• Home
  • Altcoin
  • Bitcoin
  • Blockchain
  • Cryptocurrency
  • DeFi
  • Dogecoin
  • Ethereum
  • Legal Hub
  • More
    • Market & Analysis
    • NFTs
    • XRP
    • Regulations
  • Shop
    • Bitcoin Coin
    • Bitcoin Hat
    • Bitcoin Book
    • Bitcoin Miner
    • Bitcoin Standard
    • Bitcoin Miner Machine
    • Bitcoin Merch
    • Bitcoin Wallet
    • Bitcoin Shirt
No Result
View All Result
Card Bitcoin
Shop
Card Bitcoin
No Result
View All Result
Home NFTs

Cyberattackers are moving faster to break your network – how to fight back

by n70products
March 24, 2026
in NFTs
0
Cyberattackers are moving faster to break your network – how to fight back
74
SHARES
1.2k
VIEWS
Share on FacebookShare on Twitter


111fasterattacksgettyimages-1168836247

Yuichiro Chino/Moment via Getty Images

Follow ZDNET: Add us as a preferred source on Google.


ZDNET's key takeaways

  • Attacks on enterprise networks are getting faster.
  • Cybercriminals are using AI, but humans are still the weakest link.
  • Defending against attacks requires structural changes to the network.

Here's the paradox of modern cyberwarfare: Increasingly, the attackers are using machines that can work orders of magnitude faster than the humans who control them. In response, the targets are increasingly turning to automated systems to detect and repel those intruders.

But in this machine-versus-machine combat, humans are still at the center of each battle, and those mere mortals continue to be the weak point. That's the conclusion of this year's survey of the enterprise security landscape from Mandiant, a US cybersecurity firm — now part of Google Cloud — that specializes in investigating major global security breaches and advising organizations on how to protect themselves from cyber threats.

Also: 1 in 2 security leaders say they're not ready for AI attacks – 4 actions to take now

Modern enterprise networks are widely distributed and can hand off tasks to partners via software-as-a-service. The bad guys are doing the same thing, Mandiant reports, using a “division of labor” model, in which one group uses low-impact techniques like malicious advertisements or fake browser updates to gain access to a network, then handing off the compromised target to a secondary group for hands-on access.

And this all happens at a startling pace. In 2022, Mandiant reports, this “time to hand-off was more than 8 hours. In 2025, that window had shrunk to an average of just 22 seconds. Likewise, the mean time to compromise systems with zero-day exploits is also plummeting, with the mean time to exploit vulnerabilities dropping to seven days before vendors have had time to issue a patch.

Identifying the attackers

According to Mandiant, the majority of secondary groups that are conducting “hands-on-keyboard operations” in compromised enterprise networks can be divided into two groups with distinctly different tactics and pacing. Cybercriminals are after financial gain, using tools like ransomware, while espionage groups are optimizing for long-term, stealthy access.

On one end of the spectrum, cyber criminal groups optimized for immediate impact and deliberate recovery denial. On the other end, sophisticated cyber espionage groups and insider threats optimized for extreme persistence, utilizing unmonitored edge devices and native network functionalities to evade detection.

Those “dwell times” — that is, the time from intrusion to detection — average 14 days, but cyber espionage incidents can last much longer, with a median dwell time of 122 days.

Also: How to build better AI agents for your business – without creating trust issues

Mandiant identified more than 16 industry verticals that are being targeted, with the high-tech sector (17%) and the financial sector (14.6%) at the top of the list.

Where the intrusions come from

No surprises here: Nearly one-third of detected intrusions come from exploits. The second most commonly observed vector is “highly interactive, voice-based social engineering,” with groups targeting IT help desks “to bypass multifactor authentication (MFA) and gain initial access to software-as-a-service (SaaS) environments.”

Also unsurprising is the increasing adoption of AI tools for reconnaissance, social engineering, and malware development. After gaining access to a network, they report, “attackers are weaponizing AI … the QUIETVAULT credential stealer was observed checking targeted machines for AI [command-line] tools to execute predefined prompts to search for configuration files and collect GitHub and NPM tokens.”

Also: These 4 critical AI vulnerabilities are being exploited faster than defenders can respond

AI is still playing a secondary role, however. “Despite these rapid technological advancements,” the report notes, “we do not consider 2025 to be the year where breaches were the direct result of AI. From our view on the frontlines, the vast majority of successful intrusions still stem from fundamental human and systemic failures.”

