Skip to main content
Mallory

Trends and Challenges in Cybersecurity for 2025-2026

cloud-misconfigurationai-enabled-threat-activityfinancial-sector-threatai-platform-securitystandards-framework-update
Updated March 21, 2026 at 03:05 PM3 sources
Share:
Trends and Challenges in Cybersecurity for 2025-2026

Get Ahead of Threats Like This

Know if you're exposed. Before adversaries strike.

Cybersecurity experts and industry reports highlight evolving threats and persistent challenges as organizations prepare for 2026. Attackers are increasingly exploiting misconfigurations, leveraging AI-driven social engineering, and taking advantage of complex, rapidly changing cloud environments. Despite technological advancements, human error and configuration drift remain leading causes of breaches, with automation and policy enforcement recommended as key mitigations. The financial services sector, while showing improved prevention effectiveness due to regulatory pressure and investment, still faces critical weaknesses at specific attack stages, underscoring the need for continuous validation and adaptive controls.

Industry commentary and newsletters reflect on the rapid pace of change, with significant M&A activity, the growing impact of AI on cybersecurity strategies, and ongoing struggles with vulnerability management and software supply chain security. The sector is urged to address these systemic issues by adopting risk-based approaches, improving transparency, and integrating new frameworks such as the OWASP Agentic AI Top 10. As organizations look ahead, the consensus is that while progress is being made, the threat landscape is becoming more sophisticated, requiring ongoing vigilance and innovation.

Timeline

  1. Dec 17, 2025

    Cisco unveils A2A scanner for AI security

    Cisco released its A2A scanner as a response to emerging agentic AI security threats, adding new tooling for assessing AI-related risks.

  2. Dec 17, 2025

    Zenity launches new agentic AI security tools

    Zenity introduced new security tools focused on protecting agentic AI environments, reflecting growing industry efforts to address AI-driven attack surfaces.

  3. Dec 17, 2025

    MITRE releases 2025 CWE Top 25

    MITRE published its 2025 CWE Top 25 list, providing updated guidance on the most dangerous software weaknesses relevant to defenders and developers.

  4. Dec 17, 2025

    OWASP publishes Agentic AI Top 10

    OWASP released its Agentic AI Top 10 resource to help organizations understand and prioritize emerging risks associated with AI agents.

  5. Dec 17, 2025

    ServiceNow acquires Armis for $7 billion

    ServiceNow completed or announced a $7 billion acquisition of Armis, cited as a major 2025 cybersecurity market consolidation event.

  6. Dec 17, 2025

    Saviynt raises $700 million in Series B funding

    Saviynt secured $700 million in Series B financing, highlighted as a significant 2025 cybersecurity and identity security investment event.

  7. Dec 17, 2025

    White House issues executive order on national AI regulation

    The U.S. White House released an executive order intended to establish a national AI regulatory framework, marking a major 2025 policy development referenced in the newsletter.

See the full picture in Mallory

Mallory subscribers get deeper analysis on every story, including:

Impact Assessment

Who’s affected and how

Technical Details

Deep-dive technical analysis

Response Recommendations

Actionable next steps for your team

Indicators of Compromise

IPs, domains, hashes, and more

AI Threads

Ask questions and take action on every story

Advanced Filters

Filter by topic, classification, timeframe

Scheduled Alerts

Get matching stories delivered automatically

Sources

December 17, 2025 at 10:00 PM
resilient cyber blog
Resilient Cyber Newsletter #76
December 17, 2025 at 12:00 AM

Related Stories

Trends and Challenges in Cybersecurity for 2025-2026

Trends and Challenges in Cybersecurity for 2025-2026

The cybersecurity landscape in 2025 saw significant evolution, with a marked increase in supply chain attacks targeting CI/CD pipelines, open source packages, and developer tooling. Organizations like StepSecurity reported detecting and responding to some of the most consequential supply chain compromises before they became public, highlighting the need for real-time visibility and enforcement across software supply chains. The year also witnessed rapid growth in the adoption of security solutions, as enterprises sought to protect their development environments and open-source repositories from increasingly sophisticated threats. Simultaneously, the industry experienced major shifts in technology and risk management. Startups drove innovation in browser security, application security for AI-generated code, and SOC automation, reflecting the growing importance of cloud-based workspaces and AI-driven applications. On the risk management front, CISOs faced a tightening cyber insurance market, with insurers demanding more rigorous proof of security controls and warning that major supply chain or AI-related incidents could quickly harden underwriting standards. These developments underscore the need for organizations to adapt their security strategies to address both emerging technical threats and evolving risk management requirements.

