Decoding the accelerated cyber attack cycle

Rapid7's latest report highlights the shrinking timelines in cyber threat landscapes and underscores the urgency of effective cyber-resilience strategies.

  • Tuesday, 31st March 2026 Posted 3 hours ago in by Sophie Milburn

Rapid7 has released its 2026 Global Threat Landscape Report: Decoding the Accelerated Cyber Attack Cycle, a report examining the evolving nature of cyber threats and the increasing speed at which vulnerabilities are exploited.

The report’s findings highlight a notable trend. High and critical severity vulnerabilities have increased, rising from 71 in 2024 to 146 in 2025. At the same time, the window between vulnerability disclosure and confirmed exploitation is becoming shorter, with attackers operationalising vulnerabilities within days of disclosure.

The report combines multiple data sources, including vulnerability publication data and incident response metrics, to provide a broader view of how exposure can lead to compromise. Key observations include:

  • Accelerating Exploitation: The number of high-risk vulnerabilities indicates that these are being targeted soon after disclosure.
  • Shrinking Weaponisation Timelines: The time from vulnerability disclosure to inclusion in security databases has decreased, particularly for high-severity vulnerabilities.
  • Identity as a Key Target: Issues related to multi-factor authentication account for a significant portion of investigations, making identity a common access vector.
  • Ransomware Activity: Ransomware continues to be involved in a substantial share of incident responses and is increasing in scale and frequency.
  • Use of AI by Threat Actors: AI is increasingly being used to support attack development, including phishing content creation and other techniques.

The report notes that organisations need to respond more quickly to vulnerabilities as the time between disclosure and exploitation continues to decrease. The gap between identifying and addressing vulnerabilities is narrowing, making timely remediation and alignment with detection and response processes more important.

In summary, as threat actors increasingly incorporate AI into their activities, organisations are adjusting their approaches to detection and response. This shift highlights the need for timely remediation and co-ordinated security practices to address evolving threats.

A recent global study explores the role of trust in cybersecurity and its influence on risk and decision-making, highlighting key challenges...

Flare launches Foretrace for employee identity protection

Posted 3 hours ago by Sophie Milburn
Flare introduces Foretrace, providing employees with tools to help monitor and address personal identity risks within the enterprise environment.

Inside the Race: Insights from Pax8’s Mission Briefing

Posted 7 hours ago by Sophie Milburn
From Red Bull Racing HQ, Pax8’s Mission Briefing explored a channel under pressure, where rising complexity and the rapid growth of AI are...
Docusign has updated its Intelligent Agreement Management platform in the UK, adding new features for contract preparation, processing, and...

Empowering AI with secure identity control

Posted 4 days ago by Sophie Milburn
Ping Identity introduces “Identity for AI,” extending identity and access control to autonomous enterprise agents with real-time enforcement and...

Huntress extends ITDR solution to Google Workspace

Posted 6 days ago by Sophie Milburn
Huntress expands its Managed ITDR coverage to Google Workspace, providing organisations with enhanced detection and response for identity-based...
DigiCert updates its Document Trust Manager to support document security and global compliance as digital document use and AI-related risks increase.
AI adoption is increasing across organisations, despite ongoing concerns around security, governance, and compliance.