Decoding the accelerated cyber attack cycle

Rapid7's latest report highlights the shrinking timelines in cyber threat landscapes and underscores the urgency of effective cyber-resilience strategies.

  • Tuesday, 31st March 2026 Posted 1 month ago in by Sophie Milburn

Rapid7 has released its 2026 Global Threat Landscape Report: Decoding the Accelerated Cyber Attack Cycle, a report examining the evolving nature of cyber threats and the increasing speed at which vulnerabilities are exploited.

The report’s findings highlight a notable trend. High and critical severity vulnerabilities have increased, rising from 71 in 2024 to 146 in 2025. At the same time, the window between vulnerability disclosure and confirmed exploitation is becoming shorter, with attackers operationalising vulnerabilities within days of disclosure.

The report combines multiple data sources, including vulnerability publication data and incident response metrics, to provide a broader view of how exposure can lead to compromise. Key observations include:

  • Accelerating Exploitation: The number of high-risk vulnerabilities indicates that these are being targeted soon after disclosure.
  • Shrinking Weaponisation Timelines: The time from vulnerability disclosure to inclusion in security databases has decreased, particularly for high-severity vulnerabilities.
  • Identity as a Key Target: Issues related to multi-factor authentication account for a significant portion of investigations, making identity a common access vector.
  • Ransomware Activity: Ransomware continues to be involved in a substantial share of incident responses and is increasing in scale and frequency.
  • Use of AI by Threat Actors: AI is increasingly being used to support attack development, including phishing content creation and other techniques.

The report notes that organisations need to respond more quickly to vulnerabilities as the time between disclosure and exploitation continues to decrease. The gap between identifying and addressing vulnerabilities is narrowing, making timely remediation and alignment with detection and response processes more important.

In summary, as threat actors increasingly incorporate AI into their activities, organisations are adjusting their approaches to detection and response. This shift highlights the need for timely remediation and co-ordinated security practices to address evolving threats.

AI trust fails to keep pace with rate of adoption

Posted 4 days ago by Phil Alsop
Two thirds of organisations (64 per cent) are actively using artificial intelligence across the UK, a 12 per cent increase from last year according...

AI adoption is accelerating identity sprawl

Posted 4 days ago by Phil Alsop
Keeper Security has released its latest global insight report, “Identity Security at Machine Speed.”

Surge in AI-enabled cybercrime

Posted 4 days ago by Phil Alsop
Fortinet leverages threat intelligence to disrupt global cybercrime, transforming awareness into actionable insights.
Study finds most organizations recognize the need for connected data, content, and workflows, but few have built the operational foundation required...
A third (35%) of European organisations cannot say whether they have been hit by an AI-powered cyberattack, according to the latest AI Pulse Poll...
Nearly half of European organisations spend up to €5 million a year on cloud – yet a quarter of capacity sits idle.

AI-Driven attacks reshape the MSP threat landscape

Posted 1 week ago by Phil Alsop
New research shows session hijacking surging 23%, ransomware up 190%, and non-human identities outnumbering users 25:1 as AI accelerates attacks...
Lenovo research highlights a growing AI execution gap as organizations struggle to control and operate AI across their environments.