1 months ago
Evolving Cybersecurity Threats and Organizational Preparedness in 2025

Evolving Cybersecurity Threats and Organizational Preparedness in 2025

Geopolitical instability, rapid technological advancement, and persistent skills shortages are fundamentally reshaping the cybersecurity landscape for organizations worldwide. According to a PwC report, 60% of executives now rank cyber risk investment among their top three strategic priorities, driven by concerns over political instability, trade disputes, and shifting alliances. Despite this heightened awareness, only about half of surveyed organizations feel very capable of withstanding cyberattacks on common vulnerabilities, and a mere 6% report preparedness across all vulnerabilities, highlighting significant exposure through legacy systems and complex supply chains. The financial impact of breaches remains severe, with over a quarter of respondents experiencing incidents costing at least $1 million in the past three years, disproportionately affecting large enterprises and technology-driven sectors. Spending on cybersecurity is increasing, with 78% of organizations expecting budget growth, yet only 24% are channeling more resources into proactive measures such as monitoring, testing, and training, indicating a continued reactive posture. The ENISA Threat Landscape 2025 report underscores the professionalization of cybercrime, the convergence of criminal and state-aligned actors, and the rise of hacktivist groups leveraging ransomware for both ideological and financial gain. Ransomware remains the most disruptive threat across the EU, with groups adopting decentralized operations, double- and triple-extortion tactics, and exploiting regulatory compliance fears to pressure victims. The proliferation of Ransomware-as-a-Service (RaaS), public leaks of builder tools, and the emergence of access brokers have lowered barriers to entry, fueling a diverse and persistent threat ecosystem. Weak authentication practices persist in many organizations, with passwords and SMS codes still dominant despite their vulnerability to phishing and credential theft. A significant portion of employees have never received cybersecurity training, and outdated policies further exacerbate risk, as personal and professional security habits often overlap, creating additional attack vectors. The adoption of stronger authentication methods, such as device-bound passkeys, remains limited, and resistance to multi-factor authentication is common due to perceived complexity. The use of AI in both attack and defense is accelerating, with AI-generated phishing campaigns and adaptive malware becoming more prevalent, while defenders also leverage AI for predictive threat detection. The overall picture is one of rising threat sophistication, uneven organizational preparedness, and a pressing need for sustained investment in proactive security measures, workforce training, and the adoption of advanced technologies to build resilience against an increasingly complex cyber threat landscape.

Today
Trends and Risks in Enterprise Cybersecurity Approaches for 2026

Trends and Risks in Enterprise Cybersecurity Approaches for 2026

Organizations are increasingly integrating security into every stage of their operations, moving beyond traditional silos and making cybersecurity a shared responsibility across all business functions. The adoption of DevSecOps practices is accelerating, with security embedded throughout the software development lifecycle to address the growing sophistication of cyberattacks and supply chain threats. Industry reports highlight that embedding security into daily business rhythms and product design leads to better outcomes, while the rise of AI in security operations offers both opportunities for faster detection and risks if foundational practices are weak. At the same time, the attack surface is expanding, with web browsers emerging as a major vector for malware and data exfiltration, particularly through unmanaged browser extensions and the use of generative AI. Reports indicate that browser-based malware now accounts for a significant majority of observed incidents, and privacy-focused extensions have been caught harvesting sensitive user data. These developments underscore the need for continuous risk monitoring, robust vendor management, and a holistic approach to cybersecurity that leverages automation, strong fundamentals, and cross-functional collaboration.

1 months ago

Get Ahead of Threats Like This

Mallory continuously monitors global threat intelligence and correlates it with your attack surface. Know if you're exposed. Before adversaries strike.

Trends and Challenges in Cybersecurity for 2025-2026 | Mallory