Fresh science news from the world
Provided by AGPLAKE MARY, Fla., May 13, 2026 (GLOBE NEWSWIRE) -- Spur Intelligence released findings from its 2026 IP Intelligence Study, revealing that anonymizing infrastructure, such as VPNs and residential proxies, is now embedded in nearly every modern cyberattack, yet most organizations are unequipped to stop it.
Based on a survey of more than 200 security practitioners, the study found that 94% of organizations report VPNs or residential proxies are involved in security incidents. By routing malicious activity through infrastructure that appears to be legitimate user traffic, attackers can bypass traditional detection methods and operate without raising immediate suspicion.
This creates a fundamental shift in detection. When malicious activity is indistinguishable from real users, security teams can no longer rely on basic IP signals or reactive workflows to identify threats before damage occurs. More alarming: only 30% of organizations reported understanding the problem before an incident occurred.
“Attackers have figured out how to blend in,” said Riley Kilmer, co-founder of Spur. “What used to stand out as suspicious now looks like normal behavior. Unfortunately, most organizations still don’t have a clear understanding of how anonymized infrastructure is being used against them.”
Blind spots amplify risk
Anonymizing infrastructure is only part of the problem. Many organizations lack strong controls over internal access paths, particularly in environments with remote work and bring your own device (BYOD) policies.
Together, these gaps create compounding risk. When malicious activity blends into normal traffic and moves through environments with limited visibility, detection and response are significantly more difficult.
Widespread exposure, limited understanding
Anonymized IP activity is now a routine part of attacks, but most organizations lack a clear view of how it works in practice. Without that understanding, security teams are forced into reactive workflows, responding after the fact rather than stopping threats in real time.
These findings reinforce that IP intelligence can no longer be treated as a back-end investigative tool. Security teams need to apply IP context earlier in workflows to inform real-time decisions on access, authentication, and fraud. Those that make this shift will move faster, reduce operational overhead, and close gaps that attackers are actively exploiting.
Download the full report and learn more.
Methodology
The Spur 2026 IP Intelligence Study surveyed more than 200 security practitioners between February and March 2026 across industries, including IT, telecommunications, and financial services. Respondents represent roles in security operations, incident response, threat intelligence, fraud prevention, and compliance.
About Spur Intelligence
Spur delivers the highest-fidelity IP intelligence available to detect anonymized, proxied, or otherwise obscured internet traffic, empowering you to stop fraud, fake users, and threats. Designed by expert security researchers and engineers, Spur elevated VPN attribution, bot detection, and residential proxy tracking to protect the most mission-critical government and commercial systems in the world.
Media Contact:
Jennifer Tanner
Look Left Marketing
spur@lookleftmarketing.com
A photo accompanying this announcement is available at https://www.globenewswire.com/NewsRoom/AttachmentNg/658cb769-37c4-4a36-be1d-453a58c797ae
Legal Disclaimer:
EIN Presswire provides this news content "as is" without warranty of any kind. We do not accept any responsibility or liability for the accuracy, content, images, videos, licenses, completeness, legality, or reliability of the information contained in this article. If you have any complaints or copyright issues related to this article, kindly contact the author above.