Trends and Challenges in Cybersecurity for 2025-2026
Cybersecurity experts and industry reports highlight evolving threats and persistent challenges as organizations prepare for 2026. Attackers are increasingly exploiting misconfigurations, leveraging AI-driven social engineering, and taking advantage of complex, rapidly changing cloud environments. Despite technological advancements, human error and configuration drift remain leading causes of breaches, with automation and policy enforcement recommended as key mitigations. The financial services sector, while showing improved prevention effectiveness due to regulatory pressure and investment, still faces critical weaknesses at specific attack stages, underscoring the need for continuous validation and adaptive controls.
Industry commentary and newsletters reflect on the rapid pace of change, with significant M&A activity, the growing impact of AI on cybersecurity strategies, and ongoing struggles with vulnerability management and software supply chain security. The sector is urged to address these systemic issues by adopting risk-based approaches, improving transparency, and integrating new frameworks such as the OWASP Agentic AI Top 10. As organizations look ahead, the consensus is that while progress is being made, the threat landscape is becoming more sophisticated, requiring ongoing vigilance and innovation.
Timeline
Dec 17, 2025
Cisco unveils A2A scanner for AI security
Cisco released its A2A scanner as a response to emerging agentic AI security threats, adding new tooling for assessing AI-related risks.
Dec 17, 2025
Zenity launches new agentic AI security tools
Zenity introduced new security tools focused on protecting agentic AI environments, reflecting growing industry efforts to address AI-driven attack surfaces.
Dec 17, 2025
MITRE releases 2025 CWE Top 25
MITRE published its 2025 CWE Top 25 list, providing updated guidance on the most dangerous software weaknesses relevant to defenders and developers.
Dec 17, 2025
OWASP publishes Agentic AI Top 10
OWASP released its Agentic AI Top 10 resource to help organizations understand and prioritize emerging risks associated with AI agents.
Dec 17, 2025
ServiceNow acquires Armis for $7 billion
ServiceNow completed or announced a $7 billion acquisition of Armis, cited as a major 2025 cybersecurity market consolidation event.
Dec 17, 2025
Saviynt raises $700 million in Series B funding
Saviynt secured $700 million in Series B financing, highlighted as a significant 2025 cybersecurity and identity security investment event.
Dec 17, 2025
White House issues executive order on national AI regulation
The U.S. White House released an executive order intended to establish a national AI regulatory framework, marking a major 2025 policy development referenced in the newsletter.
See the full picture in Mallory
Mallory subscribers get deeper analysis on every story, including:
Who’s affected and how
Deep-dive technical analysis
Actionable next steps for your team
IPs, domains, hashes, and more
Ask questions and take action on every story
Filter by topic, classification, timeframe
Get matching stories delivered automatically
Related Entities
Malware
Organizations
Sources
Related Stories

Trends and Challenges in Cybersecurity for 2025-2026
The cybersecurity landscape in 2025 saw significant evolution, with a marked increase in supply chain attacks targeting CI/CD pipelines, open source packages, and developer tooling. Organizations like StepSecurity reported detecting and responding to some of the most consequential supply chain compromises before they became public, highlighting the need for real-time visibility and enforcement across software supply chains. The year also witnessed rapid growth in the adoption of security solutions, as enterprises sought to protect their development environments and open-source repositories from increasingly sophisticated threats. Simultaneously, the industry experienced major shifts in technology and risk management. Startups drove innovation in browser security, application security for AI-generated code, and SOC automation, reflecting the growing importance of cloud-based workspaces and AI-driven applications. On the risk management front, CISOs faced a tightening cyber insurance market, with insurers demanding more rigorous proof of security controls and warning that major supply chain or AI-related incidents could quickly harden underwriting standards. These developments underscore the need for organizations to adapt their security strategies to address both emerging technical threats and evolving risk management requirements.
1 months ago
Evolving Cybersecurity Threats and Organizational Preparedness in 2025
Geopolitical instability, rapid technological advancement, and persistent skills shortages are fundamentally reshaping the cybersecurity landscape for organizations worldwide. According to a PwC report, 60% of executives now rank cyber risk investment among their top three strategic priorities, driven by concerns over political instability, trade disputes, and shifting alliances. Despite this heightened awareness, only about half of surveyed organizations feel very capable of withstanding cyberattacks on common vulnerabilities, and a mere 6% report preparedness across all vulnerabilities, highlighting significant exposure through legacy systems and complex supply chains. The financial impact of breaches remains severe, with over a quarter of respondents experiencing incidents costing at least $1 million in the past three years, disproportionately affecting large enterprises and technology-driven sectors. Spending on cybersecurity is increasing, with 78% of organizations expecting budget growth, yet only 24% are channeling more resources into proactive measures such as monitoring, testing, and training, indicating a continued reactive posture. The ENISA Threat Landscape 2025 report underscores the professionalization of cybercrime, the convergence of criminal and state-aligned actors, and the rise of hacktivist groups leveraging ransomware for both ideological and financial gain. Ransomware remains the most disruptive threat across the EU, with groups adopting decentralized operations, double- and triple-extortion tactics, and exploiting regulatory compliance fears to pressure victims. The proliferation of Ransomware-as-a-Service (RaaS), public leaks of builder tools, and the emergence of access brokers have lowered barriers to entry, fueling a diverse and persistent threat ecosystem. Weak authentication practices persist in many organizations, with passwords and SMS codes still dominant despite their vulnerability to phishing and credential theft. A significant portion of employees have never received cybersecurity training, and outdated policies further exacerbate risk, as personal and professional security habits often overlap, creating additional attack vectors. The adoption of stronger authentication methods, such as device-bound passkeys, remains limited, and resistance to multi-factor authentication is common due to perceived complexity. The use of AI in both attack and defense is accelerating, with AI-generated phishing campaigns and adaptive malware becoming more prevalent, while defenders also leverage AI for predictive threat detection. The overall picture is one of rising threat sophistication, uneven organizational preparedness, and a pressing need for sustained investment in proactive security measures, workforce training, and the adoption of advanced technologies to build resilience against an increasingly complex cyber threat landscape.
Today
Trends and Risks in Enterprise Cybersecurity Approaches for 2026
Organizations are increasingly integrating security into every stage of their operations, moving beyond traditional silos and making cybersecurity a shared responsibility across all business functions. The adoption of DevSecOps practices is accelerating, with security embedded throughout the software development lifecycle to address the growing sophistication of cyberattacks and supply chain threats. Industry reports highlight that embedding security into daily business rhythms and product design leads to better outcomes, while the rise of AI in security operations offers both opportunities for faster detection and risks if foundational practices are weak. At the same time, the attack surface is expanding, with web browsers emerging as a major vector for malware and data exfiltration, particularly through unmanaged browser extensions and the use of generative AI. Reports indicate that browser-based malware now accounts for a significant majority of observed incidents, and privacy-focused extensions have been caught harvesting sensitive user data. These developments underscore the need for continuous risk monitoring, robust vendor management, and a holistic approach to cybersecurity that leverages automation, strong fundamentals, and cross-functional collaboration.
1 months ago