Cloudflare's 2026 Threat Report, published on March 3, 2026, articulates a pivotal trend in the cyber threat landscape: a strategic migration from 'breaking in' with exploits and malware to 'logging in' with legitimate, stolen credentials. This shift makes identity the new perimeter and credential abuse the primary vector for major security incidents, including ransomware. The report, analyzing data from 230 billion daily threats, finds that attackers are leveraging valid credentials to bypass traditional defenses and operate undetected within networks. The rise of Artificial Intelligence (AI) is further lowering the barrier for sophisticated attacks, while nation-state actors are refining their tactics. Chinese groups like Salt Typhoon and Linen Typhoon are pre-positioning on critical infrastructure, and various actors are abusing trusted cloud platforms like Google Calendar and Microsoft Azure for command-and-control (C2). The report concludes that modern defense must pivot to a zero-trust model focused on identity verification, continuous monitoring, and autonomous response systems.
The core thesis of the report is that the modern attack surface is no longer just about network ports and software vulnerabilities; it is about human and machine identities. By obtaining and using valid credentials, attackers can circumvent many security layers designed to keep intruders out.
The report details several key tactics, techniques, and procedures (TTPs) that define this new paradigm.
T1078 - Valid Accounts. Credentials for these accounts are sourced from infostealer malware logs, previous data breaches, and phishing campaigns.T1562 - Impair Defenses.T1102 - Web Service, where attackers leverage trusted domains to hide their C2 traffic.T1136.003 - Cloud Account to create new accounts for long-term access.The shift to identity-based attacks has profound implications for organizations:
Detecting an adversary who 'has the keys to the kingdom' requires a shift from perimeter-based detection to behavior-based analysis.
User Geolocation Logon Pattern Analysis (D3-UGLPA).Network Traffic Analysis (D3-NTA).Mitigation strategies must focus on making credentials harder to steal and less useful if they are compromised.
Multi-factor Authentication (D3-MFA).Network Isolation (D3-NI).Privileged Account Management (M1026).Outbound Traffic Filtering (D3-OTF).User Training (M1017).Unit 42 report reveals AI-powered attacks shrink breach timelines to 72 minutes, with 89% of incidents involving compromised identity systems.
Palo Alto Networks' Unit 42 2026 Incident Response Report reinforces the shift to identity-based attacks and the role of AI. It found attackers can exfiltrate data in as little as 72 minutes from initial compromise, a significant reduction in response time. The report highlights that 89% of all incidents involved compromised identity systems and 65% of initial access attempts leveraged identity-based techniques, underscoring the critical need for robust identity security and automated detection.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats