Decoding the accelerated cyber attack cycle

Rapid7's latest report highlights the shrinking timelines in cyber threat landscapes and underscores the urgency of effective cyber-resilience strategies.

Rapid7 has released its 2026 Global Threat Landscape Report: Decoding the Accelerated Cyber Attack Cycle, a report examining the evolving nature of cyber threats and the increasing speed at which vulnerabilities are exploited.

The report’s findings highlight a notable trend. High and critical severity vulnerabilities have increased, rising from 71 in 2024 to 146 in 2025. At the same time, the window between vulnerability disclosure and confirmed exploitation is becoming shorter, with attackers operationalising vulnerabilities within days of disclosure.

The report combines multiple data sources, including vulnerability publication data and incident response metrics, to provide a broader view of how exposure can lead to compromise. Key observations include:

  • Accelerating Exploitation: The number of high-risk vulnerabilities indicates that these are being targeted soon after disclosure.
  • Shrinking Weaponisation Timelines: The time from vulnerability disclosure to inclusion in security databases has decreased, particularly for high-severity vulnerabilities.
  • Identity as a Key Target: Issues related to multi-factor authentication account for a significant portion of investigations, making identity a common access vector.
  • Ransomware Activity: Ransomware continues to be involved in a substantial share of incident responses and is increasing in scale and frequency.
  • Use of AI by Threat Actors: AI is increasingly being used to support attack development, including phishing content creation and other techniques.

The report notes that organisations need to respond more quickly to vulnerabilities as the time between disclosure and exploitation continues to decrease. The gap between identifying and addressing vulnerabilities is narrowing, making timely remediation and alignment with detection and response processes more important.

In summary, as threat actors increasingly incorporate AI into their activities, organisations are adjusting their approaches to detection and response. This shift highlights the need for timely remediation and co-ordinated security practices to address evolving threats.

Docusign has updated its Intelligent Agreement Management platform in the UK, adding new features...
Ping Identity introduces “Identity for AI,” extending identity and access control to autonomous...
Huntress expands its Managed ITDR coverage to Google Workspace, providing organisations with...
AI adoption is increasing across organisations, despite ongoing concerns around security,...
Teleport reveals Beams, a runtime designed to provide secure, isolated environments and managed...
SentinelOne and Cloudflare integrate AI capabilities to support automated threat detection and...
Fluke Corporation introduces AI-driven enhancements to eMaint CMMS/EAM, aimed at streamlining...
Exploring a framework for AI security and governance focusing on real-world efficacy and...