This January 2026 we’ve seen a significant surge in global cyberattacks, with a 17% year-over-year increase in incidents and a 10% rise in ransomware cases compared to January 2025. The landscape has been dominated by state-backed threats targeting critical infrastructure, widespread ransomware attacks, and the increasing use of Generative AI (GenAI) to heighten data exposure risks.
Overall a highlighted shift towards AI-accelerated threats as well as a rise in disruptive, non-monetary cyberattacks, and intense focus on securing “agentic” AI and complex supply chains.
AI is a beautiful yet terrifying beast. Its raw power makes light work for both sides of the Cyber War. Considering how easy it is to gain access to AI resources, it comes as no surprise that threat actors are leveraging “agentic AI” to discover and exploit vulnerabilities. Researchers this month reported “ZombieAgent,” a novel attack targeting LLMs via indirect prompt injection is capable of turning AI into a persistent, stealthy data-collection tool.
The upside in this budding arms-race, is that AI tools are becoming far more readily available for use by defenders. Security Tooling has been tweaked in response to high-volume AI threats, CISOs are increasingly opting for third-party, specialized AI tools for detection and remediation.
As if winter wasn’t bad enough, “EvilAI” Campaigns are now a thing. They can be malware campaigns disguising trojans as legitimate AI productivity applications, using signed code to steal browser data and credentials.
Nike: Investigated a potential massive data breach where the WorldLeaks group claimed to have stolen 1.4 terabytes of internal data
Target: Attackers targeted software supply chains, stealing 860 GB of code and developer documentation from US retail chain Target.
Garner Foods: Targeted by the Play ransomware group, which threatened to release stolen data.
Jaguar Land Rover (JLR): Continuing to suffer from the 2025 Scattered Spider attack, with operational recovery stretching into early 2026
Zendesk: Hackers exploited unsecure support portals to generate massive volumes of spam
AZ Monica Hospital (Belgium): Forced to cancel surgeries and transfer patients due to a ransomware incident.
The NCSC has warned that Russian-aligned hacktivist groups have been targeting UK local government and critical national infrastructure with denial-of-service (DDoS) attacks.
Zero-Click WhatsApp Flaw: A new zero-click vulnerability in WhatsApp for Android allowed targeted attacks via media files in group chats, prompting emergency configuration changes.
HPE OneView Exploitation: Active exploitation of a high-severity remote code execution flaw (CVE-2025-37164) in HPE OneView exposed infrastructure management platforms.
EU Cyber Resilience Act: The European Commission defined “important” and “critical” products under the Act, creating stricter compliance for software and hardware.
UK Public Sector Plan: The UK Government unveiled a £210m security plan aimed at protecting public services from disruption-focused attacks.
Machine Identity Crisis: Non-human identities (NHIs) in cloud environments—such as service accounts and API tokens—have become the primary vector for breaches due to excessive privileges.
Disruption over Profit: Hacktivist groups (notably aligned with Russian interests) are increasingly focused on, denial-of-service (DoS) attacks on critical infrastructure to cause maximum disruption rather than financial gain.
Supply Chain Focus: Attackers are prioritizing the infiltration of third-party suppliers (e.g., in the Chinese manufacturing sector) to gain access to major tech firms like Apple.
93% of organizations using GenAI reported data leakage risks, with 1 in 30 prompts posing a high risk of sensitive data exposure… If you’re worried about your staff frittering company intelligence into LLMs and their ilk, consider restricting the tools. If you’re unsure where to start, give us a shout.
Attacks in 2026 are predicted to be increasingly focused on disrupting operational technology (OT) and critical services, such as energy, logistics, and healthcare, resulting in immediate physical shutdowns. Knowing your industry’s position in the wider market place will help you to decide if your investment in Cyber Security should be AAA+ tools and resources, or No-Frills, lean and strong.
Critical infrastructure is increasingly considered “dual-use,” where attacks on local civilian systems (e.g., water, power) can have broader consequences. This has implications outside of work and into the home if the worst fears are realised.
The UK government has moved forward with the Cyber Security and Resilience Bill to tighten security requirements on suppliers and critical infrastructure.
Leading ransomware groups like Qilin (15%), LockBit (12%), and Akira (9%) focused heavily on North America (52% of victims) and Europe (24%). Are you ransomware ready?
RS22
Unit 5, Three Spires House, Station Road, Lichfield, Staffordshire. WS13 6HX
Recent Comments