Decoding the accelerated cyber attack cycle

Rapid7's latest report highlights the shrinking timelines in cyber threat landscapes and underscores the urgency of effective cyber-resilience strategies.

  • Tuesday, 31st March 2026 Posted 2 weeks ago in by Sophie Milburn

Rapid7 has released its 2026 Global Threat Landscape Report: Decoding the Accelerated Cyber Attack Cycle, a report examining the evolving nature of cyber threats and the increasing speed at which vulnerabilities are exploited.

The report’s findings highlight a notable trend. High and critical severity vulnerabilities have increased, rising from 71 in 2024 to 146 in 2025. At the same time, the window between vulnerability disclosure and confirmed exploitation is becoming shorter, with attackers operationalising vulnerabilities within days of disclosure.

The report combines multiple data sources, including vulnerability publication data and incident response metrics, to provide a broader view of how exposure can lead to compromise. Key observations include:

  • Accelerating Exploitation: The number of high-risk vulnerabilities indicates that these are being targeted soon after disclosure.
  • Shrinking Weaponisation Timelines: The time from vulnerability disclosure to inclusion in security databases has decreased, particularly for high-severity vulnerabilities.
  • Identity as a Key Target: Issues related to multi-factor authentication account for a significant portion of investigations, making identity a common access vector.
  • Ransomware Activity: Ransomware continues to be involved in a substantial share of incident responses and is increasing in scale and frequency.
  • Use of AI by Threat Actors: AI is increasingly being used to support attack development, including phishing content creation and other techniques.

The report notes that organisations need to respond more quickly to vulnerabilities as the time between disclosure and exploitation continues to decrease. The gap between identifying and addressing vulnerabilities is narrowing, making timely remediation and alignment with detection and response processes more important.

In summary, as threat actors increasingly incorporate AI into their activities, organisations are adjusting their approaches to detection and response. This shift highlights the need for timely remediation and co-ordinated security practices to address evolving threats.

Cato Networks joins Westcon-Comstor's AWS Marketplace

Posted 3 days ago by Sophie Milburn
Westcon-Comstor has added Cato Networks to its AWS Marketplace programme, expanding cloud procurement options for partners.

Atlassian introduces AI-powered 'Remix' for confluence

Posted 3 days ago by Sophie Milburn
Atlassian Corporation has introduced new AI features in Confluence that enable content to be transformed into formats such as charts, infographics,...
Cynomi has enhanced its platform with AI Insights and co-worker Agents, aimed at supporting cybersecurity service delivery for MSPs and MSSPs.

DXC Technology and ServiceNow forge AI partnership

Posted 3 days ago by Sophie Milburn
DXC Technology and ServiceNow have announced a collaboration to integrate AI into enterprise operations across global business functions.

Cloudera updates hybrid data and AI platform capabilities

Posted 3 days ago by Sophie Milburn
Cloudera has announced updates to its hybrid data and AI platform aimed at supporting enterprise data environments.
WatchGuard Technologies has launched a new endpoint security portfolio that introduces changes to traditional EDR licensing models.

SonicWall reveals 2026 Cyber Protect Report

Posted 3 days ago by Sophie Milburn
SonicWall's latest report identifies the 'Seven Deadly Sins of Cybersecurity', focusing on protection outcomes crucial for small and medium-sized...
Hammer AI Works is an end-to-end ecosystem designed to support AI adoption across organisations.