5 ways to harden your network against the new speed of AI attacks


111fasterattacksgettyimages-1168836247

Yuichiro Chino/Moment via Getty Images

Follow ZDNET: Add us as a preferred source on Google.


ZDNET’s key takeaways

  • Attacks on enterprise networks are getting faster.
  • Cybercriminals are using AI, but humans are still the weakest link.
  • Defending against attacks requires structural changes to the network.

Here’s the paradox of modern cyberwarfare: Increasingly, the attackers are using machines that can work orders of magnitude faster than the humans who control them. In response, the targets are increasingly turning to automated systems to detect and repel those intruders.

But in this machine-versus-machine combat, humans are still at the center of each battle, and those mere mortals continue to be the weak point. That’s the conclusion of this year’s survey of the enterprise security landscape from Mandiant, a US cybersecurity firm — now part of Google Cloud — that specializes in investigating major global security breaches and advising organizations on how to protect themselves from cyber threats.

Also: 1 in 2 security leaders say they’re not ready for AI attacks – 4 actions to take now

Modern enterprise networks are widely distributed and can hand off tasks to partners via software-as-a-service. The bad guys are doing the same thing, Mandiant reports, using a “division of labor” model, in which one group uses low-impact techniques like malicious advertisements or fake browser updates to gain access to a network, then handing off the compromised target to a secondary group for hands-on access.

And this all happens at a startling pace. In 2022, Mandiant reports, this “time to hand-off” was more than 8 hours. In 2025, thanks to automation, those hand-offs were happening after an average of just 22 seconds. Likewise, the window to compromise systems with zero-day exploits is also plummeting, with the mean time to exploit vulnerabilities dropping to seven days before vendors have had time to issue a patch.

Identifying the attackers

According to Mandiant, the majority of secondary groups that are conducting “hands-on-keyboard operations” in compromised enterprise networks can be divided into two groups with distinctly different tactics and pacing. Cybercriminals are after financial gain, using tools like ransomware, while espionage groups are optimizing for long-term, stealthy access.

On one end of the spectrum, cyber criminal groups optimized for immediate impact and deliberate recovery denial. On the other end, sophisticated cyber espionage groups and insider threats optimized for extreme persistence, utilizing unmonitored edge devices and native network functionalities to evade detection.

Those “dwell times” — that is, the time from intrusion to detection — average 14 days, but cyber espionage incidents can last much longer, with a median dwell time of 122 days.

Also: How to build better AI agents for your business – without creating trust issues

Mandiant identified more than 16 industry verticals that are being targeted, with the high-tech sector (17%) and the financial sector (14.6%) at the top of the list.

Where the intrusions come from

No surprises here: Nearly one-third of detected intrusions come from exploits. The second most commonly observed vector is “highly interactive, voice-based social engineering,” with groups targeting IT help desks “to bypass multifactor authentication (MFA) and gain initial access to software-as-a-service (SaaS) environments.”

Also unsurprising is the increasing adoption of AI tools for reconnaissance, social engineering, and malware development. After gaining access to a network, they report, “attackers are weaponizing AI … the QUIETVAULT credential stealer was observed checking targeted machines for AI [command-line] tools to execute predefined prompts to search for configuration files and collect GitHub and NPM tokens.”

Also: These 4 critical AI vulnerabilities are being exploited faster than defenders can respond

AI is still playing a secondary role, however. “Despite these rapid technological advancements,” the report notes, “we do not consider 2025 to be the year where breaches were the direct result of AI. From our view on the frontlines, the vast majority of successful intrusions still stem from fundamental human and systemic failures.”

The bad guys are moving faster and breaking things

The entire tech industry has learned from Mark Zuckerberg’s infamous imperative for Facebook engineers: “Move fast and break things.” That’s also true for cybercriminals, who have discovered that ransomware attacks are even more effective when they also target the virtual infrastructure that supports backup tools:

Ransomware groups are no longer just encrypting data; they are actively destroying the ability to recover. … actively deleting backup objects from cloud storage. … By targeting the virtualization storage layer directly or encrypting hypervisor datastores, they can render all associated virtual machines inoperable simultaneously.

Also: My 5-step security checklist for every new Windows PC

The good news is that the targets are getting smarter, too. “Organizations are improving their internal visibility. Across all 2025 investigations, 52% of the time organizations first detected evidence of malicious activity internally, an increase from 43% in 2024.” The sooner you discover evidence of an intrusion, the sooner you can begin the recovery process.

