惯性聚合 高效追踪和阅读你感兴趣的博客、新闻、科技资讯
阅读原文 在惯性聚合中打开

推荐订阅源

宝玉的分享
宝玉的分享
WordPress大学
WordPress大学
博客园 - 司徒正美
美团技术团队
酷 壳 – CoolShell
酷 壳 – CoolShell
奇客Solidot–传递最新科技情报
奇客Solidot–传递最新科技情报
小众软件
小众软件
量子位
阮一峰的网络日志
阮一峰的网络日志
Apple Machine Learning Research
Apple Machine Learning Research
有赞技术团队
有赞技术团队
博客园 - 【当耐特】
博客园 - Franky
Jina AI
Jina AI
人人都是产品经理
人人都是产品经理
cs.CV updates on arXiv.org
cs.CV updates on arXiv.org
T
Threat Research - Cisco Blogs
D
Darknet – Hacking Tools, Hacker News & Cyber Security
F
Fox-IT International blog
T
ThreatConnect
A
Arctic Wolf
让小产品的独立变现更简单 - ezindie.com
让小产品的独立变现更简单 - ezindie.com
Last Week in AI
Last Week in AI
C
CERT Recently Published Vulnerability Notes
P
Palo Alto Networks Blog
李成银的技术随笔
Project Zero
Project Zero
Threat Intelligence Blog | Flashpoint
Threat Intelligence Blog | Flashpoint
The Register - Security
The Register - Security
F
Full Disclosure
H
Hacker News: Front Page
雷峰网
雷峰网
cs.AI updates on arXiv.org
cs.AI updates on arXiv.org
S
SegmentFault 最新的问题
S
Schneier on Security
T
Tor Project blog
博客园_首页
月光博客
月光博客
大猫的无限游戏
大猫的无限游戏
博客园 - 聂微东
S
Securelist
C
Comments on: Blog
cs.CL updates on arXiv.org
cs.CL updates on arXiv.org
钛媒体:引领未来商业与生活新知
钛媒体:引领未来商业与生活新知
Attack and Defense Labs
Attack and Defense Labs
IT之家
IT之家
博客园 - 叶小钗
J
Java Code Geeks
freeCodeCamp Programming Tutorials: Python, JavaScript, Git & More
CTFtime.org: upcoming CTF events
CTFtime.org: upcoming CTF events

Search Security Resources and Information from TechTarget

Identity security for AI agents: The proliferation challenge How to build a business impact analysis checklist Taking care of business: The CISO's role in a cyber crisis What CISOs need to know about AI audit logs SOC vs. MDR: What CISOs need to consider Instructure cyberattack reignites ransom payment debate Transform SIEM rules with behavior-based threat detection CISO's guide: How to test an incident response plan How to implement zero trust for AI Data after the breach: Economics of the dark web The breakup: Why CISOs are decoupling data from their SIEMs News brief: Security worries and warnings as AI use expands How to construct an effective security controls evaluation 5 leading enterprise password managers to consider Claude Mythos changes the AI security threat matrix Buyer's guide for CISOs: Cloud security posture management 6 things to check in your cyber insurance policy fine print How cyber insurance helped with breach recovery -- or not News brief: Critical infrastructure, OT cybersecurity attacks Tape's strategic role in modern data protection Top zero-trust use cases in the enterprise What every CISO should consider before a SIEM migration CISO's guide to centralized vs. federated security models What are the most common authentication methods? What are the most common authentication methods? Shadow code: The hidden threat for enterprise IT How to fix cybersecurity's agentic AI identity crisis 5 top SIEM use cases in the enterprise Top 8 e-signature software providers for 2026 How do digital signatures work? News brief: AI woes continue for security leaders Deepfake era demands proof-based security, not just awareness Is SOAR dead or alive? Sort of The push for digital sovereignty: What CISOs need to know Beyond awareness: Human risk management metrics for CISOs Cybersecurity in the age of AI means bigger, faster threats At RSAC 2026, AI optimism and anxiety -- and an MIA U.S. government Inside the SOC that secured RSAC 2026 Conference How to roll out an enterprise passkey deployment How to improve the SOC analyst experience -- and why it matters How contact centers detect and prevent fraud News brief: Iranian cyberattacks target U.S. water, energy CISO checklist: Cybersecurity platform or marketing ploy? RSAC 2026 Conference: Key news and industry analysis | TechTarget Next-generation firewall buyer's guide for CISOs Contact center monitoring best practices for CX leaders RSAC 2026: Cyber insurance and the rise of ransomware Agentic AI's role in amplifying and creating insider risks RSAC 2026 recap: AI security and network security trends Identity security at RSAC 2026: The new enterprise dynamics Meaningful metrics demonstrate the value of cyber-resiliency What to know about red team testing and the law News brief: Iran cyberattacks escalate, U.S. targets named 5 top SOC-as-a-service providers and how to evaluate them Cloud security architecture: Enterprise cloud blueprint for CISOs Contact center compliance checklist for modern workforces How AI caught a malicious North Korean insider at Exabeam Watch your words: Tim Brown's advice for CISOs News brief: U.S. absence at RSAC sparks leadership concerns Network security management challenges and best practices 10 enterprise secure remote access best practices
Verizon 2026 DBIR: 6 key takeaways for CISOs
2026-05-23 · via Search Security Resources and Information from TechTarget

The threat landscape is undergoing rapid and unprecedented change, as reflected in the "Verizon 2026 Data Breach Investigations Report." For the first time in the report's 19-year history, vulnerability exploitation was the leading initial access vector, displacing credential abuse from the top spot. It was also the first year that researchers documented an AI-executed state-sponsored attack, bringing the hypothetical and experimental into reality.

