Cybersecurity News and Headlines
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

Cybersecurity Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Sunday recap

NewsDealsSocialBlogsVideosPodcasts
CybersecurityNewsCrowdStrike Says Attackers Are Moving Through Networks in Under 30 Minutes
CrowdStrike Says Attackers Are Moving Through Networks in Under 30 Minutes
CIO PulseDefenseCybersecurity

CrowdStrike Says Attackers Are Moving Through Networks in Under 30 Minutes

•February 24, 2026
0
CyberScoop
CyberScoop•Feb 24, 2026

Why It Matters

The shrinking window between breach and lateral movement erodes defenders’ ability to detect and contain threats, raising the cost of cyber risk for enterprises worldwide.

Key Takeaways

  • •Breakout time fell to 29 minutes in 2025
  • •Attack speed increased 65% year‑over‑year
  • •82% of attacks were malware‑free, using legitimate tools
  • •Cloud‑focused attacks rose 37%, nation‑state surge 266%
  • •Zero‑day exploit use grew 42%, AI predictions rising

Pulse Analysis

The most striking finding in CrowdStrike’s latest threat report is the dramatic compression of breach timelines. An average breakout time of just 29 minutes means that once an adversary gains a foothold, they can traverse critical systems before most security teams even register the initial intrusion. This acceleration is driven by refined social‑engineering tactics, rapid credential harvesting, and the exploitation of trusted cloud services, forcing organizations to rethink traditional perimeter‑based defenses and invest in real‑time detection capabilities that can operate at the speed of the attacker.

Equally concerning is the shift toward cloud‑centric, malware‑free campaigns. With a 37% rise in cloud‑focused attacks and more than one‑third of incidents linked to valid or abused credentials, threat actors are leveraging legitimate administrative tools to blend into normal traffic. This “living‑off‑the‑land” approach reduces the likelihood of signature‑based detection and places greater emphasis on identity‑centric security controls, continuous monitoring, and zero‑trust architectures to limit privilege escalation across hybrid environments.

The surge in zero‑day exploitation—up 42%—combined with predictions of AI‑augmented vulnerability discovery signals an even more hostile future. Nation‑state actors and cybercriminals are already automating the search for unpatched flaws in edge devices, firewalls, and VPNs, enabling rapid, undetected privilege escalation. To counter this, enterprises must prioritize rapid patch management, adopt threat‑intelligence‑driven defenses, and integrate AI‑assisted analytics that can surface anomalous behavior before attackers can leverage it. Proactive investment in these areas will be essential to narrow the attacker’s window of opportunity.

CrowdStrike says attackers are moving through networks in under 30 minutes

Read Original Article
0

Comments

Want to join the conversation?

Loading comments...