AI arms race: accelerated threat dynamics in 2026

The unveiling of CrowdStrike's 2026 Global Threat Report highlights a surge in AI-enabled threats, shrinking defenders' response time.

  • Tuesday, 3rd March 2026 Posted 1 month ago in by Sophie Milburn
The 2026 Global Threat Report released by CrowdStrike outlines how AI is accelerating adversary capabilities and expanding the enterprise attack surface. In 2025, the average eCrime breakout time fell to 29 minutes, with the fastest observed breakout occurring in 27 seconds.

Adversaries are using AI to target organisations, including injecting malicious prompts into generative AI tools at more than 90 organisations and exploiting vulnerabilities in AI development platforms. The report notes that as technological innovation advances, adversaries continue to adapt their methods to take advantage of new systems.

According to the analysis, AI-enabled adversaries increased their activity by 89% year over year, using AI for reconnaissance, credential theft and evasion. Intrusions are occurring more quickly and are increasingly difficult to detect, moving through trusted identities, SaaS applications and cloud infrastructure while reducing the time available for defenders to respond. In this environment, AI is both a tool used by attackers and a target in its own right.

Key findings from the report include:
  • AI as an Attack Surface: Adversaries injected malicious prompts into legitimate generative AI tools at more than 90 organisations to generate commands for credential theft and cryptocurrency theft. They also exploited vulnerabilities in AI development platforms to establish persistence and deploy ransomware, and created malicious AI servers impersonating trusted services to intercept sensitive data.
  • Record Breakout Times: The average eCrime breakout time fell to 29 minutes, representing a 65% increase in speed compared with 2024. The fastest observed breakout occurred in 27 seconds. In one case, data exfiltration began within four minutes of initial access.
  • Nation-State and eCrime Activity: AI-enabled adversaries increased operations by 89%. Russia-nexus actor FANCY BEAR deployed LLM-enabled malware known as LAMEHUG to automate reconnaissance and document collection. eCrime actor PUNK SPIDER used AI-generated scripts to accelerate credential dumping and remove forensic evidence. DPRK-nexus actor FAMOUS CHOLLIMA used AI-generated personas to scale insider operations. China-nexus activity increased by 38% in 2025, with 67% of exploited vulnerabilities delivering immediate system access and 40% targeting internet-facing edge devices. DPRK-linked incidents rose by more than 130%, and PRESSURE CHOLLIMA’s $1.46 billion cryptocurrency theft was the largest single financial theft reported.
  • Zero-Day and Cloud Exploitation: Forty-two per cent of vulnerabilities were exploited before public disclosure. Cloud-focused intrusions increased by 37% overall, including a 266% rise in activity from state-linked threat actors targeting cloud environments for intelligence collection.

Adam Meyers, head of counter adversary operations at CrowdStrike, said that breakout time reflects how quickly intrusion methods are evolving, and that security teams must operate at greater speed to respond effectively to modern threats.
F5 has introduced new threat intelligence resources designed to support assessment of AI model security. Monthly updated leaderboards provide...
Distology has partnered with Snyk to bring AI security tools to its partner network across Northern Europe, supporting demand for application...

UK's small business leaders embrace AI for growth

Posted 2 days ago by Sophie Milburn
A survey reveals that ambitious small business owners in the UK view AI as pivotal for their growth strategies.
As UK IT leaders face increasing pressure from complex AI-driven infrastructure, many plan to enhance observability spend and consolidate tools for...
Red Hat and Google Cloud have expanded their collaboration, introducing Red Hat OpenShift in the Google Cloud Console to support application...

Keepit report reveals state of SaaS recovery readiness

Posted 2 days ago by Sophie Milburn
The Keepit Annual Data Report 2026 shows varying disaster recovery maturity across organisations and highlights the importance of structured testing.
Despite a decrease in ransomware incidents, evolving technologies and global tensions signal a complex risk landscape for organisations in February...
BakerHostetler’s 2025 report examines cybersecurity threats, regulatory developments, and incident response trends, offering an overview for...