But the more things change, the more they stay the same.

"The 2026 edition of the DBIR invites you to consider the importance of the fundamentals of cybersecurity as the best way to brave all of this change," the report reads. "A little cyber-stoicism, if you will."

Simply put, the tried-and-true best practices security teams have relied on for years -- from visibility and patching to MFA and policies -- are key to winning the fight against cyberattackers.

Below are six key takeaways from the 2026 DBIR for CISOs and their teams.

Vulnerability exploitation overtakes stolen credentials

Exploiting vulnerabilities became the most common method threat actors use to gain initial access to victims' networks -- accounting for 31% of attacks, up from 20% in 2024 -- displacing credential abuse as the longstanding leading vector.

Organizations are clearly struggling to remediate flaws, with the DBIR reporting that only 26% of CISA's Known Exploited Vulnerabilities (KEVs) were fully remediated in 2025, down from 38% the previous year. To make matters worse, the report noted, median remediation time increased from 32 days to 43 days, perhaps in part because the median number of KEVs was 16 in 2025, up from 11 in 2024.

Because the report's data set spans October 2024 through November 2025, it predates the release of Mythos, suggesting future reports could see even higher levels of vulnerability exploitation.

Credential abuse dropped to 13% from 22%, partially attributed to the addition of pretexting as an initial access vector (more on that below).

Vulnerability management and patching advice

Bad news and good news on ransomware

Ransomware proved yet again that it's the threat that keeps on threatening. Nearly half of all incidents (48%) involved some form of ransomware, up from 44% in the previous reporting period.

On the somewhat positive side, 69% of victims did not pay the ransom, and the median ransomware payment decreased from $150,000 to $139,875.

Ransomware advice

Shadow AI becomes a major insider risk

Despite a slight year-over-year decline, use of noncorporate GenAI accounts on corporate devices remains widespread, with 67% of users still relying on them to access AI services. AI adoption among employees has accelerated: 45% are now regular users of AI tools, authorized or otherwise, compared with just 15% in 2024.

Shadow AI was named the third most common nonmalicious insider risk detected in the DBIR's data loss prevention (DLP) data set, a 400% increase from 2024. The DBIR found users commonly leak source code, images and other structured data to GenAI models, and that 3.2% of DLP policy violations involve employees leaking intellectual property, such as research or technical documentation, to LLMs.

AI security advice

Third-party attacks account for almost half of all breaches

Breaches involving third parties increased by 60%, accounting for 48% of all breaches in 2025 compared to 30% in 2024.

The DBIR breaks supply chain breaches into three categories:

  • Vendor in an organization's software supply chain. The initial access vector was under the organization's control. This could be a vulnerability in a vendor's product, for example, the SolarWinds breach.
  • Vendor hosting an organization's data in its environment. Initial access was against a vendor that stores the organization's data. For example, the Snowflake attack.
  • Vendor with a connection to an organization's environment. Initial access is on the vendor, with lateral movement into the organization. For example, the Target breach.

The report noted that "at first glance, there doesn't appear to be anything that could have been done to prevent these from the victim organization's perspective," but closer analysis of the root causes of many incidents involving third parties boils down to "insecure authentication -- absence of MFA, improper credential rotation -- or lack of least privilege enforcement for users or service accounts."

Third-party and supply chain security advice

Social engineering tactics shift slightly

While email phishing remains the social engineering vector of choice, many threat actors today target victims on their mobile devices -- and are possibly seeing greater success. The DBIR noted that mobile-centric voice- or text-based scams achieved a 40% higher click-through rate in phishing simulations than email-based campaigns. The report proposed that attackers are trying to circumvent traditional enterprise phishing defenses by infiltrating users' devices.

Also, pretexting was separated from credential misuse in this year's DBIR, accounting for 6% of initial access vectors. While the same percentage as the previous report, the DBIR justified its addition as an initial access vector due to its use in high-profile ransomware breaches analyzed for the report.

Phishing scams, the report explained, involve asynchronous social actions that result in a victim sharing credentials, downloading malicious files or clicking spoofed links, for example. Pretexting involves a synchronous component -- such as an attacker establishing a trusted relationship with the victim before manipulating them into sharing sensitive data or transferring money.

"If there is someone on the other side of the proverbial line interacting with you to do something you shouldn't, that's pretexting," the report noted.

Social engineering and phishing advice

AI is changing how attackers attack

DBIR researchers collaborated with Anthropic to uncover how threat actors use AI platforms for malicious purposes. Classified against the Mitre ATT&CK framework, DBIR and Anthropic researchers found that attackers used AI across 15 ATT&CK techniques, with some using as many as 40 or 50.

For example, threat actors use GenAI to develop malware, target victims, gain initial access and perform basic tasks such as file obfuscation or forensic cleanup. The researchers found that less than 2.5% of the AI-assisted actions involved uncommon techniques. In other words, attackers often use AI to automate and scale well-known techniques rather than create novel or rare attacks.

"But who knows? Given the rate of change in AI capabilities, this assessment might be obsolete by the time this report is finally published," the report said.

The report and its findings also precede the news surrounding Mythos and Glasswing, developments that could reshape how threat actors use AI.

AI security advice

Sharon Shea is executive editor of TechTarget Security.