From 5 Hours to 72 Minutes
In 2024, attackers who breached a network needed roughly 285 minutes to find and steal sensitive data. Nearly five hours from initial access to exfiltration.
In 2025, that window collapsed to 72 minutes.
That finding comes from Palo Alto Networks’ 2026 Unit 42 Global Incident Response Report, which analyzed more than 750 real-world incidents across 50 countries. The report describes AI as a “force multiplier” for attackers—automating reconnaissance, generating convincing phishing emails, and exploiting vulnerabilities within minutes of public disclosure.
The implication is straightforward: the defenses most organizations rely on were designed for threats that moved in hours or days. Those threats now move in minutes.
What AI Changes for Attackers
AI hasn’t replaced human attackers. It’s made them faster and more effective at every stage of an intrusion.
Reconnaissance that once required days of manual scanning now happens in minutes. AI systems can probe thousands of potential entry points, analyze publicly available information, and identify the weakest links in a target’s infrastructure—all before a human operator makes a single decision.
Phishing has undergone a similar transformation. AI-generated phishing emails now achieve a 54% click-through rate, compared to roughly 12% for manually crafted attempts. The emails are grammatically flawless, contextually personalized, and nearly indistinguishable from legitimate communications.
Once inside a network, the acceleration continues. The Unit 42 report found that 87% of incidents spanned two or more attack surfaces simultaneously—endpoints, cloud environments, SaaS applications, and identity systems. Attackers aren’t moving through one door and down one hallway. They’re moving through multiple doors at once.
Take Our 2-Minute Security Assessment
centrexIT has helped San Diego businesses assess and strengthen their security posture since 2002. Understanding where you stand is the first step.
Take the 2-Minute Cybersecurity Assessment: https://centrexit.com/cyber-security-readiness-assessment/
The Identity Problem
Here’s the finding that should redirect security budgets: 90% of the breaches Unit 42 investigated involved identity weaknesses as a material factor.
Not sophisticated zero-day exploits. Not nation-state-level hacking tools. Identity weaknesses. Stolen credentials, misconfigured access controls, overprivileged accounts, and weak authentication.
Sam Rubin, SVP of Unit 42 Consulting and Threat Intelligence, described the core issue as “operational sprawl and over-trust in interconnected systems.” Organizations have expanded their technology footprints—cloud services, SaaS applications, remote access tools—without tightening the identity controls that govern who can access what.
Attackers have noticed. Rather than investing effort in complex technical exploits, they’re increasingly bypassing software vulnerabilities entirely and targeting the credentials that unlock everything.
Why Speed Alone Isn’t the Answer
It’s tempting to read “72 minutes” and conclude that security teams simply need to respond faster. That’s partially true. But speed without fundamentals is just faster chaos.
The Unit 42 report found that misconfigurations and security gaps were present in 90% of investigated breaches. Exposed services, overly broad permissions, weak controls around cloud resources, and fragmented monitoring created the conditions attackers exploited.
In other words, many of these attacks succeeded not because defenders were too slow, but because the environment was already compromised by its own complexity. Attackers didn’t need to be fast when the doors were already open.
The practical takeaway: before investing in faster detection tools, verify that your identity controls, access permissions, and configuration management are actually functioning. The most sophisticated threat detection in the world doesn’t help if every user has admin access and your cloud storage is publicly readable.
What AI-Amplified Defense Actually Looks Like
If AI is a force multiplier for attackers, the same technology has to serve defenders. Organizations using AI-powered security tools detect threats roughly 60% faster and reduce breach costs by an average of $1.9 million per incident, according to IBM’s analysis.
But AI-amplified defense isn’t about replacing security teams with algorithms. It’s about giving human analysts the speed and coverage they can’t achieve alone.
Automated monitoring that watches every access attempt, every configuration change, and every anomalous pattern across endpoints, cloud, and identity systems—continuously, at machine speed. Human expertise that investigates alerts, makes judgment calls, and adapts strategy based on business context no algorithm can fully understand.
People directing. AI executing. People verifying.
That’s the model the threat landscape now demands. Not human OR machine. Human AND machine, working together.
What This Means for Your Business
You don’t need to match the sophistication of the attackers described in the Unit 42 report. But you need to close the gaps they’re walking through.
Start with identity. Multi-factor authentication prevents 99.9% of account compromises, according to Microsoft. That single control addresses the entry point used in the vast majority of breaches.
Review access privileges. How many people have admin access who don’t need it? How many service accounts have standing permissions that should be just-in-time? How many former employees still have active credentials?
Assess your monitoring coverage. Can you see what’s happening across your endpoints, cloud environments, and identity systems? Or are there blind spots where an attacker could operate for 72 minutes—or 72 days—without detection?
The attacks are faster. The entry points haven’t changed. And the organizations that get the fundamentals right are the ones that survive what’s coming.
Take the 2-Minute Cybersecurity Assessment: https://centrexit.com/cyber-security-readiness-assessment/
centrexIT has protected businesses since 2002. AI-amplified attacks require AI-amplified defense—but it starts with understanding your current posture.
Sources
- Palo Alto Networks Unit 42 2026 Global Incident Response Report
- CSO Online – “Cyber attacks enabled by basic failings, Palo Alto analysis finds” (February 2026)
- SecurityBrief – “AI-fuelled cyber attacks now steal data in 72 minutes” (February 2026)
- BusinessWorld – “AI-driven cyberattacks now breach systems in 72 minutes, study finds” (February 23, 2026)
- IBM Cost of a Data Breach Report 2025 – AI defense savings data
- Microsoft – Multi-factor authentication effectiveness data