In 2025, the corporate world witnessed a significant rise in artificial intelligence adoption, leading to a boom in AI-powered browsers, co-pilots, and personal assistants. However, Andrius Buinovskis, cybersecurity expert at NordLayer, a toggle-ready network security platform for business, emphasizes that cybercriminals were quick to adopt AI as well, automating and scaling their attacks, and this trend is projected to continue into the next year.
Buinovskis explains that in 2026, businesses can expect to see even more AI-powered cyber threats, alongside other risks that have persisted and will continue to challenge business cybersecurity in the new year. He outlines four main cybersecurity threats businesses should be on the lookout for in 2026.
1. AI-powered social engineering and AI-enabled malware
According to a report by the World Economic Forum, phishing and social engineering attacks increased by 42% in 2024. According to Buinovskis, the uptick that AI might have caused is likely to worsen.
“Social engineering is the basis for many attacks, and with AI, it’s bound to get more advanced,” Buinovskis says. “It will become increasingly more difficult to understand if an attack is being carried out using a sophisticated method or a simple approach. Essentially, the line between basic and advanced social engineering is blurring, making both its detection and resistance significantly more difficult.”
He outlines automated deepfake social engineering as a primary growing concern. Utilizing it, cybercriminals will be able to carry out even more believable attacks, tricking even the most well-prepared employees.
“The use of deepfakes is becoming increasingly more common and diverse, with some instances of students even using deepfakes for exams,” says Buinovskis. “Bad actors could definitely utilize highly believable videos and voice calls to impersonate CEOs, third-party contractors, or other employees to trick staff members into divulging sensitive information, accepting fake invoices, or handing over credentials to infiltrate the network and deploy a larger-scale attack.”
Buinovskis highlights AI-enabled malware as another rising threat to cybersecurity. Recently, Google identified the first instance of Just-in-Time (JIT) AI malware, a new type of malware that utilizes artificial intelligence to dynamically generate malicious code at runtime, making it highly adaptable and challenging to detect.
“JIT can generate malicious code dynamically, flying under the radar of traditional antivirus software that relies on static analysis,” says Buinovskis. “Its ability to analyze the target’s system in real time and dynamically generate malicious code tailored to specific vulnerabilities, configurations, or data enables it to deploy highly targeted attacks.”
2. An increase in ransomware
According to research by NordStellar, a threat exposure management platform, as of September 2025, the number of ransomware incidents has increased by 47% compared to the same period last year. Buinovskis says that the trend will most likely continue into the following year, especially with the introduction of AI-powered ransomware.
“Like other cybercriminals, ransomware groups are adopting AI and using it to scale their operations by automating the attacks,” Buinovskis says. “We’ve already seen how the rise of the ransomware-as-a-service model lowered the entry barrier for these attacks, allowing even hackers without the proper technical skillset to participate. With AI, ransomware groups will be able to cut down on the required human resources needed to carry out their operations, enabling them to execute attacks more quickly and efficiently.”
He emphasizes that if ransomware groups successfully implement AI and increase their efficiency, they will be able to reap the same profits with fewer human resources, resulting in a greater financial gain. This, Buinovskis notes, could be the catalyst for an even greater ransomware surge in the longer run.
3. Web-based attacks
Malicious browser extensions were a prominent cybersecurity topic in 2025, raising concerns over browser protection. However, they’re not the only browser-related threat to look out for — according to Buinovskis, the browser has become a substantial attack surface and the primary target for many dangerous attacks.
“As companies continue to adopt web-based software as a service and abandon the desktop for the web, the cyber risks that are waiting for employees in the browser are becoming increasingly more prominent and common,” says Buinovskis. “Malicious extensions, various phishing pages, and infostealer malware are some of the main threats lurking in the browser, which is becoming the default channel for work-related tasks in many organizations.”
Buinovskis emphasizes that despite many organizations shifting to a browser-based working environment, it’s still often left unprotected. As a result, more employees and organizations will be exposed to malware, browser-based exploits, and data loss caused by employees unintentionally leaking information from web-based software-as-a-service platforms.
4. Insider threats
A study found that 83% of organizations reported having experienced at least one insider attack in 2024. Moreover, they were identified as the cause for the costliest data breaches in 2024 in an annual report by IBM, with an average cost of $4.99 million per incident.
