on vulnerability exploitation: Time to Exploit Plummets as N-Day Flaws Dominate

Rapid7 claimed that there’s not been a transformation in threat actor “intent or sophistication,” but instead an acceleration of existing methods.

“AI is being used to scale reconnaissance, automate decision making and industrialize social engineering, compressing the time between exposure and exploitation,” it noted.

“Our findings show that the majority of successful intrusions still originate from known, preventable conditions: exposed services, weak identity controls and unpatched edge infrastructure. What has changed is how quickly those conditions are discovered and weaponized.”

Vulnerability Exploitation Has Surged

As well as the speed of exploitation, total volumes also increased last year as AI and automation helped threat actors identify CVEs and streamline attacks.

Confirmed exploitation of newly disclosed CVSS 7 to 10 vulnerabilities increased 105% year on year (YoY), from 71 in 2024 to 146 in 2025.

Most were either deserialization, authentication bypass or memory corruption vulnerabilities, the report claimed. In ransomware, these tended to appear in file transfer systems, edge appliances, and collaboration platforms.

Overall, vulnerability exploitation accounted for 25% of initial access in incident response incidents last year, with exposed services on 7%. However, the most common vector was “valid account / no MFA” (44%), highlighting the persistent challenge of identity-related threats.

Rapid7 argued that CISOs must respond with a greater focus on preventative measures that help to reduce the size of the attack surface.

“Pre-emptive security means reducing the conditions attackers rely on before exploitation occurs, detecting and responding with full environmental context, and prioritizing action based on material risk, not alert volume,” the report explained.

“Organizations that fail to adopt this approach face a widening asymmetry: as attacker velocity increases, reactive decision models become increasingly misaligned with how risk now materializes.” 



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleA Webinar Guide to Auditing Modern Agentic Workflows
Next Article Five Malicious Rust Crates and AI Bot Exploit CI/CD Pipelines to Steal Developer Secrets
Team-CWD
  • Website

Related Posts

News

AWS Warns Hackers Have Abused Cisco Firewall Zero-Day Since January

March 19, 2026
News

UNC6426 Exploits nx npm Supply-Chain Attack to Gain AWS Admin Access in 72 Hours

March 19, 2026
News

Vidar Stealer 2.0 Exploits Fake Game Cheats on GitHub, Reddit

March 19, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views

Near-ultrasonic attacks on voice assistants

September 11, 20256 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views
Our Picks

Is it OK to let your children post selfies online?

February 17, 2026

Is it time for internet services to adopt identity verification?

January 14, 2026

Beware of Winter Olympics scams and other cyberthreats

February 2, 2026

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.