Tech »  Topic »  How Attack, Ransom, Breach Trends Are Evolving

How Attack, Ransom, Breach Trends Are Evolving


BakerHostetler Annual Threat Report Spotlights Latest Trends Marianne Kolbasuk McGee (HealthInfoSec) • March 26, 2026

Hackers are spending less time dwelling in victims' IT environments, stealing data more and encrypting systems less often than in the past, said a new threat report from law firm BakerHostetler. (Image: Getty Images)

Threat actors are spending less time in the systems they compromise, predominately stealing rather than encrypting data, still exploiting weak identity security, and utilizing artificial intelligence tools to craft more convincing phishing and social engineering scams, says a report published Thursday by law firm BakerHostetler.

See Also: AI Impersonation Is the New Arms Race—Is Your Workforce Ready?

Among the highlights of the findings are that the average dwell time threat actors spent in their victims' systems fell to 22 days in 2025, down from 36 days two years earlier, said attorney Elise Elam, a BakerHostetler partner.

Defenders are detecting intrusions faster ...


Copyright of this story solely belongs to bankinfosecurity . To see the full text click HERE