APP Scam Reimbursement: One Year of...
On 7 October 2024, the UK’s Payment Systems Regulator (PSR) implemented a landmark regime requiring payment service providers (PSPs) to...
Read MoreArtificial intelligence will be one of the defining features of cyber threats in 2026. Attackers are using AI to automate reconnaissance, craft highly convincing phishing emails, generate malware, and, in some cases, operate autonomous attack campaigns. At the same time, defenders are deploying AI-driven analytics and behavioural detection to identify anomalies, reduce response times, and keep pace with fast-moving threats. This duality means AI will be central to both offensive and defensive security strategies.
AI will also introduce new risks to identity and access control. Automated systems can be manipulated to bypass multi-factor authentication and generate realistic synthetic identities that confuse defences. Security teams will need to develop strong AI governance frameworks and ensure trusted models are used responsibly across the enterprise.
Social engineering remains a core attack vector, but in 2026 AI will make these techniques far more sophisticated. Deepfake technologies can now produce credible audio and video impersonations of executives, suppliers, or trusted colleagues, increasing the risk of fraudulent authorisations, financial scams, and credential theft. In a survey by Regula, 53 per cent of UK and US financial professionals reported encountering AI-generated deepfake scams, and this trend is expected to intensify.
Because these attacks can be highly personalised and contextually convincing, traditional awareness training alone may no longer be sufficient. Organisations will need stronger verification processes and improved identity validation controls to protect against messages that appear genuine but are not.
Ransomware will remain a major cyber security challenge in 2026. Attackers are increasingly moving beyond simple data encryption towards multi-layered extortion, combining system disruption with data theft and threats of public exposure. This places greater pressure on organisations to maintain robust incident response plans and reliable, offline backups that can be restored without engaging attackers.
The continued growth of Ransomware-as-a-Service (RaaS) has lowered the barrier to entry for cybercriminals, allowing individuals with limited technical skills to launch sophisticated attacks. As a result, organisations face a broader and more aggressive threat landscape that requires proactive detection and continuous monitoring, rather than reliance on perimeter defences alone.
The shift to hybrid and multi-cloud environments brings flexibility and scalability, but also introduces new security risks. Misconfigurations, unsecured APIs, and inconsistent policies across platforms remain common causes of breaches. Organisations must adopt cloud-native security approaches that provide unified visibility and enforce consistent controls across environments.
Frameworks such as Secure Access Service Edge (SASE) and Cloud Security Posture Management (CSPM) are gaining traction because they help identify misconfigurations and reduce risk in real time. Ensuring cloud security keeps pace with hybrid working models will be critical to limiting the attack surface.
Traditional perimeter-based security models are increasingly ineffective. Zero Trust architectures, which assume no user or device should be trusted by default, are becoming a core component of modern security strategies. This approach requires continuous verification, least-privilege access, and stronger controls around identity and authentication.
As identity becomes the primary target for many attacks, organisations must focus on protecting credentials and monitoring user behaviour for signs of misuse. Early detection of anomalous access can significantly reduce the impact of breaches.
Supply chain attacks continue to present significant risk. Compromises affecting third-party software or services can quickly cascade across organisations that rely on shared platforms or dependencies. In response, many organisations are adopting Software Bills of Materials (SBOMs) and strengthening oversight of vendors and suppliers.
Improved visibility into software components and real-time monitoring of dependencies can help organisations identify vulnerabilities earlier and respond more effectively when issues arise.
While large-scale quantum computers capable of breaking today’s encryption are not yet in widespread use, the long-term risk they pose is driving action now. Governments and security agencies are encouraging organisations to begin transitioning towards post-quantum cryptography to protect data with long-term confidentiality requirements.
Preparing for a quantum future involves assessing current cryptographic systems, identifying long-lived data at risk, and planning a phased move towards quantum-resistant standards before the technology matures.
The cyber security trends shaping 2026 point to a more automated, intelligent, and persistent threat landscape. To respond effectively, organisations must combine advanced technologies with strong identity governance, resilient architecture, and continuous education. As threats evolve, so too must the strategies used to protect systems, data, and trust across digital environments.
AJC supports organisations in navigating an increasingly complex cyber security landscape by combining technical expertise with practical, risk-focused advice. We help organisations assess their current security posture, identify emerging threats, and design controls that align with both operational needs and regulatory expectations.
Our services include cyber security assessments, penetration testing, incident response support, and guidance on identity, cloud, and third-party risk management. We also work with organisations to strengthen governance, improve resilience, and ensure security strategies remain effective as technologies and threats continue to evolve.
If you would like to understand how these emerging trends may affect your organisation, AJC can help you take informed, proportionate steps to reduce risk and strengthen your cyber defences.
Contact us on 020 7101 4861 or email us at info@ajollyconsulting.co.uk if you think we can help.
Sources:
https://reflectiveit.com/blog/5-cybersecurity-predictions-for-2026/
https://cyberlab.co.uk/2025/11/27/2026-cybersecurity-predictions/
https://www.ibm.com/think/news/cybersecurity-trends-predictions-2026
https://www.oxan.com/insights/prospects-for-cybersecurity-in-2026/
https://www.sprintzeal.com/blog/future-of-online-security
https://snwire.com/top-9-cybersecurity-trends-to-keep-an-eye-on-in-2026/
https://www.splashtop.com/blog/top-cybersecurity-trends-and-predictions-for-2026
https://www.prodigitalweb.com/cybersecurity-predictions-for-2026/
https://www.theguardian.com/technology/2025/mar/20/uk-cybersecurity-agency-quantum-hackers
Image accreditation: Ruliff Andrean (Sept 2024) fromUnsplash.com. Last accessed on 22nd December 2025. Available at: https://unsplash.com/illustrations/a-person-sitting-at-a-desk-in-front-of-a-computer-J4_NZzkzBT8
On 7 October 2024, the UK’s Payment Systems Regulator (PSR) implemented a landmark regime requiring payment service providers (PSPs) to...
Read MoreFraud increases sharply during the festive season. The combination of busy shopping, increased travel and higher levels of online activity...
Read MoreA significant cyber-security incident struck multiple local authorities in London, forcing council systems offline, disrupting services for residents, and prompting...
Read More