Website logo
Home

Blog

Cyber ​​Security: 10 Threats in 2026

Cyber ​​Security: 10 Threats in 2026

2025 will end.As 2026 approaches, the cyber security world is gearing up for the challenges ahead.Every year, many researchers have compiled a list of the biggest threats on the Internet.We have listed the main trends. Read also: see the 9...

Cyber Security 10 Threats in 2026

2025 will end.As 2026 approaches, the cyber security world is gearing up for the challenges ahead.Every year, many researchers have compiled a list of the biggest threats on the Internet.We have listed the main trends.

Read also: see the 9 biggest threats of 2025

CybeatitstacksPersonally powered by Ai

Never too sweet, the skill will be exploited by cybercriminals.

Trend Micro's Ryan Flores said, "The era is upon us when AI agents can discover, leverage, and monetize creative organizations."

This year has already been marked by cyber-attacks conducted almost entirely by AI.We will especially remember the "highly sophisticated espionage campaign" driven by AI, which was thwarted by AI viruses recently highlighted by Anthropic, or the Google Threat Intelligence Group (GTIG).They adapt their code in real-time during attacks using artificial intelligence.These threats are expected to increase in the coming months.

This emphasizes how TASTERSIS is the "autonomous industry in history" in an internet-dominated world.Researchers are autonomous demonstration activities, or often write their own code.

"AI has given attackers the ability to operate at the speed of a machine, and no human security team can keep up," warns Espria, a UK-based cyber security and IT services company.

Ransomware that colludes with AI

Artificial intelligence will also make its mark in the world of extortion.In the last year, several ransomware based on artificial intelligence have already appeared, starting with PromptLock, the first AI software ransomware, which was discovered by ESET a few months ago.

In 2026, cybercriminals will increasingly use artificial intelligence to improve their ransomware.From now on they will be self-directed.With artificial intelligence, specialized ransomware viruses will identify victims, exploit system vulnerabilities, and even communicate directly with them.In this context, ransomware will no longer simply encrypt data, but will use psychological pressure to force victims to pay the ransom, Check Point predicts in a report sent to 01net.

Leveraging the rise of AI, “ransomware and extortion through data theft will remain the costliest forms of cybercrime globally,” says Google.Cybersecurity Ventures estimates that ransomware already costs companies $57 billion a year.The private company estimates that the annual bill will exceed $100 billion by 2030.

Read also: Why ransomware causes more and more damage

Crack AI-Phishing Act

Armed with AI, trackers will bombard users with sophisticated emails.This is the gradual end of poorly written families in which it is easy to include fraud, the report 'Heretorty' estimates.

Internet researchers estimate that Ai will be able to produce millions of variations of the same message, tailored to the language, voice, bank or service used by each target.Criminals feed AI with the data from the flood to produce personalized messages called ultra---which means "Reply to support tickets" or "Delivery reminders".

In 2026, it will not be enough to detect spelling or syntax errors to detect a cyberattack.In other words, we are entering an era in which fraudulent messages, by e-mail or SMS, will be possible if possible.

AI, data leakage vector

For ProofPoint, AI agents will become "the leading source of data leakage" in 2026. "In the rush to deploy AI assistants, companies fail to recognize that these agents are also subject to data hygiene gaps that are already harming their systems," says ProofPoint's latest report.

The ubiquity of artificial intelligence agents risks a further increase in data leaks.An example of an AI browser such as Comet or ChatGPT Atlas is the most impressive.Many experts have shown that sensitive data, especially medical data, can be stored in artificial intelligence-based browsers.

In order to extract this information, hackers can try to manipulate AI agents, especially through landing pages, hidden instructions or even malicious requests.Many studies have shown that AI can be easily manipulated into communicating sensitive data.This is especially the case when an AI model is directly connected to online devices, giving them access to sensitive data.

The Rise of Deep Fax

The conclusions of artificial intelligence, Deepfakes will continue to be developed and used by cybercrime.Google Cloud predicts that cybercriminals will go "beyond simple text phishing campaigns to exploit the capabilities of many artificial intelligences."In other words, scams consisting of AI-generated videos or images are likely to grow.

For Trend Micro, deep spoofing will be the preferred tool for hackers in 2026. In fact, "businesses, authorities and civil society will have to face the erosion of collective trust in what is perceived as real," Netskope worries. Next year, it will no longer be possible to trust what we see online.This year it has already become very difficult due to the explosive spread of highly effective image generators, such as Google Nano Banana or OpenAI Sora.

