Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
    • Compliance & GRC
    • Endpoint Security
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs

State of the SOC 2025: Ransomware, Cloud Attacks & AI

N-able
04/09/2026
0
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


TL;DR

  • N-able's State of the SOC report analyzed 500,000 alerts over three months, escalating 83,000 security issues including 2,684 ransomware cases, with the fastest lateral movement occurring in just 8 minutes.
  • Cloud attacks surged to 44% of all threats (up from 30% previously), reflecting the security challenges of distributed workforces and rapid cloud adoption across enterprises.
  • AI now handles 70% of SOC investigations at N-able, with the remaining 30% requiring human expertise for complex cases—a balance that has enabled 153x more threat hunting activities.
  • The team demonstrated AI's augmentation value when it identified 13 indicators of compromise in 10 seconds versus 60 minutes for manual analysis, including finding two additional malicious IOCs the analyst had missed.
  • Emerging threats include "art of fear" attacks using OSINT to create panic without actual breaches, and hybrid environment vulnerabilities where identity controls can be undermined by synchronization conflicts between cloud and on-premises systems.

State of the SOC 2025: Key Findings and Threat Landscape Shifts

This episode unpacks N-able's State of the SOC report covering December 2024 through February 2025, revealing critical trends in the threat landscape. During this three-month window, the SOC processed nearly 500,000 alerts, escalating 83,000 as security issues requiring action. Of these, 2,684 were ransomware cases, and the team conducted nearly 1,000 incident response bridges. The data reveals a significant shift in attack vectors: cloud-based attacks now represent 44% of all threats, up from 30% the previous year, while endpoint attacks account for 56%. This shift reflects the industry's rapid cloud adoption and the challenges of protecting distributed, remote workforces. The report also documents an alarming 8-minute fastest breakout time—the speed at which an attacker moved laterally from one compromised endpoint to another—underscoring the critical need for rapid detection and response capabilities.

AI-Augmented SOC Operations and the Human-Machine Balance

The hosts explore how artificial intelligence is fundamentally reshaping security operations, with N-able achieving a 70% automation rate where AI handles initial triage and investigation, leaving 30% for human analysts to address complex cases. Will Ledesma shares a compelling case study from two years ago where a senior analyst spent 60 minutes manually identifying 10 indicators of compromise during an active incident. When the same data was processed by their AI system, it returned the same 10 IOCs plus three additional ones—two of which proved malicious—in just 10 seconds. This 360x speed improvement demonstrates AI's role in augmenting analyst capabilities rather than replacing them. The discussion emphasizes that AI drives conviction faster by identifying anomalies and patterns, but human judgment remains essential for final determination and complex threat hunting. The team reports opening up threat hunts by 153-fold since implementing AI augmentation, allowing analysts to focus on sophisticated investigations while automation handles routine escalations.

The Human Factor: Fear-Based Attacks and Organizational Resistance

Beyond technical threats, the episode examines psychological and organizational challenges in cybersecurity. The hosts discuss a recent "art of fear" attack where threat actors used open-source intelligence to create convincing fake screenshots suggesting they had breached an organization, triggering panic without actually compromising any systems. This social engineering tactic exploits emotional responses and organizational fear to create disruption. The conversation also addresses "Layer 8" problems—human resistance to security measures that cause operational disruption. Will and Hilda emphasize that effective security requires organizational acceptance of temporary disruptions for proactive threat containment, comparing it to taking a car in for tire repair. They note that hybrid environments present particular challenges, such as identity synchronization issues where disabling a compromised account in Azure has no effect if the on-premises Active Directory remains the source of truth and simply re-enables it during the next sync cycle.

