ReliaQuest Warns of AI-Driven Four-Minute Cyberattacks

Dominic Jainy stands at the intersection of artificial intelligence and cybersecurity, bringing years of practical experience in machine learning and blockchain to the front lines of digital defense. As the landscape shifts toward automated warfare, his insights into how rapid-fire attacks bypass traditional human-led defenses have become essential for modern enterprises. Today, we explore the alarming compression of attack timelines, the evolution of social engineering through generative tools, and the strategic pivot toward agentic AI that allows defenders to reclaim the upper hand in a high-stakes environment where minutes literally define the difference between safety and catastrophe.

Average breakout times have dropped to roughly 34 minutes, with some lateral movements occurring in just four minutes. How does this compressed timeline change the pressure on security teams, and what specific steps should they take to bridge the massive gap left by manual response times?

The pressure on security teams has reached a fever pitch because the luxury of time has vanished; when an attacker can move laterally in just four minutes, the traditional 16-hour manual response window becomes a relic of the past. This 85% increase in speed means that by the time a human analyst even opens an alert, the adversary has likely already secured a foothold and begun their move toward sensitive data. To bridge this gap, teams must move away from reactive “human-in-the-loop” silos and integrate automated response playbooks that trigger the moment a deviation is detected. We have to treat security as a real-time race where the only winning move is to deploy systems that can lock down accounts and isolate segments without waiting for a manual click.

Automation now allows attackers to draft convincing social engineering scripts and scrape public data for high-value targets in seconds. What specific red flags should organizations train employees to spot, and how can helpdesk procedures be hardened to prevent these AI-enhanced identity thefts?

Organizations need to move beyond looking for typos and instead train employees to spot “contextual anomalies,” where the tone or urgency of a request doesn’t align with established corporate norms despite the perfect grammar. Attackers are now using AI to synthesize months of social media activity into a single, highly personalized lure, making it harder than ever to distinguish a fake request from a legitimate one. To harden the helpdesk, we must eliminate “knowledge-based” verification, which is easily bypassed by scraped data, and replace it with high-assurance verification like mandatory video callbacks or out-of-band hardware token approvals. These procedural flaws are currently a primary entry point, and fixing them requires a shift toward a culture where verifying identity is seen as a professional standard rather than an inconvenience.

Techniques like “ClickFix” and drive-by compromises have recently overtaken traditional phishing for initial access. How should infrastructure teams pivot their defense strategies to address these specific delivery methods, and what role does endpoint monitoring play in identifying these compromises before data exfiltration begins?

With ClickFix accounting for 59% of the top malware deliveries, infrastructure teams can no longer rely solely on email filtering to catch threats. They must pivot toward a more aggressive “assume breach” posture on the web, focusing on browser security and the hardening of internet-facing edge devices that are frequently targeted. Endpoint monitoring is the critical “last mile” in this defense, providing the visibility needed to see an unauthorized process spin up on an unmanaged device before it can phone home. Without 100% visibility across all endpoints, especially those lacking standard security agents, a drive-by compromise can transition to full data exfiltration in as little as six minutes, leaving no room for delayed detection.

Agentic AI is being used to achieve containment times of four minutes by adapting threat intelligence to specific environments. What technical hurdles must a CISO overcome to implement this level of automation, and how do you balance automated containment with the risk of disrupting legitimate business operations?

The primary technical hurdle for a CISO is overcoming “data fragmentation,” where logs are trapped in siloed systems, preventing an AI agent from having the full context it needs to make an accurate, autonomous decision. Implementing agentic AI requires a clean, unified data layer that integrates everything from cloud configurations to local admin logs so the system can understand the “normal” state of the environment. Balancing this with business continuity involves a tiered approach: starting with low-risk automated actions, like isolating a single workstation, while using “predictive security” to patch gaps before an attack even occurs. By tailoring the AI’s logic to the unique architecture of the business, we can ensure that a containment action is a surgical strike rather than a blunt instrument that takes down an entire production server.

Common security failures often involve overprivileged cloud accounts, unmanaged devices, and poor MFA coverage. When remediating these gaps, how do you prioritize the cleanup of standing privileges versus securing internet-facing edge devices, and what metrics prove these structural changes are actually working?

Prioritization must start with the external attack surface, specifically those internet-facing edge devices, because they represent the most immediate door for an adversary to walk through. Once the perimeter is stabilized, the focus must immediately shift to reducing standing privileges, as overprivileged cloud accounts are what allow an attacker to turn a minor breach into a full-scale catastrophe. We measure success by tracking “mean time to containment” and the reduction in “unmanaged assets” within our inventory; if these numbers aren’t trending downward, the structural changes are merely cosmetic. A successful remediation strategy ensures that even if an attacker manages to exploit a vulnerability, they find themselves in a highly restricted environment with nowhere to go and no credentials to use.

What is your forecast for AI-driven cybersecurity?

I believe we are entering an era of “autonomous warfare” where the human role shifts from being a manual operator to being a strategic supervisor of AI agents. In the next few years, we will see the total disappearance of the “slow” attacker; nearly 80% of ransomware groups are already leveraging automation, and that will soon reach 100%. For defenders, the focus will move from “detection and response” to “predictive prevention,” where AI identifies and closes a misconfigured cloud bucket or an overprivileged account before an adversary even knows it exists. Ultimately, the organizations that survive will be those that embrace agentic AI to match the four-minute breakout speeds we are seeing today, effectively making manual security a thing of the past.

Explore more

Sandworm Mode Malware Targets AI Coding Assistants via npm

The modern developer’s terminal has become a gateway for invisible predators that can compromise an entire cloud infrastructure through a single mistyped character. While the industry has historically focused on shielding network perimeters, the emergence of the SANDWORM_MODE campaign reveals a chilling reality: a simple spelling error in a package installation is now enough to invite a Shai-Hulud-style worm into

Semiconductor Giant Advantest Hit by Ransomware Attack

The global semiconductor supply chain, already strained by surging demand for high-performance computing and automotive electronics, faces a fresh wave of instability following a confirmed security breach at Advantest Corporation. Headquartered in Tokyo, this industry leader serves as a critical backbone for the manufacturing of advanced chipsets used in 5G infrastructure, artificial intelligence, and autonomous vehicle systems. On February 15,

SerpApi Sues SearchApi for Alleged Trade Secret Theft

Introduction The digital landscape of high-stakes search data processing recently witnessed a massive legal tremor as one of its most established players took a stand against alleged corporate espionage. In early 2026, SerpApi initiated a lawsuit against a former contractor and his subsequent company, SearchApi, citing the systematic misappropriation of trade secrets. This legal action highlights the vulnerabilities tech firms

Can AI Finally Secure the World’s Open-Source Code?

The digital backbone of global civilization currently rests upon millions of lines of open-source code that remain largely unvetted for critical security flaws despite their universal application. Most modern enterprises rely on shared libraries to power everything from financial transactions to power grids, yet the security of these foundations is often left to overextended volunteer maintainers. Traditional Static Analysis Security

Why Did MSI Return a Damaged Board With an ASUS Socket Cover?

The modern hardware ecosystem relies on a delicate contract of trust where consumers invest thousands of dollars into components with the expectation of reliable long-term support. As motherboards become increasingly complex, the role of authorized service centers has shifted from a secondary convenience to a critical pillar of hardware longevity. However, the global hierarchy of giants like MSI, ASUS, and