Breach entry point, 2026 DBIR finds | About Verizon
Verizon's 2026 DBIR finds vulnerability exploitation now top breach entry point, surpassing stolen credentials.
Summary
Verizon's 19th annual Data Breach Investigations Report reveals that vulnerability exploitation (31%) has for the first time surpassed stolen credentials as the leading breach entry point, accelerated by AI that compresses exploitation timelines from months to hours. The report also highlights emerging risks including a 40% increase in mobile social engineering success, employee shadow AI use tripling to 45%, third-party supply chain breaches jumping 60%, and AI bot traffic growing 21% monthly—collectively reshaping threat landscapes and demanding urgent security resilience priorities.
Full text
Accessibility Resource Center Skip to main content About Us Careers Support About Us About Us About Us About Us Overview Who We Are Who We Are Overview Our Culture History and Timeline Headquarters & Contact Info Verizon Fact Sheet Leadership What We Do What We Do Overview Innovation Labs Broadband & Fiber Internet of Things Managed Security Verizon Ventures How We Lead How We Lead Overview Code of Conduct Management Governance Open Internet Policies Retiree Information State Government Affairs Close News News News News News News Networks & Platforms Products & Plans Responsible Business Financial Public Safety Noticias News Alerts Signup Press Releases Press Releases Press Releases Media Contacts B-roll and images RSS Feeds Emergency resource center Verizon Fact Sheet Close Responsibility Responsibility Responsibility Responsibility Overview Digital Inclusion Digital Inclusion Overview Verizon Innovative Learning Small Business Program Digital Wellness Value Cares Environmental Responsibility Environmental Responsibility Community Disaster Resilience Community Disaster Resilience Innovation Sustainability Human Prosperity Human Prosperity Overview Workforce Development Small Business Supplier Program Employee Volunteers Sharing our Success Sharing our Success Overview Giving and Grants Product Responsibility Product Responsibility Overview Account Security Privacy Policy Parenting in a Digital World Parenting in a Digital World Overview Digital Parenting 101 Young children 3-8 Preteens 9-12 Teenagers 13-18 By topic Meet the editorial team Close Investors Investors Investors Investor Relations overview Financial Reporting Financial Reporting Overview SEC Filings Annual Reports Quarterly Earnings Stock Information Dividend History Tax Information Fixed Income Asset-backed Securitization Corporate Governance Corporate Governance Overview Board of Directors Board Committees Shareowner Services Shareowner Services Overview Cost Basis Calculator Shareowner FAQs Responsible Business Reporting Responsible Business Reporting Overview News & Events News & Events Investor Events & Webcasts Investor Calendar Email Alerts Contact Investor Relations Close end of navigation menu Vulnerability exploitation top breach entry point, 2026 industry-wide DBIR findsThe 19th edition of the Data Breach Investigations Report (DBIR) confirms AI-driven speed as a new challenge, pushing security strategy toward fundamental resilience.Download 2026 DBIRPublished May 19, 2026 Media contact: Carlos ArcilaPublished May 19, 2026At a glanceVulnerabilities top entry point: Using software flaws (31%) has surpassed stolen credentials for the first time, with AI accelerating attacks from months to hours.New human & AI risks: Mobile social engineering success is up 40%, while employee use of unapproved “shadow AI” tripled to 45%, spiking data leakage.Expanding attack surfaces: Third-party supply chain breaches jumped 60% (now 48% of total), while AI bot traffic is growing 21% month-over-month.NEW YORK, NY—Verizon published the annual Data Breach Investigations Report (DBIR) today, which shows how Artificial Intelligence (AI) is impacting the cyber threat landscape as a whole. Although this report uses 2025 data—predating the latest frontier model advancements—the trends are clear: AI is fundamentally reshaping the cybersecurity industry. And at the same time that AI-detected vulnerabilities are in the news, for the first time in 19 years of the DBIR being published, exploiting vulnerabilities has surpassed stolen credentials to become the number one breach entry point. Key findings:Nearly a third (31%) of all breaches start with vulnerability exploitation in an AI world: This is the first time in 19 years that it has surpassed stolen credentials as the biggest point of entry. Further, AI is being leveraged by threat actors to accelerate the time to exploit known vulnerabilities, shrinking the window for defense from months to mere hours. Interactive, conversational attacks on mobile are on the rise: In terms of the “Human Element” risk of cybersecurity, as people get more savvy about traditional email phishing, threat actors are pivoting to mobile-centric social engineering (fake text messages and voice calls) with a success rate 40% higher than traditional email phishing. More employees now use ‘shadow AI’ at work, risking company secrets: Shadow AI, referring to employees using unapproved AI tools at work, is now the third most common non-malicious data leakage related activity. Frequent usage of AI tools by employees has surged from 15% to 45% of employees in a single year, highlighting an elevated risk of data exfiltration associated with unapproved platforms. Supply chains get riskier as third-party involvement in breaches is up 60%: As companies rely more heavily on external vendors, threat actors are exploiting those vulnerabilities, with breaches involving a third party now accounting for 48% of all breaches. AI Bots are the next frontier: AI Bot Internet Crawlers are experiencing a massive 21% month-over-month growth compared to entirely flat (0.3%) human-led traffic growth, showing where the next set of threats could come from.What it means: The rapid weaponization of known vulnerabilities by AI can create a capacity crisis for security teams, underscoring the urgent need to prioritize fundamental security and risk management practices. In response, the DBIR is providing Chief Information Security Officers (CISOs) and cybersecurity professionals with actionable, resilient recommendations tailored with today’s AI environment in mind throughout the report. These include preparing for an influx of patches as AI identifies software flaws at an accelerating rate, integrating AI into ’secure by design’ frameworks, and leveraging AI within defense-in-depth strategies to minimize the total attack surface.“While the velocity of cyber threats—driven by AI and faster vulnerability exploitation—is increasing, the foundational principles of security and strong risk management remain the most effective defense,” said Daniel Lawson, SVP Global Solutions, Verizon Business. “The DBIR reinforces that these fundamentals still hold as organizations strive for resilience.”Download the full 2026 DBIR and review industry specific information on Verizon’s websitePublished May 19, 2026Media ContactCarlos Arcila908-202-0479Carlos.Arcila@verizon.comCategories:Networks & platformsNetwork solutions for businessTags:CybersecurityContinue reading Services & Solutions Verizon.com Mobile Plans Mobile Devices Home Services Small and Medium Business Enterprise Solutions Verizon Connect Public Sector Partner Solutions Support Mobile Online Support Home Online Support Contact Customer Support Sign in to your Account Store Locator Account Security & Fraud Claims Accessibility News Alerts Signup Innovation Innovation Labs Verizon Ventures Network Technologies Fiber Optics Multi-Access Edge Compute (MEC) Careers Welcome to the #VTeamLife Life at Verizon Our Culture Search Open Roles Careers Site Map Follow Verizon News twitter Follow Verizon Careers linkedin twitter Follow Customer Support twitter Privacy Policy California Privacy Notice Health Privacy Notice Your Privacy Choices Website Terms of Use Accessibility Open Internet Important Consumer Information Site Map © 2026 Verizon