We have entered the agentic era, and every process is becoming faster and more automated. AI has also introduced a new dimension of risk: adversaries targeting the very AI systems underpinning the modern enterprise.

2025 was marked by the rise of the evasive adversary. Today’s threat actors are invading detection by accelerating their tradecraft with AI, exploiting blind spots, and targeting edge devices to stay under the radar. They have evolved to evade detection better than ever before, speeding up attacks with the fastest e-crime breakout time in just 27  seconds. Adversaries are weaponizing AI, increasing their volume of attacks by 89% and challenging traditional security defences.

 In the agentic era, cybersecurity is the foundational infrastructure required to protect AI itself.

According to the latest insights from CrowdStrike, adversaries are increasingly gaining access through legitimate credentials, trusted identities, and unnoticed behaviour. In a cloud-driven environment across AWS, Azure, and GCP, this shift is redefining what it means to be secure.

 

The Age of the AI Adversary Begins

In 2025, AI-enabled adversaries increased attacks by 89% year over year. AI accelerated phishing and automated reconnaissance, shortening the time from initial access to impact. It elevated less sophisticated threat actors and amplified the most advanced ones. It compressed the time between intent and execution.

The average eCrime breakout time fell to 29 minutes in 2025, a 65% increase in speed from the prior year. The fastest breakout took just 27 seconds.

Attack Trends

  • Cloud-conscious intrusions rose 37% in 2025, including a 266% increase among state-nexus threat actors. Valid account abuse accounted for 35% of cloud incidents, reinforcing that identity has become central to intrusion. Zero-day exploitation prior to public disclosure increased 42%, compressing the time between vulnerability discovery and active exploitation.
  • China-nexus activity increased 38% in 2025. In 67% of the vulnerabilities China-nexus adversaries exploited, the flaw provided immediate system access. Of those exploited vulnerabilities, 40% targeted internet-facing edge devices. Newly disclosed vulnerabilities were weaponized within days.

Modern Adversaries gain legitimate access through identity, move rapidly through cloud and edge infrastructure, and weaponize vulnerabilities before defenders can respond. Speed, legitimacy, and low-visibility access paths now define evasive tradecraft.

 

Conclusion

The cybersecurity playbook is changing, and identity is at the center of it. Organizations that continue to rely on legacy, perimeter-focused defenses will struggle to detect modern threats. The future belongs to those who embrace identity-first security, Zero Trust principles, and continuous monitoring.

In the agentic era, defending against AI-accelerated adversaries, and securing AI systems themselves, requires operating at machine speed.

Secure Your Identity Layer Before Attackers Do

Reputiva helps organizations protect what matters most:

  • Identity and access across AWS, Azure, and GCP
  • Zero Trust architecture implementation
  • Cloud and AI security strategy
  • Continuous monitoring and threat detection

Book a Cloud & Identity Security Assessment

Navigate

Let's talk

Networks

Privacy Preference Center