Buinovskis explains that insider threats are complex, and as companies’ attack surfaces constantly expand due to remote or hybrid work models and the introduction of shadow IT and shadow AI, the threat will continue to escalate.
“With so many factors contributing to the complexity of the current cyber environment, it’s becoming increasingly more difficult to ensure high observability into what users are doing and prevent them from bypassing security policies,” says Buinovskis. “As a result, insider activity can go undetected for a significant amount of time, allowing for more devastating cyber incidents. The current cybersecurity landscape, as well as the constant evolution and sophistication of threats, will ultimately lead to more cybersecurity incidents caused by user error, turning more employees into unintentional insiders.”
Buinovskis emphasizes that to safeguard against the cyber threats looming in 2026, businesses should prioritize building a comprehensive cybersecurity strategy and raising employees’ cybersecurity awareness. He highlights that small businesses — often operating with limited IT budgets and facing more security vulnerabilities — should reassess their cybersecurity policies because they are frequently the primary targets of cybercriminal activity.
2026 Predictions From DH2i
Posted in Commentary with tags DH2i on December 7, 2025 by itnerdToday I have Don Boxley, CEO and Co-Founder of DH2i speaking about his three top 2026 Predictions. They are as follows:
Prediction 1: AI Outages Become the New “Ransomware Moment”
“In 2026, the biggest wake-up call for enterprises will be unexpected AI outages. As more organizations rely on AI systems for customer service, fraud detection, claims processing, supply chain routing, and decision automation, even a few minutes of downtime will create real-world business disruption. We’re moving into an era where AI is fully embedded into workflows, which means the databases, pipelines, and connections behind those AI systems must be architected for continuous availability. The companies that treat AI like a traditional app are going to run into the same wall we saw with ransomware years ago: you don’t realize how fragile the architecture is until it breaks.
What I’m seeing going into 2026 is a shift from ‘How do we deploy AI?’ to ‘How do we keep AI running, resilient, and trustworthy every second?’ The winners will be the companies that build durable foundations – resilient failover, airtight DR strategies, and secure, persistent connections between every environment where the data and compute live. AI will only be as reliable as the infrastructure supporting it. Businesses have to treat availability and security as non-negotiable if they want AI to successfully transform outcomes.”
Prediction 2: Multi-Cloud Fragmentation Becomes a Crisis
“Whether they planned it or not… by 2026, nearly every enterprise will be operating in a patchwork of public cloud, private cloud, containers, and edge environments. When apps need to talk to each other securely, or when data must move quickly and reliably to support analytics and AI, that fragmentation will become a real liability. Teams are already discovering that traditional networking and legacy failover approaches simply don’t work at multi-cloud scale. The complexity isn’t slowing down – so the resiliency architecture and network connectivity has to evolve to match the world we’re deploying into.
What I expect to see in 2026 is a massive shift toward secure, lightweight, point-to-point connectivity models built on zero-trust principles. Companies need a way to ensure constant uptime, fast recovery, and secure movement of data across clouds without wrestling with brittle tunnels or static network overlays. High availability isn’t just about servers anymore – it’s about the entire distributed fabric staying resilient. Businesses will choose solutions that let them seamlessly failover across clouds, maintain jurisdictional control, and securely reach any resource from anywhere. That’s the only way to operate confidently in a multi-cloud world.”
Prediction 3: Disaster Recovery Moves From “Backup Plan” to “Active Architecture”
“For years, disaster recovery has been the fire extinguisher in the hallway – something everyone pays for but hopes they’ll never have to touch. That thinking won’t make it through 2026. Regulators are tightening the screws in finance, healthcare, and government. Cloud regions are going dark without warning. Geopolitical tensions and climate disasters are taking entire data centers offline. The idea that a single cloud or region can keep you safe is becoming a dangerous illusion. Disruption isn’t the exception anymore. It’s the operating environment.
The companies that don’t get caught flat-footed will treat resilience as a living, breathing part of their architecture – not an afterthought. Cross-region and cross-cloud failover will shift from “nice to have” to the only sane way to run a business. And whether critical apps come back online fast enough will depend on secure, low-latency connections that don’t crumble under pressure. In 2026, resilience becomes a board-level concern. The organizations that invest in it now will be the ones still delivering uninterrupted services when everyone else is scrambling to recover.”
1 Comment »