Transforming Landscape of Cybersecurity: Insights from the Verizon 2026 Data Breach Investigations Report
The cybersecurity domain is witnessing a seismic shift, as underscored by the findings in the latest Verizon 2026 Data Breach Investigations Report (DBIR). This year, a significant development occurred: for the first time in nearly two decades, vulnerability exploitation has surpassed credential abuse as the primary method for threat actors to gain initial access to victims’ networks. This change highlights not just the evolving mechanisms of cyber threats, but also the challenges organizations face in keeping pace with emerging vulnerabilities.
The report reveals a troubling trend in vulnerability management. It reports that only 26% of the Cybersecurity and Infrastructure Security Agency’s (CISA) Known Exploited Vulnerabilities (KEVs) were fully remediated in 2025, a decrease from the previous year’s 38%. Compounding this issue, the median time taken to remediate vulnerabilities has risen from 32 days to 43 days. This trajectory suggests a worrying trend where the number of KEVs is increasing, now averaging 16 per organization, versus 11 a year earlier.
In terms of initial access vectors, vulnerability exploitation accounted for 31% of cases—an increase from 20% in 2024—highlighting a lost ground for organizations trying to maintain secure networks. Meanwhile, credential abuse dropped to 13%, down from 22%, partially due to the introduction of pretexting as a new access vector.
Ransomware: Persistent Threats and Emerging Trends
In another significant finding, ransomware remains a formidable threat, with nearly half (48%) of all incidents involving some form of this malicious software, up from 44% the previous year. However, there is some positive news on this front. The report indicates that 69% of victims chose not to pay the ransom, and the median ransom payment decreased slightly from $150,000 to $139,875.
This duality of bad and good news reflects the ongoing struggle organizations face against ransomware, which continues to evolve, adapting to countermeasures deployed by cybersecurity teams.
Rise of Shadow AI: A New Type of Insider Risk
As organizations increasingly adopt AI technologies, new risks are emerging. The report illustrates a significant trend, noting that 67% of employees are using noncorporate Generative AI accounts on company devices—a 400% increase over 2024. Nearly half of the workforce, representing 45%, are now regular users of AI tools, either authorized or otherwise.
The report identifies "Shadow AI" as the third most prevalent nonmalicious insider risk, revealing that many employees inadvertently leak sensitive data, including source code and intellectual property, to Generative AI models. This issue has manifested in 3.2% of Data Loss Prevention (DLP) policy violations, which is alarming given the potential for data mishandling.
Third-Party Attacks: A Growing Concern
A significant concern highlighted in the report is the increase in third-party attacks, which accounted for 48% of breaches in 2025—a 60% rise from the previous year. The analysis categorizes supply chain breaches into three specific types: those involving vendors in the organization’s software supply chain, vendors hosting organizational data, and those with connections to the organization’s environment.
While organizations may initially see these breaches as beyond their control, the report indicates that many incidents boil down to foundational security issues, such as insecure authentication practices and inadequacies in privilege enforcement for users and service accounts.
Evolution of Social Engineering Tactics
The tactics employed by cybercriminals are adapting as well. Although email phishing remains a popular avenue, a notable shift sees increasing attempts to target victims via mobile devices. The report discusses how mobile-centric phishing scams, such as voice or text-based scams, achieved a 40% higher click-through rate compared to email campaigns. This evolution reflects the desire of attackers to circumvent traditional defenses by exploiting personal devices.
Furthermore, the report distinguishes pretexting as a separate initial access vector, emphasizing the importance of personal interactions in scams that manipulate victims into revealing sensitive information.
AI’s Growing Role in Cyber Attacks
Perhaps most striking is how AI technologies are reshaping the methods of cyber attackers. Collaboration between DBIR researchers and Anthropic has revealed that threat actors are using AI across a wide array of techniques to automate tasks ranging from malware development to identity anonymization. Alarmingly, the overwhelming majority (less than 2.5%) of AI-assisted actions involve common attack methods rather than adopting rare or novel techniques.
The report suggests that, given the rapid development pace of AI technology, these insights may quickly become outdated, hinting at both the challenges and opportunities posed by AI in cybersecurity.
The Verizon 2026 DBIR serves as a clarion call for organizations, emphasizing that while the landscape is evolving, enduring cybersecurity fundamentals—such as visibility, patching, and multi-factor authentication—remain critical to effectively preempt and respond to cyber threats in this ever-changing environment.

