Connect with us

Hi, what are you looking for?

AI Cybersecurity

Palo Alto Networks Reveals Cyberattacks Now Four Times Faster, Driven by AI Integration

Palo Alto Networks reports hackers now execute cyberattacks four times faster, leveraging AI to exfiltrate data in as little as 72 minutes.

Hackers have significantly accelerated their cyberattack timelines, now operating on average four times faster than just a year ago, according to a report released Tuesday by Palo Alto Networks. The findings underscore a worrying trend as ransomware attacks become increasingly sophisticated and swift, with threat actors now exfiltrating data as quickly as 72 minutes after gaining initial access.

The report reveals that artificial intelligence (AI) plays a crucial role in the evolving landscape of cyber threats. Cybercriminals are leveraging AI for a range of activities, including reconnaissance, phishing, scripting, and operational execution. This technological edge allows attackers to automate and optimize their strategies, making their assaults more effective and widespread.

Identity theft is a central element of these attacks, appearing in 90% of the incident response cases analyzed. Hackers are increasingly using stolen identities and tokens, enabling them to gain entry into networks without triggering security alerts. “Once an attacker has legitimate credentials, they’re not breaking in, they’re logging in,” said Sam Rubin, a senior vice president at Palo Alto Networks’ Unit 42. “When an adversary blends into normal traffic, detection becomes incredibly challenging for even mature defenders.”

The report is based on the analysis of over 750 incident response cases worldwide, providing a comprehensive view of how threat groups are employing AI to orchestrate attacks with unprecedented speed and scale. Attackers are now able to run multiple operations simultaneously and exploit known software vulnerabilities almost immediately after they are disclosed. Notably, attackers are targeting vulnerabilities within 15 minutes of a Common Vulnerabilities and Exposures (CVE) disclosure.

In addition to speed, the misuse of trusted integrations has emerged as a significant strategy among threat actors. The report indicates that nearly one-quarter of incidents in the past year involved attacks on software-as-a-service (SaaS) applications through these trusted connections. Such integrations provide legitimate, privileged access, complicating defense efforts against exploitation.

“This is a structural shift in supply chain risk that moves beyond vulnerable code to the abuse of trusted links,” Rubin noted, highlighting the growing complexity of cybersecurity challenges. The reliance on trusted integrations not only creates new vulnerabilities but also underscores the need for organizations to reassess their security protocols and response strategies.

The implications of these findings are profound for both businesses and cybersecurity professionals. As hackers increasingly exploit AI and trusted systems, the urgency for enhanced cybersecurity measures becomes apparent. Organizations must adapt to the rapidly evolving threat landscape and invest in robust defenses and incident response capabilities.

Ultimately, the report serves as a clarion call for industries to reevaluate their approach to cybersecurity, particularly in the face of increasingly sophisticated technology-driven threats. With hackers demonstrating the ability to act with such speed and efficacy, the importance of proactive security measures has never been greater. The challenge now lies not only in defending against these attacks but in anticipating the next wave of cyber threats that could emerge as technology continues to evolve.

See also
Rachel Torres
Written By

At AIPressa, my work focuses on exploring the paradox of AI in cybersecurity: it's both our best defense and our greatest threat. I've closely followed how AI systems detect vulnerabilities in milliseconds while attackers simultaneously use them to create increasingly sophisticated malware. My approach: explaining technical complexities in an accessible way without losing the urgency of the topic. When I'm not researching the latest AI-driven threats, I'm probably testing security tools or reading about the next attack vector keeping CISOs awake at night.

You May Also Like

AI Tools

AI-driven budgeting tools like Cleo and Rocket Money help users save up to $500 annually by automating insights and enhancing financial oversight.

AI Cybersecurity

Schools leverage AI to enhance cybersecurity, but experts warn that AI-driven threats like advanced phishing and malware pose new risks.

AI Finance

Apollo Global Management reveals a $40 trillion vision for private credit and anticipates $5-$7 trillion in AI funding over the next five years at...

AI Marketing

AI-driven email marketing strategies boost open rates by 30% through optimized subject lines and advanced segmentation, revolutionizing engagement and ROI.

Top Stories

As AI's influence grows, concerns mount over accountability and fairness, urging society to define rights before algorithms dictate our lives.

AI Generative

Microsoft Advertising unveils its updated AI marketer's guide highlighting a three-stage brand visibility process as its ad revenue reaches $20 billion annually.

AI Generative

Generative AI's rise is reshaping professional roles, demanding new skills like strategic direction and oversight to enhance creativity and ethical use.

AI Technology

Synolon Systems secures $85 million to develop AI-driven infrastructure that aligns global real estate transactions, promising enhanced efficiency across markets.

© 2025 AIPressa · Part of Buzzora Media · All rights reserved. This website provides general news and educational content for informational purposes only. While we strive for accuracy, we do not guarantee the completeness or reliability of the information presented. The content should not be considered professional advice of any kind. Readers are encouraged to verify facts and consult appropriate experts when needed. We are not responsible for any loss or inconvenience resulting from the use of information on this site. Some images used on this website are generated with artificial intelligence and are illustrative in nature. They may not accurately represent the products, people, or events described in the articles.