Read: Unnecessary marriages will inform your voice and make profound changes

Attacks for the rise of quantum computing

In the near future, computers on wheels will significantly change computers.These space machines, which are still under development, use qubits, which allow them to perform calculations faster and more complex than bit computers.

In anticipation of the advent of quantum computers, cybercriminals will increase cyberattacks based on the "harvest now, withdraw later" strategy.As part of these activities, hackers steal and store encrypted data today, even if they cannot extract it with current technology.Hackers are waiting for quantum computers to become powerful enough to break current encryption.They will be using it to extract information in the future.Quantum computers threaten to be "the foundations of current cryptography," the survey says.

For Trend Micro, "state-sponsored criminal organizations will turn to attack tactics," with the rise of quantum environments, hybrid clouds, and AI infrastructure expected to be the main targets of foreign powers next year.Netskope warns that with "quantum security becoming a reality" next year, along with the group's aggressive attacks, the threat will no longer be just a theory.Netskope researchers are particularly concerned about company secrets being compromised or diplomatic communications being intercepted next year.

Supply chain attacks have exploded

Cyber ​​security experts are also concerned about an increase in cyber attacks targeting the supply chain.In the coming year, cybercriminals will focus their efforts on an organization's suppliers, service providers, or partners rather than the organization itself.This increasingly common tactic makes it possible to bypass a target's security mechanisms.

"Supply chain attacks are on the rise because attackers know it's easier to implicate a partner than a target," Espria tells us.

For example, hackers can inject malicious code into legitimate updates, corrupt software resources (such as libraries or NPM packages), or break into contractor systems.Among the main targets of cybercriminals are open source packages and vendors that are full of security flaws that have not yet been fixed.As Check Point points out, “trust at scale becomes unmanageable” in increasingly complex and interconnected ecosystems.A compromised weak link can expose dozens or hundreds of organizations to hackers themselves.

North Korean hackers are becoming more active

North Korean cybercriminals will hit the headlines in 2025. In one year, Lazarus made more than $2 billion in cryptocurrency.The South Koreans also stopped expanding their spy operations, especially when they created military forces in Europe.

Hackers will be sponsored by Panjians in the coming months.Cash Google estimates that "North Korea's cyber ecosystem continues to ramp up its high-profile operations targeting crypto organizations and users."These operations generate revenue for the North Korean system, the Google report added.

As they increase their attacks, pirates increase their technological capabilities.Like other criminals, they will make extensive use of AI and deep fake videos, especially in the context of attacks based on fake job offers.At the same time, North Korean spies will continue to infiltrate legitimate businesses, especially in Europe.

Read also:North Korean hackers have managed to hack the technology at the heart of cryptos

Widespread removal of airtags

Since their introduction to the market, Bluetooth trackers, especially Apple AirTags, have been hijacked by individuals with malicious intent.They use it to track their victims without their knowledge.You can put the tag in a bag or under the car.Many experts fear that the trend will accelerate next year.

For criminal networks, these tags become a source of sensitive information at a reduced cost.Simply slide the bait over a truck, container, warehouse or even a vehicle.The rogue can then examine the roads to identify weak points, such as unaccompanied parking lots, repeated trips or overnight stops, with artificial intelligence.

Tracking data can also be combined with other sources (drones, cameras, stolen phone data, internal leaks) to plan a robbery, kidnapping or burglary.Here again, the rise of artificial intelligence exacerbates an already existing problem.In this case, AI will help criminals process the data they have.

Also read: Apple FIELD allows you to check “any computer, smartphone or console”

Rain of attacks on crypto

Google Cloud expects increased attacks on crypto platforms, decentralized financial bridges and investor wallets.It is not surprising that most of the attacks will be sponsored by North Korean hackers.Here again, AI will play an important role in cyber attacks that will become more sophisticated.In particular, we are talking about more targeted attacks on investors who have accumulated colossal assets.Artificial intelligence will also help cybercriminals create more effective money laundering schemes.

As Google points out, there are more and more entry points for hackers who want to steal.Over time, Cresspto's ecosystem has been really developed to multiply high-risk links.For example, it is the case of bridges that allow you to move from one block to another and between the llamas of your favorite Mares targets.

On this background, Choinanalysis experts fear that 2026 will set a new record for Cryptocurrency theft. According to estimates from Chiainanalysis and other companies, more than 2.5 billion dollars, with a total of 4 years.

👉🏻Follow technology news in real time: add to your feed in Google News, subscribe to our Whatsapp channel or follow us on Tiktok for videos.

Stay informed with the most engaging stories in your language, covering Sports, Entertainment, Health, Technology, and more.

© 2025 Cable's Chronicles, Inc. All Rights Reserved.