Chapters

0:00 - Introduction and Host Backgrounds
3:38 - State of the SOC Report Overview
5:04 - Ransomware Dominance and Incident Response
7:53 - Shift from Endpoint to Cloud Attacks
16:07 - 8-Minute Breakout Time and Rapid Response
23:46 - AI's Role in SOC Operations
26:14 - Case Study: AI vs Human Threat Hunting
31:15 - The 70/30 AI-Human Balance
39:50 - Art of Fear Attacks and Social Engineering
44:11 - Year-Over-Year Threat Landscape Changes
46:13 - Hybrid Environment Security Challenges
47:36 - Closing Thoughts and Takeaways

Key Quotes

4:11 "In our State of the Sock report, we reported that our fastest breakout time was eight minutes. Well, that means that an attacker got into an endpoint and was able to break out of that endpoint and move into another endpoint within eight minutes."
16:21 "If our window is eight minutes, rapid response is absolutely necessary because it's just it's moving that fast."
24:45 "AI is doing nothing more than helping drive conviction at faster speed at faster time. AI was instructed and taught that by who, by a human, right? So all AI is doing is helping the human get to conviction faster."
28:26 "The return of that data of those IOCs, the 13, so essentially, the three other ones, right, that he had not come across, again, anomaly does not mean malicious, but in this case, two of the three were malicious, additionally, returned to us within 10 seconds."
32:32 "At 70%, we're finding a really good sweet spot in terms of 70% is handled by our AI that has been guided and led and trained and mentored by the human, where 30% is still being handled by the analyst."
44:51 "Within those three months, December to February, we found 44% of cloud attacks. That's amazing."
Categories:
  • » Cybersecurity » Cloud Security
  • » Data Protection
Channels:
News:
Events:
Tags:
  • Security Operations
  • Cloud Security
  • AI & Machine Learning
  • Threat Intelligence
  • Identity & Access
  • Technical Deep Dive
  • Best Practices
  • State of the SOC Report
  • Ransomware Trends
  • Cloud Security Attacks
  • AI in Security Operations
  • SOC Automation
  • Threat Hunting
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: State of the SOC 2025: Ransomware, Cloud Attacks & AI

              Upcoming Webinar Calendar

              • 04/15/2026
                01:00 PM
                04/15/2026
                Service Account Security in the Age of AI: From Legacy Accounts to Agentic Identities
                https://www.truthinit.com/index.php/channel/1866/service-account-security-in-the-age-of-ai-from-legacy-accounts-to-agentic-identities/
              • 04/16/2026
                11:00 AM
                04/16/2026
                Beyond the Alert – Building the Human Centric Agentic SOC
                https://www.truthinit.com/index.php/channel/1372/beyond-the-alert-–-building-the-human-centric-agentic-soc/
              • 04/21/2026
                02:00 PM
                04/21/2026
                How Purpose Brands scales IT with Zendesk ITAM
                https://www.truthinit.com/index.php/channel/1881/how-purpose-brands-scales-it-with-zendesk-itam/
              • 04/30/2026
                10:00 AM
                04/30/2026
                Insights from the 2026 Keepit Annual Data Report on SaaS Data Protection
                https://www.truthinit.com/index.php/channel/1868/insights-from-the-2026-keepit-annual-data-report-on-saas-data-protection/
              • 04/30/2026
                01:00 PM
                04/30/2026
                The New Economics of VMware Exit
                https://www.truthinit.com/index.php/channel/1880/the-new-economics-of-vmware-exit/

              Upcoming Events

              • Apr
                15

                Service Account Security in the Age of AI: From Legacy Accounts to Agentic Identities

                04/15/202601:00 PM ET
                • Apr
                  16

                  Beyond the Alert – Building the Human Centric Agentic SOC

                  04/16/202611:00 AM ET
                  • Apr
                    21

                    How Purpose Brands scales IT with Zendesk ITAM

                    04/21/202602:00 PM ET
                    • Apr
                      30

                      Insights from the 2026 Keepit Annual Data Report on SaaS Data Protection

                      04/30/202610:00 AM ET
                      • Apr
                        30

                        The New Economics of VMware Exit

                        04/30/202601:00 PM ET
                        More events
                        Truth in IT
                        • Sponsor
                        • About Us
                        • Terms of Service
                        • Privacy Policy
                        • Contact Us
                        • Preference Management
                        Desktop version
                        Standard version