The bad guys are moving faster and breaking things

The entire tech industry has learned from Mark Zuckerberg's infamous imperative for Facebook engineers: “Move fast and break things.” That's also true for cybercriminals, who have discovered that ransomware attacks are even more effective when they also target the virtual infrastructure that supports backup tools:

Ransomware groups are no longer just encrypting data; they are actively destroying the ability to recover. … actively deleting backup objects from cloud storage. … By targeting the virtualization storage layer directly or encrypting hypervisor datastores, they can render all associated virtual machines inoperable simultaneously.

Also: My 5-step security checklist for every new Windows PC

The good news is that the targets are getting smarter, too. “Organizations are improving their internal visibility. Across all 2025 investigations, 52% of the time organizations first detected evidence of malicious activity internally, an increase from 43% in 2024.” The sooner you discover evidence of an intrusion, the sooner you can begin the recovery process.

How to fight back

As attackers get more sophisticated and persistent, IT workers have to step up their game as well. Mandiant's advice includes advanced training for employees and help desk staff on how to recognize modern attack vectors: recognizing social engineering attacks using voice-based tools and messaging apps, as well as unauthorized MFA reset requests.

Also: Cloud attacks are getting faster and deadlier – here's your best defense plan

Other defensive strategies involve changes in network infrastructure:

  • Treat virtualization and management platforms as Tier-0 assets with the strictest access constraints.
  • To counter the destruction of recovery capabilities, decouple backup environments from the corporate Active Directory domain and utilize immutable storage.
  • Deploy advanced threat detection across the entire ecosystem and extend log retention policies well beyond standard 90-day windows.
  • Regularly audit SaaS integrations and route all SaaS applications through a central identity provider (IdP).
  • Implement behavior-based detection models that flag anomalous activity and deviations from established baselines.

In its conclusion, Mandiant's researchers note that “identity is the new perimeter.” Simply rotating passwords and enforcing MFA isn't enough anymore. Focusing on hardening identity controls and shifting to continuous identity verification, especially with third-party vendors, is key.





Source link

Tags: BreakCyberattackersfasterfightMovingNetwork

Product categories

  • Bitcoin Book
  • Bitcoin Coin
  • Bitcoin Hat
  • Bitcoin Merch
  • Bitcoin Miner
  • Bitcoin Miner Machine
  • Bitcoin Shirt
  • Bitcoin Standard
  • Bitcoin Wallet
  • Products
  • Uncategorized

Recent Posts

  • XRP Slips 4% Amid Policy Uncertainty, but Analysts Say a Major Move Is Brewing
  • US Government Returning $470,735 to Crypto Scam Victims After FBI Seizes Tether From Criminals
  • Cyberattackers are moving faster to break your network – how to fight back
  • Dogecoin (DOGE) Targets Resistance, Bulls Eye Potential Upside Move
  • Ethereum News: Bitmine Stakes $215M in ETH, Why Does It Matter?

Recent Comments

No comments to show.

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025

Categories

  • Altcoin
  • Bitcoin
  • Blockchain
  • Cryptocurrency
  • DeFi
  • Dogecoin
  • Ethereum
  • Market & Analysis
  • NFTs
  • Regulations
  • XRP

CATEGORIES

  • Altcoin
  • Bitcoin
  • Blockchain
  • Cryptocurrency
  • DeFi
  • Dogecoin
  • Ethereum
  • Market & Analysis
  • NFTs
  • Regulations
  • XRP

BROWSE BY TAG

Analyst Bank Bitcoin Blockchain Bottom Breakout BTC Bullish Business Buy Coinbase Crypto DOGE Dogecoin ETF ETFs ETH Ethereum Foundation Heres Hypergrid Institutional Investors Level Major Market Means Move OnChain Predicts Price Rally Ripple Risk SOL Solana Stablecoin Stablecoins Support Surge Target Treasury Whats XRP year

© 2024 Card Bitcoin | All Rights Reserved

Feature

U.S. Regulated
 

Beginner Friendly
 

Advanced Tools
 

Free Bitcoin Offer
 

Mobile App
 

Close the CTA

10$
 

5$
 

Varies
 

No Result
View All Result
  • Home
  • Altcoin
  • Bitcoin
  • Blockchain
  • Cryptocurrency
  • DeFi
  • Dogecoin
  • Ethereum
  • Legal Hub
  • More
    • Market & Analysis
    • NFTs
    • XRP
    • Regulations
  • Shop
    • Bitcoin Coin
    • Bitcoin Hat
    • Bitcoin Book
    • Bitcoin Miner
    • Bitcoin Standard
    • Bitcoin Miner Machine
    • Bitcoin Merch
    • Bitcoin Wallet
    • Bitcoin Shirt

© 2024 Card Bitcoin | All Rights Reserved