5 ways to fortify your network against the new speed of AI attacks


image-1.png

Jeffrey Hazelwood/ZDNET; Shutterstock

Follow ZDNET: Add us as a preferred source on Google.


ZDNET’s key takeaways

  • Attacks on enterprise networks are becoming more frequent.
  • Cybercriminals are using AI, but humans remain the weakest link.
  • Defending against attacks requires structural changes to the network.

Here’s the paradox of modern cyberwarfare: Increasingly, the attackers are using machines that can work orders of magnitude faster than the humans who control them. In response, the targets are increasingly turning to automated systems to detect and repel those intruders.

But in this machine-versus-machine combat, humans remain the center of each battle, and we mere mortals continue to be the weak point. That’s the conclusion of this year’s survey of the enterprise security landscape from Mandiant, a US cybersecurity firm — now part of Google Cloud — that specializes in investigating major global security breaches and advising organizations on how to protect themselves from cyber threats.

Also: Stopping bugs before they ship: The shift to preventative security

Modern enterprise networks are widely distributed and can hand off tasks to partners via software-as-a-service. The bad guys are doing the same thing, according to Mandiant, using a “division of labor” model: one group uses low-impact techniques like malicious advertisements or fake browser updates to gain access to a network, then hands off the compromised target to a secondary group for hands-on access.

And this all happens at a startling pace. In 2022, Mandiant reports, this “time to hand off” was more than eight hours. In 2025, thanks to automation, those hand-offs were happening after an average of just 22 seconds. Likewise, the window to compromise systems with zero-day exploits is also plummeting, with the mean time to exploit vulnerabilities dropping to seven days before vendors have had time to issue a patch.

Identifying the attackers

According to Mandiant, the majority of attackers conducting “hands-on-keyboard operations” in compromised enterprise networks can be divided into two groups with distinctly different tactics and pacing: Cybercriminals pursue financial gain, using tools like ransomware, while espionage groups optimize for long-term, stealthy access.

On one end of the spectrum, cyber criminal groups optimized for immediate impact and deliberate recovery denial. On the other end, sophisticated cyber espionage groups and insider threats optimized for extreme persistence, utilizing unmonitored edge devices and native network functionalities to evade detection.

Those “dwell times” — that is, the time from intrusion to detection — average 14 days, but cyber espionage incidents can last much longer, with a median dwell time of 122 days.

Also: The patching treadmill: Why traditional application security is no longer enough

Mandiant identified more than 16 industry verticals that are being targeted, with the high-tech sector (17%) and the financial sector (14.6%) at the top of the list.

Where the intrusions come from

No surprises here: Nearly one-third of detected intrusions come from exploits. The second most commonly observed vector is “highly interactive, voice-based social engineering,” with groups targeting IT help desks “to bypass multifactor authentication (MFA) and gain initial access to software-as-a-service (SaaS) environments.”

Also unsurprising is the increasing adoption of artificial intelligence tools for reconnaissance, social engineering, and malware development. After gaining access to a network, they report, “attackers are weaponizing AI … the QUIETVAULT credential stealer was observed checking targeted machines for AI [command-line] tools to execute predefined prompts to search for configuration files and collect GitHub and NPM tokens.”

Also: These 4 critical AI vulnerabilities are being exploited faster than defenders can respond

However, AI is still playing a secondary role. “Despite these rapid technological advancements,” the report notes, “we do not consider 2025 to be the year where breaches were the direct result of AI. From our view on the frontlines, the vast majority of successful intrusions still stem from fundamental human and systemic failures.”

The bad guys are moving faster and breaking things

The entire tech industry has learned from Mark Zuckerberg’s infamous imperative for Facebook engineers: “Move fast and break things.” That’s also true for cybercriminals, who have discovered that ransomware attacks are even more effective when they also target the virtual infrastructure that supports backup tools:

Ransomware groups are no longer just encrypting data; they are actively destroying the ability to recover. … actively deleting backup objects from cloud storage. … By targeting the virtualization storage layer directly or encrypting hypervisor datastores, they can render all associated virtual machines inoperable simultaneously.

Also: 1 in 2 security leaders say they’re not ready for AI attacks – 4 actions to take now

The good news is that the targets are getting smarter, too. “Organizations are improving their internal visibility. Across all 2025 investigations, 52% of the time organizations first detected evidence of malicious activity internally, an increase from 43% in 2024.” The sooner you discover evidence of an intrusion, the sooner you can begin the recovery process.

How to fight back

As attackers get more sophisticated and persistent, IT workers have to step up their game as well. Mandiant’s advice includes advanced training for employees and help desk staff on how to recognize modern attack vectors: recognizing social engineering attacks using voice-based tools and messaging apps, as well as unauthorized MFA reset requests.

Here are five other defensive strategies that involve changes in network infrastructure:  

  1. Treat virtualization and management platforms as Tier-0 assets with the strictest access constraints.
  2. To counter the destruction of recovery capabilities, decouple backup environments from the corporate Active Directory domain and utilize immutable storage.
  3. Deploy advanced threat detection across the entire ecosystem and extend log retention policies well beyond standard 90-day windows.
  4. Regularly audit SaaS integrations and route all SaaS applications through a central identity provider (IdP).
  5. Implement behavior-based detection models that flag anomalous activity and deviations from established baselines.

