Kimberly Bartok, Enterprise Public Relations Leader, kim.bartok@rsmus.com, 212.372.1239
for media use only
Kimberly Bartok, Enterprise Public Relations Leader, kim.bartok@rsmus.com, 212.372.1239
for media use only
CHICAGO – (March 18, 2026) – RSM US LLP (“RSM”), the leading provider of assurance, tax and consulting services for the middle market, today released its 2026 RSM Attack Vectors Report, revealing that cybercriminals continue to exploit predictable weaknesses in digital identity, cloud and application environments – often amplified by human factors – to escalate initial access into enterprise-wide systems.
First launched in 2022, RSM’s Attack Vectors Report has become an annual cybersecurity research series grounded in insights from hundreds of offensive security engagements. Findings are based on approximately 650 offensive security engagements conducted across middle and upper‑ market organizations throughout 2025. By examining vulnerabilities’ ratings and attack vectors, RSM uncovered key trends shaping today’s threat environment.
The report provides organizations with insight into the cybersecurity challenges they face and a critical head start in developing a practical cybersecurity strategy to focus resources on areas that may be most at risk.
Key findings from the report:
“The threat landscape in 2025 placed sustained pressure on organizations as AI adoption, cloud complexity and identity sprawl expanded attack paths across enterprise environments,” said Daniel Gabriel , Head of Cyber Consulting at RSM. “Even organizations with substantial security investment struggled to maintain consistent control effectiveness when governance, visibility and architecture failed to keep pace with technology adoption.”
Despite using recurring attack patterns, the digital threat landscape remains in constant flux, with adversaries continually adapting to outmaneuver security measures.
“The report found that successful attacks rarely rely on a single critical vulnerability. Instead, threat actors chain together moderate-risk weaknesses across identity systems, applications, cloud environments and internal architecture to bypass layered defenses and gain privileged access,” noted Gabriel.
AI accelerates time-to-compromise for attackers
The report also highlights a significant shift in attacker efficiency driven by widespread use of AI. AI-assisted scripting, exploitation chaining and tool development increased success rates by 40% and enabled testers to compress attack timelines from days to hours—or even minutes—outpacing many organizations’ detection and response capabilities.
In addition, AI vishing (voice phishing) and voice-cloning impersonation increased over phone and conferencing platforms, where many organizations lacked the telemetry, processes and controls that exist for email. These channels often intersect directly with identity processes, particularly help-desk password resets and emergency access requests.
“Many security programs still assume they have hours or days to identify, investigate, contain and remove an active threat,” added Gabriel . “In practice, AI-enabled offensive techniques are rapidly shrinking that window toward hours or minutes, reducing the effectiveness of semi-manual response processes and exposing gaps in detection, escalation and containment that were designed for a slower threat tempo. In addition, without AI-assisted defensive capabilities, organizations will struggle to contain initial compromise before it escalates into broader impact.”
Staying vigilant
Organizations that adopt risk-based prioritization, invest in identity & access management, detection and response, embrace automation and continuously validate controls can materially reduce exposure and limit incident impact against evolving attack techniques. Perfect prevention is not achievable, however, by prioritizing resilience and rapid recovery, and embedding security into engineering and operations rather than treating it as a periodic compliance activity will improve the ability to remediate vulnerabilities before adversaries can exploit them.
About the report
The 2026 RSM Attack Vectors Report analyzed 2,047 vulnerabilities identified across approximately 650 offensive security engagements conducted between January and December 2025 across North America, Europe and Asia. The report provides practical insight into how modern attacks unfold and how organizations can better contain inevitable failures before they escalate into enterprise-wide incidents.
In addition to the yearly Attack Vectors Report, which provides engagement-based insight into how cyberattacks unfold in practice, RSM publishes an annual Cybersecurity Report focused on enterprise risk, governance and resilience considerations for business leaders.
RSM empowers middle market companies worldwide to take charge of change. The clients we serve are the engine of global commerce and economic growth. Our unique middle market perspective makes RSM the natural choice for growth-oriented, internationally active organizations seeking relevant insights and tailored, innovative solutions for a complex and changing world. With a global reach spanning more than 120 countries, we instill confidence in a world of change by bringing the full power of RSM to make a lasting impact on our clients, colleagues and communities. For more information, visit rsmus.com, like us on Facebook and/or connect with us on LinkedIn.