• About
  • Subscribe
  • Contact
Monday, March 2, 2026
  • Login
FutureCISO
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
  • Events
No Result
View All Result
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
  • Events
No Result
View All Result
FutureCISO
No Result
View All Result
Home CISO

Identity exploits dominating cyber incidents

FutureCISO Editors by FutureCISO Editors
March 2, 2026
Decentralised identity models are key to trust in Asia

Photo by James Sutton: https://www.pexels.com/photo/man-with-barcode-printed-on-his-face-228838/

Share on FacebookShare on Twitter

Sophos' 2026 Active Adversary Report reveals that 67% of all incidents investigated last year were rooted in identity-related weaknesses. The report highlights a troubling trend whereby attackers increasingly exploit compromised credentials and weak multifactor authentication (MFA), often without introducing new tools or techniques.

Key findings from the report indicate a significant shift in tactics. While brute-force attacks (15.6%) are now nearly on par with exploitation methods (16%) as initial access vectors, the median dwell time for attackers has decreased to three days. This reduction reflects improved response efforts from defenders, particularly in Managed Detection and Response (MDR) environments. Notably, attackers can reach an organisation's Active Directory (AD) server in just 3.4 hours once they gain initial access.

The report also highlights that ransomware activity predominantly occurs outside regular business hours, with 88% of ransomware payloads and 65% of data exfiltration actions taking place during these off-hours. Compounding the challenges, a lack of telemetry due to increased data retention issues has doubled over the past year, hindering defence efforts.

John Shier

“The most concerning finding in the report illustrates a long-standing issue: the dominance of identity-related root causes for successful initial access,” said John Shier, field CISO and lead author of the report. “Organisations must adopt a proactive approach to identity security to mitigate these risks.”

The report notes an increase in the number of active threat groups, with Akira (GOLD SAHARA) and Qilin (GOLD FEATHER) leading as the most prevalent ransomware brands. Across the dataset, 51 unique ransomware brands were observed, highlighting a vibrant and evolving threat landscape.

Related:  Highest ransomware attack rates on education sector -- Sophos

While predictions of AI transforming attacker behaviour have circulated widely, the report indicates that no significant shifts driven by AI have occurred this year. Generative AI has improved the sophistication of phishing attacks but has not yet led to fundamentally new attack techniques.

“AI may add scale and noise, but it won't replace attackers just yet,” Shier remarked. “Strong identity protection, reliable telemetry, and rapid response capabilities remain critical in defending against these threats.”

Based on the findings, Sophos advises organisations to:

  1. Deploy phishing-resistant MFA and regularly validate configurations.
  2. Minimise the exposure of identity infrastructure and internet-facing services.
  3. Rapidly patch known vulnerabilities, particularly on edge devices.
  4. Ensure continuous monitoring through MDR or equivalent capabilities.
  5. Preserve security logs for quick detection and investigation.
Tags: active adversaryidentity attacksransomware trendsSophos
FutureCISO Editors

FutureCISO Editors

No Result
View All Result

Recent Posts

  • Identity exploits dominating cyber incidents
  • Open source vulnerabilities double due to AI’s rapid code creation
  • Identity is the frontline for Asia CISOs in 2026
  • Agentless visibility to facilitate breach containmet in hybrid environments
  • Advanced identity security solutions to combat cyber threats

Categories

  • AI and Machine Learning
  • Artificial Intelligence
  • Blogs
  • CISO
  • CISO strategies
  • Cloud, Platforms and Ecosystems
  • Cloud, Virtualization, Operating Environments and Middleware
  • Compliance and Governance
  • Compliance and Governance
  • Compliance and Governance|People
  • Compliance and Governance|Technology
  • Computer, Storage, Networks, Connectivity
  • Culture and Behaviour
  • Culture and Behaviour|People
  • Cyber risk management
  • Cyber risk management
  • Cyberattacks and data breaches
  • Cybersecurity careers
  • Cybersecurity careers
  • Cybersecurity operations
  • Cybersecurity operations
  • Data Protection
  • Data Protection
  • Endpoint Security
  • FutureCISO
  • Governance, Risk and Compliance
  • Governance, Standards and Regulations
  • Incident Response
  • Network Security
  • People
  • Process
  • Remote work
  • Resources
  • Risk Management
  • Risk Management
  • Security
  • Technology
  • Training and awarenes
  • Videos
  • Vulnerabilities and threats
  • Vulnerabilities and threats
  • Webcasts/Podcasts
  • Webinars and PodChats
  • White Papers

Strategic Insights for Chief Information Officers

FutureCISO serves the interests of the Chief Information Security Officer (CISO) and the information security profession. Its purpose is to provide relevant and timely industry insights around all things important to security professionals and organisations that recognize and value the importance of protecting the organisation’s data and its customers’ privacy.

Cxociety Media Brands

  • FutureIoT
  • FutureCFO
  • FutureCIO

Categories

  • Privacy Policy
  • Terms of Use
  • Cookie Policy

Copyright © 2024 Cxociety Pte Ltd | Designed by Pixl

Login to your account below

or

[wpli_login_link]

Not a member yet? Register here

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
  • Events
  • Login

Copyright © 2024 Cxociety Pte Ltd | Designed by Pixl