Vulnerability Exploitation Surpasses Credentials as Leading Breach Vector, Verizon DBIR Shows
Verizon’s latest DBIR shows vulnerability exploitation overtaking credentials as the top breach vector, with patching lag and AI‑assisted attacks on the rise.

TL;DR
Vulnerability exploitation initiated 31% of data breaches in the past year, overtaking compromised credentials as the top initial access vector according to the latest Verizon DBIR. The shift coincides with slower patching of known flaws and growing AI‑assisted attack techniques.
Context
Verizon’s Data Breach Investigations Report, now in its 19th edition, aggregates real‑world incidents from responders, law enforcement and industry partners. For nearly two decades, stolen or abused credentials held the top spot for how attackers first entered networks. The 2024‑2025 data shows that credential‑based initial access fell to 13% while vulnerability exploitation rose to 31%.
Key Facts
- 31% of breaches began with exploiting a software flaw, up from 20% the previous year. - Only 26% of critical vulnerabilities listed in CISA’s Known Exploited Vulnerabilities (KEV) catalog were fully remediated in 2025, down from 38% in 2024. - Threat actors used AI assistance in a median of 15 distinct techniques, with some leveraging as many as 40 or 50.
What It Means
The data indicates attackers are finding and weaponizing unpatched flaws faster than defenders can close them. AI tools help adversaries scan for vulnerable services, chain exploits (MITRE ATT&CK T1190 – Exploit Public‑Facing Application) and move laterally (T1021 – Remote Services). Patching lag leaves organizations exposed to ransomware, data theft and supply‑chain abuse.
Mitigations / What Defenders Should Do 1. Prioritize KEV‑listed CVEs using exploit‑prediction scores (e.g., EPSS) and apply patches within 14 days of release. 2. Deploy automated vulnerability scanners integrated with ticketing; verify remediation with re‑scan and maintain an audit trail. 3. Enforce network segmentation and zero‑trust principles to limit lateral movement after an initial foothold. 4. Monitor for AI‑generated reconnaissance traffic (unusual user‑agent strings, rapid credential‑stuffing attempts) and tune detection rules for MITRE ATT&CK T1566.002 (Phishing: Spearphishing Link) and T1059 (Command‑Line Interpreter). 5. Conduct regular tabletop exercises that simulate chained vulnerability exploits to improve response times.
Watch for increased adoption of AI‑driven exploit kits and a potential rise in zero‑day chaining as attackers refine automation.
Continue reading
More in this thread
Hank's Furniture January 2026 Data Breach Under Investigation
Peter Olaleru
Poynter Law Group Investigates Hank's Furniture January 2026 Data Breach Affecting Texas Customers
Peter Olaleru
Kentucky Man Sentenced to 70 Years for Cyber‑Enabled Sexual Assault Spree
Peter Olaleru
Conversation
Reader notes
Loading comments...