Rapid7 Report: Attack Timelines Collapse, Exploitation Surges 105%

  • Rapid7's 2026 Global Threat Landscape Report found exploited high and critical severity vulnerabilities increased 105%, from 71 in 2024 to 146 in 2025.
  • The time between vulnerability disclosure and exploitation has shrunk dramatically, with attackers now operationalizing vulnerabilities within days.
  • Identity exposure (missing or lax MFA) remains the dominant intrusion path, accounting for 43.9% of incident response investigations.
  • Ransomware was involved in 42% of Rapid7 MDR investigations, with ransomware leak posts increasing 46.4% year-over-year to 8,835 in 2025.
  • Generative AI is accelerating attacker operations, particularly in phishing content creation and scripting.

The report highlights a fundamental shift in the cybersecurity landscape, moving away from a model of predictive defense to one of reactive response. The collapse of exploitation timelines and the rise of AI-powered attacks are forcing organizations to prioritize exposure management and real-time detection over traditional vulnerability scanning. This trend underscores the growing need for managed security services and AI-driven threat intelligence to keep pace with increasingly sophisticated adversaries.

Remediation Velocity
The ability of organizations to patch vulnerabilities will increasingly dictate their exposure, as attackers rapidly exploit disclosed weaknesses, potentially outpacing traditional remediation cycles.
AI Integration
The continued integration of generative AI into attacker toolchains will likely further compress attack timelines and lower the barrier to entry for less sophisticated threat actors.
Identity Security
The dominance of identity-based attacks suggests that investments in MFA and privileged access management will remain critical, and failure to address these weaknesses will continue to be a primary attack vector.