• About Us
  • Privacy Policy
  • Disclaimer
  • Contact Us
TechTrendFeed
  • Home
  • Tech News
  • Cybersecurity
  • Software
  • Gaming
  • Machine Learning
  • Smart Home & IoT
No Result
View All Result
  • Home
  • Tech News
  • Cybersecurity
  • Software
  • Gaming
  • Machine Learning
  • Smart Home & IoT
No Result
View All Result
TechTrendFeed
No Result
View All Result

Verizon 2026 DBIR: 6 key takeaways for CISOs

Admin by Admin
May 23, 2026
Home Cybersecurity
Share on FacebookShare on Twitter


The menace panorama is present process fast and unprecedented change, as mirrored within the “Verizon 2026 Information Breach Investigations Report.” For the primary time within the report’s 19-year historical past, vulnerability exploitation was the main preliminary entry vector, displacing credential abuse from the highest spot. It was additionally the primary yr that researchers documented an AI-executed state-sponsored assault, bringing the hypothetical and experimental into actuality.

However the extra issues change, the extra they keep the identical.

“The 2026 version of the DBIR invitations you to think about the significance of the basics of cybersecurity as one of the best ways to courageous all of this transformation,” the report reads. “A bit of cyber-stoicism, if you’ll.”

Merely put, the tried-and-true greatest practices safety groups have relied on for years — from visibility and patching to MFA and insurance policies — are key to successful the combat towards cyberattackers.

Under are six key takeaways from the 2026 DBIR for CISOs and their groups.

Vulnerability exploitation overtakes stolen credentials

Exploiting vulnerabilities turned the commonest technique menace actors use to achieve preliminary entry to victims’ networks — accounting for 31% of assaults, up from 20% in 2024 — displacing credential abuse because the longstanding main vector.

Organizations are clearly struggling to remediate flaws, with the DBIR reporting that solely 26% of CISA’s Identified Exploited Vulnerabilities (KEVs) have been absolutely remediated in 2025, down from 38% the earlier yr. To make issues worse, the report famous, median remediation time elevated from 32 days to 43 days, maybe partly as a result of the median variety of KEVs was 16 in 2025, up from 11 in 2024.

As a result of the report’s information set spans October 2024 by way of November 2025, it predates the discharge of Mythos, suggesting future studies may see even greater ranges of vulnerability exploitation.

Credential abuse dropped to 13% from 22%, partially attributed to the addition of pretexting as an preliminary entry vector (extra on that beneath).

Vulnerability administration and patching recommendation

Unhealthy information and excellent news on ransomware

Ransomware proved but once more that it is the menace that retains on threatening. Practically half of all incidents (48%) concerned some type of ransomware, up from 44% within the earlier reporting interval.

On the considerably optimistic aspect, 69% of victims didn’t pay the ransom, and the median ransomware cost decreased from $150,000 to $139,875.

Ransomware recommendation

Shadow AI turns into a serious insider danger

Regardless of a slight year-over-year decline, use of noncorporate GenAI accounts on company gadgets stays widespread, with 67% of customers nonetheless counting on them to entry AI providers. AI adoption amongst workers has accelerated: 45% are actually common customers of AI instruments, approved or in any other case, in contrast with simply 15% in 2024.

Shadow AI was named the third commonest nonmalicious insider danger detected within the DBIR’s information loss prevention (DLP) information set, a 400% enhance from 2024. The DBIR discovered customers generally leak supply code, pictures and different structured information to GenAI fashions, and that 3.2% of DLP coverage violations contain workers leaking mental property, reminiscent of analysis or technical documentation, to LLMs.

AI safety recommendation

Third-party assaults account for nearly half of all breaches

Breaches involving third events elevated by 60%, accounting for 48% of all breaches in 2025 in comparison with 30% in 2024.

The DBIR breaks provide chain breaches into three classes:

  • Vendor in a corporation’s software program provide chain. The preliminary entry vector was underneath the group’s management. This could possibly be a vulnerability in a vendor’s product, for instance, the SolarWinds breach.
  • Vendor internet hosting a corporation’s information in its setting. Preliminary entry was towards a vendor that shops the group’s information. For instance, the Snowflake assault.
  • Vendor with a connection to a corporation’s setting. Preliminary entry is on the seller, with lateral motion into the group. For instance, the Goal breach.