How to fight back

As attackers get more sophisticated and persistent, IT workers have to step up their game as well. Mandiant’s advice includes advanced training for employees and help desk staff on how to recognize modern attack vectors: recognizing social engineering attacks using voice-based tools and messaging apps, as well as unauthorized MFA reset requests.

Also: Cloud attacks are getting faster and deadlier – here’s your best defense plan

Other defensive strategies involve changes in network infrastructure:

  • Treat virtualization and management platforms as Tier-0 assets with the strictest access constraints.
  • To counter the destruction of recovery capabilities, decouple backup environments from the corporate Active Directory domain and utilize immutable storage.
  • Deploy advanced threat detection across the entire ecosystem and extend log retention policies well beyond standard 90-day windows.
  • Regularly audit SaaS integrations and route all SaaS applications through a central identity provider (IdP).
  • Implement behavior-based detection models that flag anomalous activity and deviations from established baselines.

In its conclusion, Mandiant’s researchers note that “identity is the new perimeter.” Simply rotating passwords and enforcing MFA isn’t enough anymore. Focusing on hardening identity controls and shifting to continuous identity verification, especially with third-party vendors, is key.





Source link

Leave a Reply

Subscribe to Our Newsletter

Get our latest articles delivered straight to your inbox. No spam, we promise.

Recent Reviews


Amazon Fire Phone Jeff Bezos

Bloomberg / Getty Images

Follow ZDNET: Add us as a preferred source on Google.


ZDNET’s key takeaways

  • Amazon is reportedly developing a new Fire Phone.
  • The previous model had several issues, including an inferior app store experience.
  • Under new supervision (and with more experience), Amazon can do better this time.

Well, I don’t know about you, but I certainly didn’t have “new Amazon smartphone” on my 2026 bingo card. As it turns out, according to Reuters, the retailer may be developing a new smartphone, internally known as “Transformer.” 

Those familiar with the industry will instantly draw parallels to Amazon’s previous smartphone effort, the Fire Phone from 2014. Appropriately, that phone ended up as part of a fire sale about a year later.

Now, in 2026, with no fewer than five phone brands in the US — Apple, Samsung, Google, Motorola, and OnePlus — Amazon faces a lot of competition. In fairness, it also has two fewer platforms to compete against. In 2014, Windows Phone and BlackBerry were still very much part of the smartphone conversation; these days, not so much.

The AppStore problem

But there’s one mistake Amazon made in its first effort that will absolutely torpedo its chances at succeeding — the Amazon AppStore and specifically the decision to forego Google Play services. Google is simply too valuable in too many lives to not support the platform. Oh, and the Amazon AppStore is terrible.

Also: What’s right (and wrong) with the Amazon Fire Phone

It has admittedly been a few years since I last inventoried the Amazon AppStore, but when I last checked, the Amazon AppStore was a wasteland of half-supported or unsupported apps, with two notable exceptions. Finance, home control, and communication apps were either absent or had not received updates for years prior.

The only apps in the Amazon AppStore that remained up to date were productivity apps (largely powered by Microsoft) and streaming apps. Those two categories work very well on the cheap, underpowered hardware that Amazon usually launches, and that’s fine. A coffee-table tablet is a nice thing to have lying around.

A spark of hope

Amazon Fire Phone

Liam Tung/ZDNET

But a phone is another animal entirely. If a tablet is a device to entertain, a phone is a device for everything else. One of the key reasons Windows Phone failed was its lack of an app ecosystem. The Senior Vice President of Devices and Services,  Panos Panay, is very familiar with that saga, so I’m hopeful that he will make the same arguments to the powers that be at Amazon. 

Honestly, if there is anyone who I think can pull off an Amazon phone revival, it’s probably Panay, who understands design and product development better than most, and to be perfectly honest, he’s my absolute favorite product presenter.

Also: Amazon Fire Phone review: Not a great smartphone

Of course, all of this is early days. This phone is being worked on internally, and even Reuters reports that it could get the axe long before it sees the light of day. Personally, I’m intrigued by the idea, but I sincerely hope that Amazon doesn’t make this the shopping phone it tried to build in 2014. 

If Amazon just wants to make a nice, well-built smartphone, with a skin that pushes Amazon content to the fore, I’m fine with that. But leaving Google behind is a mistake that Amazon cannot afford to make again. Fool me once, and all that.

So, if this phone is to have a chance at success, it needs to embrace Google services so it can be a phone that everyone can use. Amazon has the brand power to make a phone like this work, even up against juggernauts like Apple and Samsung, but it needs to approach this correctly, lest it end up in yet another Fire phone fire sale.





Source link