Adversaries’ AI-driven threat innovation is evolving at an accelerated pace via streamlined information synthesis and automated workflows. This is resulting in more diverse adversary capabilities and new, indirect avenues of access. AI’s role on both sides of the cyber battle is anticipated to shift significantly as these technologies become more widespread.
The Elastic Global Threat Report uncovers real-world threat activities, revealing a fundamental shift in how adversaries achieve success today. It also includes a new section describing our visibility from non-telemetry sources, highlighting which malware families and threat behaviors were seen externally.
Access brokers are increasingly using information stealers to maintain a distance from collective defense efforts, significantly escalating the risks of credential exposure through cloud storage and other services. Trojanised software, which represented about 61% of all malware samples observed, was a major contributor; the ClickFix methodology is one of the most common techniques used to deliver trojans and infostealers. More than 24% of malware samples on Windows represented named infostealer code families.
This report from Elastic in late 2025 covers the following key trends in depth:
In-person networking and hospitality events for cybersecurity professionals and technology providers.
Security, Safety, and Trust for the AI Era.
Delivering Exceptional Experiences with a Differentiated Portfolio.
AppSec for agentic development.
Cyber resilience that keeps your business in business.
Your AI Isn’t Waiting.
AI-Native. Human-Led. United Against Every Threat.
The AI-Native Social Engineering Defense Platform.
Executive Assurance for Organisational Intelligence and Resilience.
The answer to your biggest data challenges.
Is there a clear line between manipulation and influence, and should security leaders care?
Share this story
We're a community where IT security buyers can engage on their own terms.
We help you to better understand the security challenges associated with digital business and how to address them, so your company remains safe and secure.