Unit 42 Global Incident Response Report 2026

This year’s Palo Alto Networks report outlines key trends in cyber threats and highlights insights into evolving attack tactics and defensive strategies.

  • Thursday, 26th February 2026 Posted 2 months ago in by Sophie Milburn
Palo Alto Networks has released its latest Unit 42 Global Incident Response Report, analysing more than 750 incidents across 50 countries. The findings provide insight into current cyber threat trends and outline observations on evolving attack strategies and security considerations.

The report notes a shift in how artificial intelligence is being used in cyber attacks. According to the findings, threat actors are operationalising AI to enhance their tactics. It highlights an increase in exfiltration speeds — from five hours to approximately 72 minutes — indicating that AI may be contributing to faster attack execution.

Browsers are identified as significant targets, with 48 percent of incidents involving browser-based activity. The report suggests that routine digital interactions, including email use and access to SaaS tools, can create potential entry points for malicious activity.

Modern cyber threats are described as increasingly complex. The report states that 87 percent of intrusions involve multiple attack surfaces, with some spanning up to 10 different platforms. Attackers are observed coordinating activity across varied infrastructure, including cloud environments, networks, identity systems and SaaS applications.

Identity-related vulnerabilities are also highlighted. In nearly 90 percent of the incidents analysed, weaknesses in identity management contributed to intrusions. Around 65 percent of breaches originated from identity-based techniques, including social engineering. The findings emphasise the importance of strengthening identity controls to reduce risk.

The report also points to a rise in software supply chain breaches, particularly through third-party SaaS applications. The abuse of trusted connections has increased, with APIs and OAuth tokens identified as common vectors for lateral movement within environments.

At the same time, the report notes a decline in encryption-focused extortion. The proportion of incidents involving encryption-based tactics decreased from 92 percent to 78 percent, with attackers increasingly focusing on direct data theft rather than encrypting systems. The report states that the speed and discreet nature of these thefts present challenges for detection and response.

Overall, the Unit 42 report outlines changes in threat activity and highlights areas where organisations may need to review and adapt their security measures in response to evolving tactics.
AvePoint has introduced updates to its Confidence Platform, with a focus on AI data protection, multicloud resilience, and governance capabilities.
inforcer introduces Copilot Manager to support MSPs in delivering AI services, including features related to monitoring and managing Shadow AI usage.
Guardz outlines how AI is influencing cybersecurity, with the report highlighting identity-related issues and vulnerabilities affecting MSPs, based...

Kaseya launches Agentic IT management platform

Posted 9 hours ago by Sophie Milburn
Kaseya has introduced an autonomous IT management system that uses AI and unified data to support IT operations and security management.
Westcon-Comstor has integrated its value-added services into the Microsoft Marketplace, aiming to support partner operations and improve scalability.

Pax8 and NinjaOne forge alliance to enhance SMB security

Posted 12 hours ago by Sophie Milburn
Pax8 teams up with NinjaOne, aiming to strengthen managed service providers through enhanced solutions and security infrastructure for SMBs.

Governing autonomous AI: challenges and solutions

Posted 1 day ago by Sophie Milburn
Exploring identity challenges with AI agents and governance opportunities for secure and scalable AI execution.

The risks of unsupervised AI adoption in UK enterprises

Posted 1 day ago by Sophie Milburn
As UK businesses increasingly adopt AI, risky data-sharing practices arise, underscoring the need for enhanced oversight and security measures.