By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Application exploitation back in vogue, says IBM cyber unit | Computer Weekly
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > News > Application exploitation back in vogue, says IBM cyber unit | Computer Weekly
News

Application exploitation back in vogue, says IBM cyber unit | Computer Weekly

News Room
Last updated: 2026/02/25 at 11:23 AM
News Room Published 25 February 2026
Share
Application exploitation back in vogue, says IBM cyber unit | Computer Weekly
SHARE

In a reversal of a long-standing trend, researchers at IBM’s X-Force threat intelligence unit say they have observed a 44% increase in cyber attacks that begin with the exploitation of vulnerable public-facing applications, outpacing credential abuse by a significant margin.

In recent years, a quip that runs along the lines of “attackers don’t hack the cloud, they log in” has become a popular adage in the cyber community, reflecting a surge in attacks beginning with phished or stolen credentials.

Logging in legitimately means threat actors do not have to burn valuable hoarded zero days, and can get away with disguising their attacks as everyday activity, taking the path of least resistance in search of a payday.

Although the misuse of valid accounts still accounted for just under a third of the cases represented in the X-Force data, the latest report suggests the exploitation of vulnerabilities, which its researchers claim formed the initial access vector in 40% of incidents it tracked last year, is seeing a renewed burst of enthusiasm among threat actors.

What is more, the team says artificial intelligence (AI) tools may be driving this trend by making it easier for attackers to seek out misconfigured, unprotected or vulnerable applications. They said this highlights a critical need for stronger access controls, rigorous patching and secure deployment practices.

“Attackers aren’t reinventing playbooks, they’re speeding them up with AI,” said Mark Hughes, IBM global managing partner for cyber security services.

“The core issue is the same: businesses are overwhelmed by software vulnerabilities. The difference now is speed. With so many vulnerabilities requiring no credentials, attackers can bypass humans and move straight from scanning to impact.

“Security leaders need to shift to a more proactive approach, using agentic-powered threat detection and response to identify gaps and catch threats before they escalate,” said Hughes.

X-Force said its penetration tests still revealed “persistent weaknesses” in both software configuration and credential hygiene, with misconfigured access controls a common entry point across the board.

AI is a multifaceted problem for defenders

But that is not to say credential theft has diminished as an initial access vector – indeed, the X-Force report also identified a growing identity problem around AI, particularly when it came to some of the more popular generative AI services available to the public.

The researchers found that more than 300,000 ChatGPT credentials were exposed in 2025 thanks to the use of infostealer malware, a signal that the major AI platforms are subject to the same levels of risk as core enterprise software-as-a-service solutions.

Compromised AI chatbot credentials go beyond merely accessing personal accounts, the report said – they can be further abused to manipulate outputs, inject malicious prompts and, most worrying for enterprise security teams, exfiltrate sensitive data.

X-Force said this underscored a clear need for security leaders to assess their organisations’ AI use – particularly shadow use of public services – and enforce stricter policies around it.

And common with many other market observers – all of whom release similar reports around this time every year – the X-Force unit also observed a 49% increase in active ransomware groups compared with this time last year, with many smaller, transient operators running low-volume campaigns that complicate attribution somewhat.

This trend is also being driven in part by AI, which is increasingly playing a peripheral role in automating ransomware operations, and looking ahead, X-Force said it expected ransomware gangs would give over more tasks, such as reconnaissance and advanced attacks, to maturing AI models.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article 16 Eggcellent Easter Social Media Post Ideas for 2026 16 Eggcellent Easter Social Media Post Ideas for 2026
Next Article Fanttik’s foldable V10 Apex vacuum is on sale for the lowest price we’ve seen Fanttik’s foldable V10 Apex vacuum is on sale for the lowest price we’ve seen
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Linux’s sched_ext Will Prioritize Idle SMT Siblings For Better Performance
Linux’s sched_ext Will Prioritize Idle SMT Siblings For Better Performance
Computing
‘Reclusive’ billionaire owner of OnlyFans dies aged 43
‘Reclusive’ billionaire owner of OnlyFans dies aged 43
News
CISPE files a formal complaint against Broadcom with the European Commission
CISPE files a formal complaint against Broadcom with the European Commission
Mobile
Game Science reaches  billion in revenue, climbs to 10th place on Steam publishers list · TechNode
Game Science reaches $1 billion in revenue, climbs to 10th place on Steam publishers list · TechNode
Computing

You Might also Like

‘Reclusive’ billionaire owner of OnlyFans dies aged 43
News

‘Reclusive’ billionaire owner of OnlyFans dies aged 43

2 Min Read
News Mobility: Uber everywhere, all at once |  News
News

News Mobility: Uber everywhere, all at once | News

9 Min Read
Data Mesh in Action: A Journey From Ideation to Implementation
News

Data Mesh in Action: A Journey From Ideation to Implementation

58 Min Read
Every bulb on Govee’s new outdoor string lights can display multicolor effects
News

Every bulb on Govee’s new outdoor string lights can display multicolor effects

1 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?