Close Menu
geekfence.comgeekfence.com
    What's Hot

    Young People Programme inspires storytelling in Dublin

    April 13, 2026

    The EU appoints Anthony Whelan as its top competition official; Whelan says he will press ahead with Big Tech investigations despite President Trump’s pressure (Barbara Moens/Financial Times)

    April 13, 2026

    A philosophy of work | MIT News

    April 13, 2026
    Facebook X (Twitter) Instagram
    • About Us
    • Contact Us
    Facebook Instagram
    geekfence.comgeekfence.com
    • Home
    • UK Tech News
    • AI
    • Big Data
    • Cyber Security
      • Cloud Computing
      • iOS Development
    • IoT
    • Mobile
    • Software
      • Software Development
      • Software Engineering
    • Technology
      • Green Technology
      • Nanotechnology
    • Telecom
    geekfence.comgeekfence.com
    Home»Cyber Security»As breakout time accelerates, prevention-first cybersecurity takes center stage
    Cyber Security

    As breakout time accelerates, prevention-first cybersecurity takes center stage

    AdminBy AdminApril 8, 2026No Comments5 Mins Read3 Views
    Facebook Twitter Pinterest LinkedIn Telegram Tumblr Email
    As breakout time accelerates, prevention-first cybersecurity takes center stage
    Share
    Facebook Twitter LinkedIn Pinterest Email


    Threat actors are using AI to supercharge tried-and-tested TTPs. When attacks move this fast, cyber-defenders need to rethink their own strategy.

    Phil Muncaster

    07 Apr 2026
     • 
    ,
    4 min. read

    As breakout time accelerates, prevention-first cybersecurity takes center stage

    We stand at an interesting point in the never-ending arms race between attackers and defenders. The former are using AI, automation and a range of techniques to sometimes devastating effect. In fact, one report claims that 80% of ransomware-as-a-service (RaaS) groups now offer AI or automation as features – and, of course, there’s also a thriving market with tools that are specifically intended to evade security tools. Data breaches and associated costs have surged as a result.

    But n the other hand, threat actors are just doing what they have done before – supercharging existing tactics, techniques and procedures (TTPs) to accelerate attacks. The time between initial access and lateral movement (breakout time), for example, is now measured in minutes. For defenders used to working in hours or days, things need to change.

    A half-hour warning

    Breakout time matters, because if network defenders can’t stop their adversaries at this point, then an initial intrusion may very quickly become a major incident. The average time to break out laterally is now around 30 minutes – in the region of 29% faster than a year previously – although some observers have seen it happen in less than a minute after initial access.

    There are several reasons why the window for action is rapidly closing. Threat actors are:

    • Getting better at stealing/cracking/phishing legitimate credentials from your employees. Weak, reused and infrequently rotated passwords help them here (i.e., by making brute-force attacks easier). As does a lack of multifactor authentication (MFA). They’re also getting better at password-reset vishing attacks, either impersonating the helpdesk, or calling the helpdesk impersonating employees. With legit logins, they can masquerade as users without setting off any internal alarms.
    • Using zero-day exploits to target edge devices, such as Ivanti EPMM in order to gain a foothold in networks while remaining hidden from in-house security tools.
    • Getting better at reconnaissance, using open source techniques and AI to scour the web for publicly available information on high-value targets (with privileged credentials). They gather information on organizational structure, internal processes and the IT environment, to streamline attacks and design social engineering scripts.
    • Automating post-exploitation activity using AI-powered scripts for credential harvesting, living off the land, and even malware generation.
    • Exploiting the gaps between siloed teams and point solutions. As a result, activity that looks legitimate to the former might seem unusual to the latter, but without holistic visibility, edge cases may not be investigated. In some cases, threat actors take deliberate steps to disable or evade EDR.
    • Using living-off-the-land (LOTL) techniques to stay hidden. That means using valid credentials, legitimate remote access tools and protocols like SMB and RDP which means they blend in with regular activity.

    Catching threat actors at this point is essential – especially as exfiltration (when it begins) is also being accelerated by AI. The fastest recorded case last year was just six minutes; down from 4 hours 29 minutes in 2024.

    Fighting fire with (AI) fire

    If attackers are able to access your network with elevated privileges or stay hidden on unobserved endpoints, and then move laterally without raising any alarms, human-powered response will often be too slow. You need to limit social engineering, update defensive posture to improve detection of suspicious behavior, and accelerate response times.

    AI-powered extended detection and response (XDR) and managed detection and response (MDR) can help here by automatically flagging suspicious behavior, using contextual data to improve alert fidelity, and remediating where necessary. Advanced offerings may also help by clustering alerts and generating automated responses for stretched SOC teams, freeing up their time to work on high-value tasks like threat hunting.

    A single, unified provider with insight across endpoint, networks, cloud and other layers can also shine a light onto those gaps that exist between point solutions, for full visibility of potential attack paths. Ensure that any such tools also have visibility of edge devices, and work seamlessly with your security information and event management (SIEM) and security orchestration and response (SOAR) tooling. 

    Threat intelligence and threat hunting are also vital to keep pace with AI-supported adversaries. An approach that harnesses both will help teams focus on what matters – how attackers are targeting them and where they might move next. AI agents might in time be able to take on more of these tasks autonomously to further speed up response times.

    Regaining the initiative

    There are other ways to accelerate response times, including:

    • The continuous monitoring and awareness across endpoints, network, and cloud environments.
    • Automated steps – such as session termination, password reset or host isolation – that need to be taken in order to address suspicious activity and, where appropriate, automated analysis combined with human assessment to investigate alerts and inform the steps needed to contain a threat fast.
    • Least privilege access policies, micro-segmentation and other hallmarks of Zero Trust to ensure strict access controls and minimize the blast radius of attacks.
    • Enhanced identity-centric security based around strong, unique credentials managed in a password manager, and backed by phishing-resistant MFA.
    • Anti-vishing steps including updated helpdesk processes (e.g., out-of-band callbacks) and effective awareness training
    • Brute-force protection that blocks automated password-guessing attacks at entry.
    • Continuous monitoring of social media and dark web for exposed employee and company information that could be weaponized.
    • Monitoring of scripts and processes as they “decloak” in memory, to spot and block LOTL behavior.
    • Cloud sandbox execution of suspicious files to mitigate zero-day exploit threats.

    None of these steps alone is a silver bullet. But when layered up and relying on AI-powered MDR/XDR from a reputable supplier, they can help defenders to regain the initiative. It may be an arms race, but it’s one with fundamentally no end in sight. That means there’s time to catch up.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

    Related Posts

    LinkedIn is spying on you, and you agreed to nothing • Graham Cluley

    April 13, 2026

    Bringing Rust to the Pixel Baseband

    April 12, 2026

    ChatGPT rolls out new $100 Pro subscription to challenge Claude

    April 11, 2026

    GlassWorm Campaign Uses Zig Dropper to Infect Multiple Developer IDEs

    April 10, 2026

    Russia Hacked Routers to Steal Microsoft Office Tokens – Krebs on Security

    April 9, 2026

    New Fortinet Flaw Allows Unauthorized Access to Enterprise Systems

    April 7, 2026
    Top Posts

    Understanding U-Net Architecture in Deep Learning

    November 25, 202528 Views

    Hard-braking events as indicators of road segment crash risk

    January 14, 202624 Views

    Redefining AI efficiency with extreme compression

    March 25, 202622 Views
    Don't Miss

    Young People Programme inspires storytelling in Dublin

    April 13, 2026

    As part of Canon’s ongoing commitment to delivering meaningful social value within communities across Ireland,…

    The EU appoints Anthony Whelan as its top competition official; Whelan says he will press ahead with Big Tech investigations despite President Trump’s pressure (Barbara Moens/Financial Times)

    April 13, 2026

    A philosophy of work | MIT News

    April 13, 2026

    From Frameworks to Security: A Complete Guide to Web Development in Dubai

    April 13, 2026
    Stay In Touch
    • Facebook
    • Instagram
    About Us

    At GeekFence, we are a team of tech-enthusiasts, industry watchers and content creators who believe that technology isn’t just about gadgets—it’s about how innovation transforms our lives, work and society. We’ve come together to build a place where readers, thinkers and industry insiders can converge to explore what’s next in tech.

    Our Picks

    Young People Programme inspires storytelling in Dublin

    April 13, 2026

    The EU appoints Anthony Whelan as its top competition official; Whelan says he will press ahead with Big Tech investigations despite President Trump’s pressure (Barbara Moens/Financial Times)

    April 13, 2026

    Subscribe to Updates

    Please enable JavaScript in your browser to complete this form.
    Loading
    • About Us
    • Contact Us
    • Disclaimer
    • Privacy Policy
    • Terms and Conditions
    © 2026 Geekfence.All Rigt Reserved.

    Type above and press Enter to search. Press Esc to cancel.