Fortinet has unveiled its 2026 Global Threat Landscape Report, and the findings clearly show that cybercrime is evolving at an alarming pace. Drawing insights from FortiGuard Labs telemetry, the report outlines how threat actors have shifted from isolated campaigns to highly coordinated, end-to-end cyberattack ecosystems. Notably, attackers are now leveraging advanced AI capabilities to accelerate and scale their operations.

According to the report, cybercriminals are no longer working in silos. Instead, they function like organized enterprises, compressing attack timelines and using automated “shadow agents” to execute sophisticated attacks faster than ever before.

“Cybercrime is one of the world’s most pervasive and costly threats, and our latest Global Threat Landscape Report reveals how malicious actors are beginning to leverage agentic AI to execute more sophisticated attacks,” said Derek Manky, Chief Security Strategist and Global VP of Threat Intelligence, Fortinet FortiGuard Labs. “As cybercriminals increasingly use AI to bolster their tactics, cyber defenders must evolve cybersecurity operations into an industrialized defense and adopt AI-enabled tools that respond at the same velocity as modern threats.”

Rising Threat Velocity and Expanding Attack Surface

One of the most striking revelations is the dramatic reduction in time-to-exploit (TTE). While earlier reports recorded an average of 4.76 days, the latest data shows that attackers now exploit vulnerabilities within 24 to 48 hours. In some cases, attacks begin within hours of public disclosure, as seen with the React2Shell vulnerability.

At the same time, ransomware incidents have surged dramatically. The report identifies 7,831 confirmed ransomware victims worldwide—an astonishing jump from approximately 1,600 in the previous year. This 389% increase is largely driven by the availability of AI-powered cybercrime tools such as WormGPT, FraudGPT, and BruteForceAI. Manufacturing, business services, and retail sectors remain the most targeted industries, with North America and parts of Europe seeing the highest concentration of attacks.

Identity-Based Attacks Dominate Cloud Security Risks

Furthermore, the report emphasizes that identity-related vulnerabilities have become the primary entry point for cyberattacks. Instead of exploiting infrastructure flaws, attackers increasingly rely on stolen or misused credentials. Hospitals, clinics, and retail organizations are particularly vulnerable due to complex cloud integrations and large identity ecosystems.

AI Reshaping Cybercriminal Behavior

Interestingly, AI is not only increasing attack frequency but also improving efficiency. While brute force attempts have dropped by 22% year-over-year, attackers are now targeting more refined datasets, resulting in higher success rates. Despite fewer attempts, global brute force activity still reached approximately 67.65 billion events.

Additionally, cybercriminals are shifting their focus toward comprehensive stolen datasets rather than simple leaked credentials. Infostealer malware continues to dominate this space, with RedLine, Lumma, and Vidar leading infection rates. These tools bundle valuable identity and behavioral data, allowing attackers to execute faster and more effective breaches.

Global Collaboration to Combat Cybercrime

In response to these growing threats, global collaboration has become essential. A joint initiative led by INTERPOL and supported by Fortinet through the Cybercrime Atlas successfully dismantled a cybercriminal network in Africa. This operation, backed by the World Economic Forum, targeted scams, mobile fraud, and fraudulent loan schemes.

Moreover, Fortinet has partnered with Crime Stoppers International to launch the Cybercrime Bounty program. This initiative enables individuals and ethical hackers to report cyber threats anonymously, helping authorities disrupt malicious networks more effectively.

Strengthening Cyber Defense for the Future

Ultimately, the report underscores the urgent need for organizations to modernize their cybersecurity strategies. By integrating AI-driven defense mechanisms and leveraging real-time threat intelligence, businesses can better prepare for the rapidly evolving threat landscape.

Source – GlobeNewswire

Recommended Cyber Technology News:

To participate in our interviews, please write to our CyberTech Media Room at info@intentamplify.com  



🔒 Login or Register to continue reading