
"The paradox of modern cyberwarfare: Increasingly, the attackers are using machines that can work orders of magnitude faster than the humans who control them. In response, the targets are increasingly turning to automated systems to detect and repel those intruders. But in this machine-versus-machine combat, humans remain the center of each battle, and we mere mortals continue to be the weak point."
"Modern enterprise networks are widely distributed and can hand off tasks to partners via software-as-a-service. The bad guys are doing the same thing, according to Mandiant, using a "division of labor" model: one group uses low-impact techniques like malicious advertisements or fake browser updates to gain access to a network, then hands off the compromised target to a secondary group for hands-on access."
"And this all happens at a startling pace. In 2022, Mandiant reports, this "time to hand off" was more than eight hours. In 2025, thanks to automation, those hand-offs were happening after an average of just 22 seconds. Likewise, the window to compromise systems with zero-day exploits is also plummeting, with the mean time to exploit vulnerabilities dropping to seven days before vendors have had time to issue a patch."
Attacks on enterprise networks are increasing in frequency and speed. Cybercriminals use automation and AI to move faster than human operators, while defenders increasingly rely on automated detection and response. Humans still remain the weakest point in machine-versus-machine cyber conflict. Modern enterprise networks are distributed and can delegate tasks through software-as-a-service, and attackers mirror this with a division-of-labor approach. One group uses low-impact techniques such as malicious advertisements or fake browser updates to gain initial access, then transfers the compromised target to another group for hands-on access. The time to hand off dropped from more than eight hours in 2022 to about 22 seconds in 2025. The time to exploit zero-day vulnerabilities also shrank, with mean time to exploit reaching seven days before patches are issued.
#enterprise-cybersecurity #ai-driven-cyberattacks #automated-threat-detection #zero-day-exploitation #network-defense-strategy
Read at ZDNET
Unable to calculate read time
Collection
[
|
...
]