VPNs facilitate attacker movements as fast as AI, experts say

Summary: It is warned that using VPNs and remote accesses converts communications into the fastest path for intrusion. Attackers can move through victim networks as rapidly as AI itself.

Traditional VPNs are becoming a critical risk in the age of AI

By MSB

A new report from cybersecurity firm Zscaler has sounded the alarm in the digital world: Virtual Private Networks (VPNs), long considered a key tool for secure remote access, are transforming into one of the main entry points for cyberattacks in 2026.

According to the ThreatLabz 2026 VPN Risk Report, there is a dangerous disconnect between the speed at which attackers evolve—driven by artificial intelligence—and the ability of organizations to defend themselves. While cybercriminals operate “at machine speed,” many enterprise infrastructures still rely on legacy technologies that are unprepared for this new scenario.

AI accelerates attacks and renders traditional defenses obsolete

One of the most concerning findings is that 79% of security professionals believe that artificial intelligence allows attackers to exploit vulnerabilities faster than they can be patched. Furthermore, 61% acknowledge that attackers are moving faster than their systems’ patching cycles.

This gap creates a critical scenario: systems fail to detect or respond in time, significantly increasing the risk of security breaches.

VPNs: “Encrypted pipes” that hide threats

The report also reveals a structural problem: many organizations lack visibility into the traffic passing through their VPNs. In fact, one in three companies does not inspect any encrypted traffic, turning these connections into opaque channels where attacks can go unnoticed.

Adding to this risk factor is user behavior. 63% admit that employees use VPNs to avoid accessing applications faster, creating uncontrolled access and expanding the attack surface.

Remote access, a new company weak point

The rise of remote and hybrid work has multiplied the dependence on VPNs, but it has also exposed their limitations. These technologies, designed for another era, grant broad access to the internal network, which facilitates lateral movement for attackers once inside the system.

Experts warn that this model is no longer sustainable: remote access has become the fastest path toward a security breach.

The transition to the Zero Trust model

Faced with this landscape, more and more organizations are abandoning traditional VPNs in favor of security architectures based on the Zero Trust model. This approach limits access only to necessary resources and continuously verifies user identity.

The trend is clear: companies are looking to reduce the attack surface, improve visibility, and adapt to an environment where threats evolve at the pace of artificial intelligence.

Conclusion

The 2026 report delivers a strong message: VPNs, far from being a secure default solution, can become a critical vulnerability point if they are not modernized. In a world where attacks are increasingly fast and sophisticated, security no longer depends only on protecting the perimeter, but on completely rethinking how access to systems is granted.

The question is no longer whether VPNs are safe, but how much longer they can remain so in the age of artificial intelligence.

Key facts

  • VPNs facilitate fast attacker movements.
  • Remote access is an efficient attack vector.
  • AI adoption accelerates breach risk.
  • The human response window has narrowed.

Why it matters

Over-reliance on remote access solutions without strict controls elevates the general attack surface. Organizations must urgently update their policies to ensure that VPN accesses are segmented and monitored with maximum vigilance. Ignoring this warning could lead to critical data breaches and significant financial losses.