Transforming insights: Leveraging the Year in Review for enhanced incident response strategies

Apr 10, 2026 | Threat Intelligence Research

Comprehensive Insights from Cisco Talos’ Year in Review Report

TL;DR
Cisco Talos has released its latest “Year in Review,” detailing evolving threats based on extensive incident response data. The report emphasizes the increasing sophistication of identity-based attacks and vulnerability exploitation, providing actionable insights for organizations to enhance their cybersecurity readiness.

Main Analysis
The “Year in Review” by Cisco Talos offers a critical assessment of the previous year’s cyber threat landscape, synthesized from extensive telemetry data, incident response engagements, and observed attacker behaviors. The report highlights a notable prevalence of identity-based attacks, with incidents related to Active Directory accounting for a substantial percentage of cases, showcasing how attackers are increasingly leveraging valid credentials rather than employing sophisticated exploits. This trend was further exemplified in the 2025 report, indicating a doubling of MFA spray attacks targeting identity and access management infrastructures, a clear evolution in attacker strategy.

The report also categorizes persistent weaknesses in cybersecurity practices. Organizations often struggle with issues such as misconfigured MFA policies and inadequate asset inventories, vulnerabilities that are regularly exploited by adversaries. Device compromise is on the rise, indicating a shift toward reliable access methods over sporadic exploits. Cisco’s insights encourage organizations to tailor their cybersecurity exercises and tabletop scenarios specifically to these evolving trends, reflecting the tactics used by adversaries in their recent operations.

For defenders, the use of the “Year in Review” report as a practical tool for tabletop exercises is a pivotal takeaway. It serves as an adversary playbook and allows security teams to simulate real-world scenarios, such as breaches involving MFA circumvention. By grounding these exercises in actual incidents, organizations can better prepare to identify anomalies and coordinate responses effectively. Additionally, the report underscores the need for validating detection capabilities against the actual tradecraft utilized by adversaries, enabling organizations to focus on persistent threats rather than hypothetical scenarios.

Defensive Context
Organizations should pay particular attention to the increasing frequency of identity-based attacks, particularly those relying on compromised credentials to bypass security mechanisms. Sectors that are regularly targeted, such as manufacturing and healthcare, should prioritize adapting their tabletop exercises to reflect the specific tactics observed in the “Year in Review.” For companies unrepresented in these sectors, while they may not feel immediate pressure, an understanding of these evolving attack vectors is crucial for long-term preparedness.

Why This Matters
The intelligence gleaned from Talos’ report highlights real-world risks, particularly in industries with repetitive targeting patterns. For example, the revelation that identity-based attacks often exploit MFA misconfigurations underscores vulnerabilities that permeate across sectors. Organizations with outdated security practices or exposed legacy systems remain particularly vulnerable, underscoring the necessity of proactive cybersecurity measures.

Indicators of Compromise (IOCs)
The report details various attack vectors and vulnerabilities that should be on the radar of security teams, including weaknesses associated with legacy systems and recent prevalent tools like React2Shell and ToolShell, though specific IOCs are not explicitly defined. The focus should remain on adapting defenses based on these observed trends to maintain an effective security posture.

Click here for the full article

Try our Intelligence today!

Streamline your security operations with a free Q-Feeds trial and see the difference.

Other articles