The report famous that “at first look, there does not seem like something that would have been finished to stop these from the sufferer group’s perspective,” however nearer evaluation of the basis causes of many incidents involving third events boils right down to “insecure authentication — absence of MFA, improper credential rotation — or lack of least privilege enforcement for customers or service accounts.”

Third-party and provide chain safety recommendation

Social engineering techniques shift barely

Whereas e mail phishing stays the social engineering vector of selection, many menace actors at present goal victims on their cell gadgets — and are probably seeing better success. The DBIR famous that mobile-centric voice- or text-based scams achieved a 40% greater click-through price in phishing simulations than email-based campaigns. The report proposed that attackers try to bypass conventional enterprise phishing defenses by infiltrating customers’ gadgets.

Additionally, pretexting was separated from credential misuse on this yr’s DBIR, accounting for six% of preliminary entry vectors. Whereas the identical proportion because the earlier report, the DBIR justified its addition as an preliminary entry vector as a result of its use in high-profile ransomware breaches analyzed for the report.

Phishing scams, the report defined, contain asynchronous social actions that end in a sufferer sharing credentials, downloading malicious information or clicking spoofed hyperlinks, for instance. Pretexting includes a synchronous element — reminiscent of an attacker establishing a trusted relationship with the sufferer earlier than manipulating them into sharing delicate information or transferring cash.

“If there may be somebody on the opposite aspect of the proverbial line interacting with you to do one thing you should not, that is pretexting,” the report famous.

Social engineering and phishing recommendation

AI is altering how attackers assault

DBIR researchers collaborated with Anthropic to uncover how menace actors use AI platforms for malicious functions. Categorised towards the Mitre ATT&CK framework, DBIR and Anthropic researchers discovered that attackers used AI throughout 15 ATT&CK methods, with some utilizing as many as 40 or 50.

For instance, menace actors use GenAI to develop malware, goal victims, acquire preliminary entry and carry out primary duties reminiscent of file obfuscation or forensic cleanup. The researchers discovered that lower than 2.5% of the AI-assisted actions concerned unusual methods. In different phrases, attackers usually use AI to automate and scale well-known methods relatively than create novel or uncommon assaults.

“However who is aware of? Given the speed of change in AI capabilities, this evaluation may be out of date by the point this report is lastly revealed,” the report mentioned.

The report and its findings additionally precede the information surrounding Mythos and Glasswing, developments that would reshape how menace actors use AI.

AI safety recommendation

Sharon Shea is government editor of TechTarget Safety.

Tags: CISOsDBIRKeyTakeawaysVerizon
Admin

Admin

Next Post
Highlights from the Dialogues stage

Highlights from the Dialogues stage

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Trending.

Safety Amplified: Audio’s Affect Speaks Volumes About Preventive Safety

Safety Amplified: Audio’s Affect Speaks Volumes About Preventive Safety

May 18, 2025
Reconeyez Launches New Web site | SDM Journal

Reconeyez Launches New Web site | SDM Journal

May 15, 2025
Apollo joins the Works With House Assistant Program

Apollo joins the Works With House Assistant Program

May 17, 2025
Discover Vibrant Spring 2025 Kitchen Decor Colours and Equipment – Chefio

Discover Vibrant Spring 2025 Kitchen Decor Colours and Equipment – Chefio

May 17, 2025
Flip Your Toilet Right into a Good Oasis

Flip Your Toilet Right into a Good Oasis

May 15, 2025

TechTrendFeed

Welcome to TechTrendFeed, your go-to source for the latest news and insights from the world of technology. Our mission is to bring you the most relevant and up-to-date information on everything tech-related, from machine learning and artificial intelligence to cybersecurity, gaming, and the exciting world of smart home technology and IoT.

Categories

  • Cybersecurity
  • Gaming
  • Machine Learning
  • Smart Home & IoT
  • Software
  • Tech News

Recent News

Highlights from the Dialogues stage

Highlights from the Dialogues stage

May 23, 2026
Verizon 2026 DBIR: 6 key takeaways for CISOs

Verizon 2026 DBIR: 6 key takeaways for CISOs

May 23, 2026
  • About Us
  • Privacy Policy
  • Disclaimer
  • Contact Us

© 2025 https://techtrendfeed.com/ - All Rights Reserved

No Result
View All Result
  • Home
  • Tech News
  • Cybersecurity
  • Software
  • Gaming
  • Machine Learning
  • Smart Home & IoT

© 2025 https://techtrendfeed.com/ - All Rights Reserved