Every year, the Verizon Data Breach Investigations Report sets the tone for how the industry understands the threat landscape. And every year, the most important question isn’t what’s changed — it’s whether organizations are keeping up. Based on the 2026 Verizon DBIR, the honest answer is: not fast enough.
This year’s report is notable not just for its breadth — spanning thousands of confirmed breaches and incidents across industries and geographies — but for the depth of its focus on application-layer risk. For application security teams, developers, and CISOs, the 2026 Verizon DBIR is essential reading. Here’s a breakdown of the findings that matter most for application security.
Exploitation of Vulnerabilities Is Now the #1 Breach Vector in 2026 Verizon DBIR
For years, the conversation around breach prevention centered on credentials — stolen passwords, phished logins, compromised accounts. That era is over.
The 2026 Verizon DBIR confirms that exploitation of vulnerabilities has risen to 31% of initial access vectors, overtaking credential abuse — now down to 13% — as the leading cause of breaches. That’s not a marginal shift. It represents a fundamental change in where attackers are finding their footholds.
The implication is direct: attackers have recalibrated. They’re targeting unpatched, unfixed code because it works — and because the data shows it stays vulnerable long enough to be worth targeting. For security teams that have historically prioritized identity and access controls above application security, this is the signal to rebalance.
Remediation Rates Are Moving in the Wrong Direction
If the rise of exploitation is alarming, the state of remediation makes it worse. The 2026 Verizon DBIR reports that only 26% of critical vulnerabilities — defined as those appearing in CISA’s Known Exploited Vulnerabilities (KEV) catalog — were fully remediated by organizations in 2025 . That’s a steep drop from 38% the prior year.
It gets harder to explain away when you add the time dimension. The median time to full resolution climbed to 43 days, up from 32 days the year before . Part of that is volume — the median number of KEV vulnerabilities organizations had to patch rose from 11 in 2024 to 16 in 2025, nearly a 50% increase . More to patch, slower to patch it, fewer getting fully cleared. The math is not on defenders’ side.
For security and engineering leaders, this isn’t just a patching problem. It’s a resourcing, prioritization, and process problem — and it suggests that the current approach to vulnerability management isn’t scaling with the threat.
Code Flaws Take Far Longer to Fix Than Most Teams Realize
One of the most compelling new additions to this year’s DBIR is a CWE survival analysis drawn from a dataset of code flaw detection across the software development life cycle they received from a new contributor who has special data and insights into that information… wink wink. The analysis measures how long it takes organizations to remediate 50% of identified flaws, grouped by CWE category — giving us a rare, data-driven view into the actual pace of code-level remediation in practice.
The results are striking. Across the top three CWE categories, the median time to reach 50% remediation is between six and seven months. That figure applies to organizations with mature SDLC processes — teams that are, by definition, taking remediation seriously. For everyone else, the picture is likely worse.
Six to seven months is a long time for a known flaw to remain open in code that may be running in production. It represents months of potential exposure, months of accruing technical debt, and months during which an attacker who finds the same flaw before your team fixes it has a viable path in.
The DBIR frames this plainly: resolving code flaws is costly and time-consuming even when it is taken seriously. The question for every development and security team is whether they are finding those flaws early enough to act on them before they become liabilities.
Improper Input Validation: The Hardest Flaw to Fix, and One of the Most Dangerous
Of all the CWE categories analyzed, one stands out for the worst median remediation time in the dataset: Improper Input Validation, at just over 13 months to reach 50% resolution .
That figure deserves a moment of attention. Improper Input Validation is not an obscure or specialized weakness. It’s the category that encompasses SQL injection, cross-site scripting, and a wide range of foundational vulnerabilities that have been well-understood for decades. The fact that this category — broad, dangerous, and long-documented — takes over a year before even half of identified instances are corrected speaks to both the volume of these flaws in real-world codebases and the difficulty of resolving them systematically.
This is precisely the class of vulnerability that shows up in breach after breach, year after year. The solution isn’t better incident response — it’s finding and fixing these flaws before they reach production in the first place.
GenAI Is About to Change the Vulnerability Discovery Calculus
The 2026 Verizon DBIR raises a forward-looking concern that security teams should take seriously now, before it becomes a crisis: the emerging use of GenAI platforms to discover large numbers of new vulnerabilities in codebases at scale.
This cuts two ways. On the offensive side, the report notes that threat actors are increasingly using GenAI to assist with vulnerability research, target selection, and tool development. On the defensive side, AI-augmented discovery tools are surfacing vulnerabilities faster than traditional methods — which is valuable but also means the incoming volume of findings is going to increase significantly.
The 2026 Verizon DBIR puts the question directly: how will this change the calculus of discovery and resolution of code flaws ahead of shipping software? For organizations already struggling with remediation backlogs and declining fix rates, a surge in newly discovered vulnerabilities — whether surfaced by defenders or exploited by attackers — raises the stakes considerably.
The answer isn’t to slow down discovery. It’s to build the processes and tooling that can absorb and act on findings earlier, when they’re less expensive to fix and before they reach the hands of someone with worse intentions.
The Throughline: Find It Earlier
Every major finding in the 2026 Verizon DBIR traces back to the same underlying dynamic. Vulnerabilities are being found too late in the lifecycle, fixed too slowly once identified, and exploited in the window between. The rise of exploitation as the top breach vector isn’t a new threat — it’s an old problem that’s been allowed to compound.
The data makes a clear case for addressing security earlier in the software development process. A flaw caught during development carries a fraction of the cost — in time, resources, and risk — of one discovered in production or, worse, in a breach. The survival analysis data makes that cost visible in a way that’s hard to dismiss: six to seven months is the median fix time for mature teams. For code that never gets surfaced during development, the clock never even starts.
As GenAI reshapes how fast vulnerabilities are found — both by defenders and by attackers — the organizations best positioned to manage that shift will be the ones with security integrated into their development workflow from the start.
Read the Full 2026 Verizon DBIR Report
The 2026 Verizon Data Breach Investigations Report is out now, and it’s one of the most data-rich editions in the report’s history. Whether you’re a security practitioner, an engineering leader, or a CISO making the case for AppSec investment, it’s required reading.
We’re proud to be a contributor to this year’s research — and proud of what the findings represent for the broader conversation about how and when organizations should be addressing code-level risk.
👉 Read the full 2026 Verizon DBIR
Veracode is a named data contributor to the 2026 Verizon Data Breach Investigations Report.
