ReliaQuest 2026

Annual Cyber
Threat Report

Executive Summary

2025 vs 2024 At A Glance

Clock Icon

4 minutes

Fastest breakout time, down from 27 minutes in 2024

Clock Icon

6 minutes

Fastest exfiltration time, down from 4 hours 29 minutes in 2024

People Icon

1 in 4

Attacks used social engineering for initial access

The Top Security Gaps Driving Incidents (And Why They Can't Be Ignored)

Analysis of 2025 customer incidents pointed to the same foundational control gaps at the center of most incidents. Five were the same issues we highlighted in last year's report, an indication that attackers are still targeting the same weaknesses. New in 2025 are password policy and control failures. No matter how sophisticated or varied an attacker's methods, ignoring these basics leaves organizations exposed.

Impact of Security Control Failures

Insufficient monitoring or logging allows attacks to go undetected, making it impossible to detect or investigate malicious activity.
Devices without security controls like endpoint protection or monitoring agents provide attackers with open pathways throughout networks.
VPNs lacking essential protections like MFA or device-based certificates allow attackers to exploit stolen credentials.
Vulnerabilities in internet-facing devices serve as entry points for attackers to infiltrate the network. These weaknesses are rapidly weaponized, enabling automated scanning and exploitation at scale.
Weak help-desk protocols make organizations easy targets for social engineering attacks, with 26% of incidents in 2025 involving social engineering for initial access.
Weak, reused, or poorly rotated passwords—and gaps in MFA and local admin password management—enable brute-force attacks and credential reuse. This allows attackers to quickly gain privileged access and move laterally with minimal resistance.

Make every device and access path SOC-visible and controllable for consistent coverage everywhere

Treat unmanaged endpoints and edge access as first-order risk. Enforce consistent endpoint controls, monitoring, and response, so attackers can’t hide in gaps created by distributed teams, legacy systems, or fragmentation tools.

Continuously govern the external attack surface—especially through change.

Maintain an always-current inventory of internet-facing assets, prioritize remediation by exposure and criticality, and validate monitoring coverage so acquisitions, migrations, and tool changes don’t create untracked entry points.

Strengthen identity controls where trust is easiest to exploit.

Standardize high-assurance verification for help-desk resets and identity changes, reduce standing privilege, and make privileged access phishing-resistant so stolen credentials and social engineering don’t translate into immediate, high-level control.


Introduction: 4-Minute Warning—Speed Wins When Identity Fails

Our Annual Cyber-Threat Report distills 365 days of frontline data into 1 strategic guide. We strip away the noise to provide an evidence-based breakdown of the specific tactics, techniques, and procedures (TTPs) that shaped the 2025 landscape. Use these insights to benchmark your security posture against real-world outcomes, see where your defenses hold, and pinpoint what must change to stop the tactics that are working right now.

In 2025, AI contributed to the success of intrusions more than ever before. We saw adversaries weave AI and automation into their tradecraft not just to move faster, but to generate convincing lures at scale.

But AI wasn’t the only accelerant. Attackers also got more efficient at initial access by breaking trust instead of infrastructure. Through aggressive social engineering—from IT help-desk vishing to North Korean fake worker schemes and “ClickFix” tactics—adversaries bypassed technical perimeters and secured valid credentials with elevated privileges from the start.

With that foothold, many attackers no longer need to “smash and grab.” They live off the land, blend into normal traffic, and repurpose legitimate tools as weapons. For defenders, that means hunting for a single IOC quickly becomes a dead end. Security has become less about spotting a malicious file and more about correlating behavior across users, endpoints, and cloud activity to catch the moment a trusted identity starts acting untrustworthy.

These tactics are lowering breakout times and raising the stakes for defenders. This year, we saw average breakout time—the interval between initial compromise and lateral movement—drop by 29%, from 48 minutes to 34 minutes. But some attackers are moving much faster than the average. The fastest intrusions reached lateral movement in just 4 minutes and achieved data exfiltration in 6 minutes post-entry.

0 %

Drop in average breakout time compared to 2024

But speed is only half the story. We also saw slow-burn operations, especially from nation-state actors, where attackers stayed quiet, persisted, and expanded access over months by abusing legitimate tooling and trusted components.

Defenders now face two simultaneous problems: machine-speed breakout and long-dwell persistence, both hiding inside legitimate activity. That changes what “automation” needs to deliver. Playbook-based automation helps, but it requires constant upkeep and still depends on human follow-through.

With AI-assisted investigation and response, defenses can adapt to this divergent threat landscape, reducing routine workload and keeping execution consistent across varied security stacks. The threats in this report will challenge defenses, but the pages ahead show you how to close the gaps attackers exploited this year, and how to build the resilience needed to outlast them in 2026.

Go Beyond the Report
Annual Threat Report Webinar:
Proactive Defense from 2025's Key Cyber Threats


Get customer lessons learned and perspectives, expert walkthroughs, and live Q&A—plus a practical action plan to inform your strategy and safeguard your business as threats evolve.

Register Now