Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Verizon DBIR: Vulnerability Exploits Overtake Credentials

May 20, 2026

Researchers Warn CypherLoc Scareware Has Targeted Millions of Users

May 20, 2026

Mini Shai-Hulud Worm Compromises TanStack, Mistral AI, Guardrails AI & More Packages

May 20, 2026
Facebook X (Twitter) Instagram
Wednesday, May 20
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»Cyber Security»Verizon DBIR: Vulnerability Exploits Overtake Credentials
Cyber Security

Verizon DBIR: Vulnerability Exploits Overtake Credentials

Team-CWDBy Team-CWDMay 20, 2026No Comments4 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


Vulnerability exploitation has overtaken compromised credentials for the first time in nearly two decades as the most common initial access vector for data breaches, according to Verizon.

The tech giant’s Data Breach investigations Report (DBIR) has been providing threat landscape insight to industry professionals for 19 years, based as it is on a variety of Verizon, incident response, law enforcement and industry data on real breaches and incidents.

The latest edition revealed that nearly a third (31%) of data breaches over the past year started with vulnerability exploitation. This is up from 20% in last year’s report.

That made it the top initial access vector, with credential abuse down from 22% to 13%.

Read more on the DBIR: Verizon DBIR: Small Businesses Bearing the Brunt of Ransomware Attacks

Verizon suggested the figures could indicate that AI is already being used by threat actors to find and exploit more vulnerabilities.

However, it’s not just zero-days that are at issue. The report revealed that firms aren’t patching known bugs quickly enough.

Only 26% of critical vulnerabilities listed in the Cybersecurity Infrastructure and Security Agency Known Exploited Vulnerabilities (CISA KEV) catalog were fully remediated by organizations in 2025, a drop from 38% the previous year.

That could be due to the increased patch load. Organizations had 50% more critical vulnerabilities to patch in this year’s reporting dataset versus 2025, Verizon said.

Jon Baker, VP of threat-informed defense at AttackIQ, said organizations are struggling to prioritize patches.

“Security teams are being asked to fix more critical issues, but they still need to know which ones actually create a path to compromise,” he argued. “A vulnerability on paper is one thing, but a vulnerability that can be chained into lateral movement, ransomware deployment, or data theft is something else entirely.”

Patrick Münch, CSO at vulnerability management services firm Mondoo, said manual remediation is letting firms down. “You don’t close the gap with another scanner,” he added. “You close it with transparent agentic AI: humans in the loop on decisions, AI automation on remediation and mitigation execution, and a clear audit trail from identifying the issue to verifying it’s fixed.”

AI Threats to the Fore of the Verizon DBIR

AI is more obviously growing as a threat in other parts of the report.

“The median threat actor researched or used AI assistance in 15 different documented techniques, with some actors leveraging as many as 40 or 50,” it noted.

Shadow AI is also a growing enterprise threat: it’s now the third most common “non-malicious insider action” detected in Verizon’s data loss prevention (DLP) dataset, a fourfold percentage increase from last year.

Some 45% of employees are now regular users of managed and unmanaged AI on their corporate devices, up from 15% last year.

Supply Chains and Social Engineering

Elsewhere in the report, mobile users were targeted more frequently by social engineering attacks over the past year, as individuals got better at spotting phishing attempts via other channels.

In phishing simulations, the median rate of successful “click” rates in mobile vectors like voice and text is 40% higher than via email, Verizon claimed. The “human element” was present in 62% of breaches, up slightly from 60% last year.

Supply chain-related breaches also surged, by 60% annually, to account for nearly half (48%) of all data breaches recorded in the report.

Just 23% of third-party organizations fully remediated missing or improperly secured multifactor authentication (MFA) on their cloud accounts. For weak passwords and permission misconfigurations, time to resolve 50% of all findings reached almost eight months.

As a share of breaches, ransomware nudged up from 44% last year to 48% this, but 69% of victims elected not to pay, squeezing threat actor margins.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleResearchers Warn CypherLoc Scareware Has Targeted Millions of Users
Team-CWD
  • Website

Related Posts

Cyber Security

Bank of England, FCA and Treasury Raise Alarm Over Frontier AI

May 18, 2026
Cyber Security

What Fronter AI Models Like Mythos & GPT-Cyber Mean for Cybersecurity

May 15, 2026
Cyber Security

Interview: How Alpine’s Head of IT Secures an F1 Team

May 14, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Target Crypto Firms with ClickFix and Zoom Lures

April 29, 202610 Views

Why SOC Burnout Can Be Avoided: Practical Steps

November 14, 20259 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Target Crypto Firms with ClickFix and Zoom Lures

April 29, 202610 Views
Our Picks

Can password managers get hacked? Here’s what to know

November 14, 2025

Here’s how to avoid a ‘second strike’

April 11, 2026

Look out for phony verification pages spreading malware

September 14, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.