Also: Cloud attacks are getting faster and deadlier – here’s your best defense plan

In its conclusion, Mandiant’s researchers note that “identity is the new perimeter.” Simply rotating passwords and enforcing MFA isn’t enough anymore. Focusing on hardening identity controls and shifting to continuous identity verification, especially with third-party vendors, is crucial.





Source link

Leave a Reply

Subscribe to Our Newsletter

Get our latest articles delivered straight to your inbox. No spam, we promise.

Recent Reviews


Love him or hate him, Seth MacFarlane has an immovable place in the realm of TV comedy, and Ted is an excellent showcase for the writer at his best. A seasoned actor and writer of over 3 decades, he has created numerous hit productions, including adult animation tentpoles like Family Guy and American Dad!, as well as The Orville.

However, his talents have also allowed him to make the leap from television to the big screen, including his 2012 comedy Ted, which asked what would happen to a child who wished their teddy bear for life once they grew into adults.

However, in 2024, MacFarlane brought Ted to the small screen with a television series that dived into the times not seen in the 2012 movie. And I personally feel that the show has become one of MacFarlane’s finest projects to date:

How Does Ted Tie Into The Movies?

A new side of John and Ted

Ted is set between the opening 1985 sequence of the original 2012 movie and the present-day sequence, honing in on John’s teenage years at high school as Max Burkholder takes on the role. When Ted pushes things too far, he is forced to attend school with John, leading to the pair experiencing many major developmental milestones together. From falling in love to going against his parents’ wishes and trying weed for the first time, the pair take on the world together.

Alongside the main duo, Ted also shines a light on the rest of the Bennett household. Frequent MacFarlane collaborator Scott Grimes takes on the voice of John’s loudmouthed conservative father Matty, while Alanna Ubach portrays his soft-spoken, good-hearted mother Susan. The Bennett family is rounded out by Giorgia Wigham’s Blaire, John’s politically minded cousin staying with the family who is always looking out for the leading pair.

A new addition to the lore

Much like Family Guy and American Dad took on The Simpsons‘ animated family sitcom and The Orville lampooned Star Trek, Ted twists a certain style of sitcom. There have been no shortage of throwback sitcoms set in the past since the late 2010s, with The Goldbergs and Young Sheldon playing into the nostalgia people either have for that time or recognize through long-running franchises or series like Stranger Things to attract viewer attention.

In Ted, the show turns its lens to the 1990s, with Blaire being part of the youthful generation who wants to challenge the status quo. However, she butts heads with various authority figures. Plus, Matty and Jon find themselves affected by the OJ Simpson case in varying ways.

Collage featuring 1990s sitcoms around an old TV.


Go Retro and Stream These 10 Sitcoms of the 1990s

These are the 1990s prime time sitcoms that have held up better than my collection of Pogs.

Despite this setting and inevitable plays on the events of the decade, the show isn’t entirely dependent on nostalgia. Ted’s very existence already set the series up in a position where it could do anything, and MacFarlane doesn’t hold back. From new talking toys and the relatable gag about how hot McDonald’s apple pies are to an entire episode that cuts between the group playing a Dungeons and Dragons game around a table and their characters within the game’s world, the series isn’t afraid to get strange. Because of that, it is hard to find an underwhelming episode throughout its run.

Ted has a surprising amount of heart

Is this the best of Seth MacFarlane?

While MacFarlane is a seasoned comedic writer whom audiences are incredibly familiar with, from his strengths to his stylistic flaws, I do feel that Ted is, for the most part, the best of what he has to offer. The series does have the sharper edge his humor can have at times, with Ted himself having some absolutely devastating insults towards the bullies at John’s school, as well as the cast overall tiptoeing between crass humor and smartly written gags. But this is a story about a bear brought to life with a child’s wish, so there is always a good deal of heart within every episode.

Thanks to the incredible chemistry between the cast, the Bennett family unit is easy to root for. Part of the enjoyment of the show is seeing John grow into the man he was in the original movie, but it is also heartwarming to see Blaire find her place in the Bennett household, even if she butts heads with Matty. Meanwhile, even Matty has several moments of vulnerability despite his hard-headed, typically politically incorrect self, which show just why Susan, who is the delightful and lovable heart of the show, fell for him.

One week the family may be playing a Dungeons and Dragons game to replenish their stash of weed, and the next will see them dedicating themselves to fulfilling Susan’s unrealized dream or helping Matty through the stranger side of his experiences in Vietnam. Even John’s bully Clive (Jackson Seavor McDonald) gets an off-kilter spotlight where the leading pair go from pulling a horrible revenge prank on him to becoming his unlikely father figures. MacFarlane’s edge is always there, but there is always a softer side to tug at your heartstrings and cushion you if not every gag lands.​​​​​​​

Where to watch Ted

All episodes are now streaming

Ted falls out of the tumble dryer in Ted. Credit: Peacock

​​​​​​​ Both seasons of Ted are currently available in their entirety on Peacock. Season 1 consists of 7 episodes, while season 2 received a larger episode count of 8. However, even after having an overall positive response and viral attention thanks to shared and reposted clips, MacFarlane confirmed that there were no current plans for season 3, as the costs to bring Ted to life on a television budget are incredibly high.

However, as Ted said himself, “Don’t be sad because it’s over; be happy because it happened.” Even against the costs, MacFarlane set out to ensure that Ted’s surprising expansion into television would still be a fulfilling experience, ensuring that the series could at least end on a satisfying note. As such, if you wish to see just how having an irresponsible magical stuffed friend shaped John’s life ahead of the movies, you will not be disappointed.​​​​​​​



Source link