Connect with us

Hi, what are you looking for?

HEADLINES

Unit 42 Report: AI and attack surface complexity fuel majority of breaches

Enterprise complexity is working in the attackers’ favor — identity weaknesses were exploited in 89% of investigations, while 87% of attacks involved multiple attack surfaces.

The Unit 42 2026 Global Incident Response Report, released by Palo Alto Networks, reveals an era of accelerated attacks where AI, sprawling attack surfaces, and identity fuel the majority of breaches. Based on Unit 42 analysis of over 750 high-stakes incidents, adversaries are leveraging AI throughout the attack lifecycle, accelerating attack speeds by 4x over the past year. Enterprise complexity is working in the attackers’ favor — identity weaknesses were exploited in 89% of investigations, while 87% of attacks involved multiple attack surfaces.

Sam Rubin, SVP of Unit 42 Consulting & Threat Intelligence, Palo Alto Networks: “Enterprise complexity has become the adversary’s greatest advantage. This risk is compounded as attackers increasingly target credentials, utilizing autonomous AI agents to bridge human and machine identities for independent action. To mitigate these threats, organizations must reduce complexity and move to a unified platform approach that relentlessly eliminates implicit trust.”

2026 Global Incident Response Report Highlights:

  • AI bolsters attack speeds: As threat actors increasingly leverage AI and advanced automation, the time from initial access to data exfiltration has plummeted to just 72 minutes in the fastest attacks — a 4x increase in speed over the past year.
  • Attack complexity is growing: 87% of attacks span two or more attack surfaces, blending activity across endpoints, cloud, SaaS platforms and identity systems. Unit 42 tracked activity across as many as 10 different fronts simultaneously.
  • Identity drives initial access: 65% of initial access is driven by identity-based techniques, like social engineering and credential misuse, while vulnerabilities account for initial access in 22% of all attacks.
  • The browser is a primary battleground: 48% of attacks involve the browser, reflecting how routine web sessions are weaponized to harvest credentials and bypass local controls.
  • SaaS supply chain attacks increase: Attacks involving third-party SaaS applications have surged 3.8x since 2022, accounting for 23% of all attacks as threat actors abuse OAuth tokens and API keys for lateral movement.

Bridging the Critical Gaps in Defense

Unit 42 links 90% of data breaches to misconfigurations or security gaps, with complexity, poor visibility and excessive trust acting as systemic attack enablers.

To counter the collapse of the attack lifecycle, the report recommends that defenders move beyond traditional perimeter security and adopt a unified platform approach that:

Advertisement. Scroll to continue reading.
  • Moves at machine speed: Empower SOCs with AI and automation to detect and contain high-velocity attacks in minutes rather than hours.
  • Secures the build pipeline: Embed security directly into the software and AI development lifecycle to block vulnerabilities before they reach the cloud.
  • Modernizes identity defense: Centralize management of human, machine and agentic identities to close governance gaps and stop credential-based exploits.
  • Protects the human interface: Use secure browser technology and active exposure management to defend the modern workspace and unmanaged devices.
  • Eliminates implicit trust: Adopt zero trust to continuously verify every interaction, neutralizing an attacker’s ability to move laterally.

To download the full 2026 Unit 42 Global Incident Response Report and Executive Resource Kit, visit https://www.paloaltonetworks.com/resources/research/unit-42-incident-response-report.

Advertisement
Advertisement
Advertisement

Like Us On Facebook

You May Also Like

Biz Solutions

The latest additions include NetSuite AI Connector Service Companion, support for the NetSuite Model Context Protocol (MCP) Apps extension, and expanded support for NetSuite...

HEADLINES

Deepfakes have triggered The Great Trust Recession, where digital authenticity has been undermined, and skepticism has reached unprecedented levels.

HEADLINES

Women accounted for 39.1% of GenAI course enrollments in the Philippines in 2025, up from 38.4% in 2024, a 0.8 percentage-point increase YoY. While...

HEADLINES

ERICA, or the Enterprise Risk Intelligence Companion Agent, was developed internally by the PLDT Group’s Enterprise Risk Management team in close collaboration with PLDT...

HEADLINES

Unlike core IT teams, HR environments may not always be subject to the same level of hardened security controls. Yet, they often handle sensitive...

HEADLINES

As generative AI fuels large-scale impersonation imagery and remote work reshapes enterprise security, identity has become the perimeter, and high-assurance verification is essential to...

HEADLINES

Cybersecurity experts warn that aside from sexualized content, AI-generated images are also increasingly used for fraud, scams, and identity theft, and share tips on...

HEADLINES

Leaders at Palo Alto Networks reflect on a defining decade of change in cybersecurity and leadership through a “2016 vs. 2026” lens, inspired by...

Advertisement