This January 2026 we’ve seen a significant surge in global cyberattacks, with a 17% year-over-year increase in incidents and a 10% rise in ransomware cases compared to January 2025. The landscape has been dominated by state-backed threats targeting critical infrastructure, widespread ransomware attacks, and the increasing use of Generative AI (GenAI) to heighten data exposure risks. 

Overall a highlighted shift towards AI-accelerated threats as well as a rise in disruptive, non-monetary cyberattacks, and intense focus on securing “agentic” AI and complex supply chains.  

Here’s a few observations based on the activity for the first month of the year: 

  1. AI-Driven Attack Acceleration 

AI is a beautiful yet terrifying beast. Its raw power makes light work for both sides of the Cyber War. Considering how easy it is to gain access to AI resources, it comes as no surprise that threat actors are leveraging “agentic AI” to discover and exploit vulnerabilities. Researchers this month reported “ZombieAgent,” a novel attack targeting LLMs via indirect prompt injection is capable of turning AI into a persistent, stealthy data-collection tool. 

 

The upside in this budding arms-race, is that AI tools are becoming far more readily available for use by defenders. Security Tooling has been tweaked in response to high-volume AI threats, CISOs are increasingly opting for third-party, specialized AI tools for detection and remediation. 

 

As if winter wasn’t bad enough, “EvilAI” Campaigns are now a thing. They can be malware campaigns disguising trojans as legitimate AI productivity applications, using signed code to steal browser data and credentials. 

 

  1. High-Profile Incidents and Data Breaches

Nike: Investigated a potential massive data breach where the WorldLeaks group claimed to have stolen 1.4 terabytes of internal data 

Target: Attackers targeted software supply chains, stealing 860 GB of code and developer documentation from US retail chain Target. 

Garner Foods: Targeted by the Play ransomware group, which threatened to release stolen data. 

Jaguar Land Rover (JLR): Continuing to suffer from the 2025 Scattered Spider attack, with operational recovery stretching into early 2026 

Zendesk: Hackers exploited unsecure support portals to generate massive volumes of spam 

AZ Monica Hospital (Belgium): Forced to cancel surgeries and transfer patients due to a ransomware incident. 

 

  1. Emerging Threats and Vulnerabilities

The NCSC has warned that Russian-aligned hacktivist groups have been targeting UK local government and critical national infrastructure with denial-of-service (DDoS) attacks. 

Zero-Click WhatsApp Flaw: A new zero-click vulnerability in WhatsApp for Android allowed targeted attacks via media files in group chats, prompting emergency configuration changes. 

HPE OneView Exploitation: Active exploitation of a high-severity remote code execution flaw (CVE-2025-37164) in HPE OneView exposed infrastructure management platforms. 

 

  1. Regulatory, Geopolitical, and Strategic Shifts

EU Cyber Resilience Act: The European Commission defined “important” and “critical” products under the Act, creating stricter compliance for software and hardware. 

UK Public Sector Plan: The UK Government unveiled a £210m security plan aimed at protecting public services from disruption-focused attacks. 

Machine Identity Crisis: Non-human identities (NHIs) in cloud environments—such as service accounts and API tokens—have become the primary vector for breaches due to excessive privileges.  

 

  1. Shift in Attacker Behaviours

Disruption over Profit: Hacktivist groups (notably aligned with Russian interests) are increasingly focused on, denial-of-service (DoS) attacks on critical infrastructure to cause maximum disruption rather than financial gain. 

Supply Chain Focus: Attackers are prioritizing the infiltration of third-party suppliers (e.g., in the Chinese manufacturing sector) to gain access to major tech firms like Apple.  

So tell me RS22, what are the knock on effects of these incidents, and what should I consider? 

 

GenAI is a Risk Multiplier:  

93% of organizations using GenAI reported data leakage risks, with 1 in 30 prompts posing a high risk of sensitive data exposure… If you’re worried about your staff frittering company intelligence into LLMs and their ilk, consider restricting the tools. If you’re unsure where to start, give us a shout.  

 

High-Impact Operational Disruption:  

Attacks in 2026 are predicted to be increasingly focused on disrupting operational technology (OT) and critical services, such as energy, logistics, and healthcare, resulting in immediate physical shutdowns. Knowing your industry’s position in the wider market place will help you to decide if your investment in Cyber Security should be AAA+ tools and resources, or No-Frills, lean and strong.  

 

The “Dual-Use” Risk:  

Critical infrastructure is increasingly considered “dual-use,” where attacks on local civilian systems (e.g., water, power) can have broader consequences. This has implications outside of work and into the home if the worst fears are realised.  

 

Increased Regulatory Pressure (UK):  

The UK government has moved forward with the Cyber Security and Resilience Bill to tighten security requirements on suppliers and critical infrastructure. 

 

Ransomware Shift:  

Leading ransomware groups like Qilin (15%), LockBit (12%), and Akira (9%) focused heavily on North America (52% of victims) and Europe (24%). Are you ransomware ready?  

We now have FREE Security Assessments available, simply email sales@rs22.co.uk with the subject SECURITY ASSESSMENT REQUEST and our team will be in contact.

Related Post

Reliable. Secure.

RS22

Unit 5, Three Spires House, Station Road, Lichfield, Staffordshire. WS13 6HX

Sales? Questions? Chat?

Connect With RS22

Other Links: