By a Cybersecurity Strategist and Threat Intelligence Expert
URGENT ANALYSIS – November 1, 2025
At the Oktane 2025 conference today, Okta executives revealed a finding that should send shivers down the spine of every CISO, security architect, and SOC manager. Brett Winterford, Okta’s VP of Threat Intelligence, stated plainly that based on their latest data, modern phishing sites are now often live for under one hour before being detected and taken down. When I heard this, my jaw dropped. For years, we in the security community have been operating under the assumption that we have hours, or at least a full business day, to respond to phishing alerts. That era is definitively over.okta
This isn’t a minor tactical shift by attackers; it represents a fundamental acceleration in the speed of cyberattacks that most organizations are dangerously unprepared for. This hyper-transient nature of phishing attack speed means that your security team’s threat response time has just become your single weakest link. If your incident response is measured in hours, you are already losing the battle.
This dramatic acceleration is the result of an arms race between AI-powered offense and AI-powered defense.
Phishing Detection AI: AI-powered security tools from companies like Google, Microsoft, and CrowdStrike can now identify and flag newly registered phishing domains and malicious sites at machine speed.AI threat detection systems catch and neutralize 995 of them within 30 minutes, the remaining 5 sites are still enough to achieve their goal of widespread credential theft.This is a game of speed and scale, and attackers are leveraging AI to play it far more effectively than most defense teams.
Artificial intelligence is fueling both sides of this conflict, but the imbalance in many organizations is stark.
| AI’s Role in Cyber Warfare | For Attackers (Offense) | For Defenders (Defense) |
|---|---|---|
| Generation | AI phishing kits can generate context-aware, spear-phishing emails and convincing login pages in seconds. | AI can generate security policies and code fixes. |
| Deception | AI-powered deepfake videos and voice cloning make vishing (voice phishing) and Business Email Compromise (BEC) attacks incredibly realistic. See our Deepfake BEC Defense Playbook. | AI can detect a deepfake, but it’s a difficult arms race. |
| Execution | Automated tools for credential compromise can test stolen passwords across hundreds of services instantly. | AI-powered behavioral analytics can detect anomalous credential usage. |
| Evasion | AI is used to constantly rotate domains, modify phishing page content, and bypass security detection filters okta. | AI threat detection platforms can identify new attack patterns at machine speed. |
The problem is that while attackers have fully embraced automation, many corporate security teams are still reliant on manual processes for incident response. This mismatch in threat response time is the critical vulnerability.
Brett Winterford’s most chilling point at Oktane was this: “Credential theft is still the order of the day for attackers, and it’s working”. The goal of the sub-60-minute phishing campaign is almost always to steal valid user credentials.okta
Why? Because one compromised credential, especially from a privileged user, can be the skeleton key to an entire organization. Attackers understand that most corporate security is focused on the point of authentication (the login page), not what happens after a user is authenticated. This is the post-authentication security gap.
As Auth0 President Shiv Ramji put it, leaders can’t simply “stop caring about security after authentication”.okta
The devastating impact of credential compromise was perfectly illustrated in the recent F5 BIG-IP breach. The attackers used valid (but stolen) credentials to access the system. The breach was only detected much later because the security team wasn’t effectively monitoring for post-authentication red flags, like access from unusual geolocations or attempts at privilege escalation. This is why a zero trust security mindset is paramount.
The sub-60-minute phishing window requires a radical rethinking of security operations. Annual penetration tests and weekly report reviews are no longer sufficient.
1. Implement Zero Trust Credential Management
Don’t just authenticate a user once at login. Continuously verify their identity and context with every sensitive action. Implement policies that trigger step-up authentication if a user’s behavior deviates from the norm.
2. Deploy AI-Powered Behavioral Analytics
Your security platform must be able to automatically detect anomalies in post-authentication security.
AI threat detection system should know what “normal” looks like for each user and flag any significant deviation.3. Automate the Credential LifecycleCredential lifecycle management needs to be automated.
credential compromise is suspected, your system should automatically revoke all associated session tokens and force a password reset.password security beginner guide to understand why passwords alone are broken.okta4. Invest in SOAR for Rapid Incident Response
If the attack lifecycle is 60 minutes, your threat response time needs to be in the single digits. This is impossible without automation.
incident response framework.5. Adopt an “Assume Breach” Mindset
Accept that prevention will eventually fail. Your employees will click on sophisticated phishing links. Your defenses must be built around the assumption that credential theft will happen. Focus your resources on rapid detection, containment, and recovery.
Shiv Ramji of Auth0 security also made a crucial point for the developer community. The pressure to innovate with AI is immense, but security cannot be an afterthought.
“I think you will see more and more effort put up front. More into planning, defining guardrails, what success looks like, because [with AI] the coding part actually is easy and fast,” Ramji said.okta
This is the essence of DevSecOps. Security must be embedded in the application development lifecycle from day one. Developers can no longer afford to “throw it over the wall” to the security team post-launch. Secure-by-default coding practices are mandatory, a topic we cover in our secure coding guide for beginners.
The Oktane 2025 revelation that the phishing attack speed has compressed to under an hour is the loudest wake-up call our industry has received in years. It confirms that we are in a new era of AI-driven threat velocity.
If your incident response playbook is a PDF file sitting on a shared drive and your threat response time is measured in hours or days, you are already compromised; you just don’t know it yet. The future of cybersecurity belongs to organizations that can fuse human expertise with machine-speed SOAR automation, enabling them to detect, decide, and respond in minutes, not hours. The clock is ticking faster than ever.
This is not a warning about a future threat. This is a debrief of an…
Let's clear the air. The widespread fear that an army of intelligent robots is coming…
Reliance Industries has just announced it will build a colossal 1-gigawatt (GW) AI data centre…
Google has just fired the starting gun on the era of true marketing automation, announcing…
The world of SEO is at a pivotal, make-or-break moment. The comfortable, predictable era of…
Holiday shopping is about to change forever. Forget endless scrolling, comparing prices across a dozen…