The threats from cyberattacks will become more sophisticated by 2026, featuring techniques such as deepfake emails and targeted ransomware attacks. Companies need to be aware of seven deceptive tactics and learn how platform-based security solutions and AI-driven automation can help proactively defend against these threats.
(Source: AI-generated)
Cyberattacks are no longer a mass phenomenon – they are targeted, automated, and intelligent. While security teams are still sorting dashboards, attackers are already analyzing the next vulnerability. Particularly explosive is the growing role of artificial intelligence. Attackers have been using it for a long time – yet many companies are still hesitant to deploy defensive AI, even though a recent Darktrace study shows that almost 70 percent are already feeling the impact of AI-powered attacks.
At the same time, pressure on resources is increasing: only 19 percent of German companies plan to expand their security teams. Meanwhile, the need for faster decisions, proactive response, and full transparency continues to grow. The answer to these challenges: platform-based security, smart automation, and context-based analysis – in short, security solutions that can keep up.
These seven hacker tactics show what companies need to prepare for in 2026 – and how innovative cyber defense can stop these attacks.
1. Deepfake Emails that Sound Like the CEO
Phishing remains the most popular attack vector – and in 2025 it’s more devious than ever. Deepfake voices in voicemails, deceptively realistic emails from executives, QR code phishing via seemingly legitimate tools like SharePoint or Zoom: the methods are becoming more sophisticated, more targeted, and harder to detect. Darktrace recorded 30.4 million phishing attempts in a single year alone, many of them aimed at executives or administrators.
Traditional email filters are reaching their limits: over 70 percent of attacks bypass mechanisms such as DMARC, and 55 percent even break through advanced protection systems. Detecting such attacks in real time requires AI that understands not just content, but context – for example through self-learning analysis of communication behavior, combined with immediate correlation to account, network, or device activity.
2. Attacks that Sabotage Backups – Before Anything Even Happens
In the past, having backups meant being safe. Today, the mantra of many ransomware groups is: attack the backup first, then there’s no alternative to paying. Cybercriminals deliberately infiltrate cloud backups, network backups, or solutions like Veeam and Amazon S3 – often weeks before the actual attack. The result: data can no longer be restored, even with functioning disaster recovery.
Solutions that only raise local or isolated alerts often detect these multi-stage attacks too late. What’s needed is end-to-end visibility across network, process, and storage infrastructures – and systems that independently detect deviations from normal behavior and prioritize them in context. Only then can early warning signs of lateral movement or backup manipulation be taken seriously – and stopped automatically.
3. Malware-as-a-Service for Everyone
Cyberattacks are no longer the work of highly skilled lone actors – they’re a business model. Malware-as-a-Service (MaaS) now allows even amateurs to rent fully fledged attack campaigns, complete with support, infrastructure, and updates. Particularly popular are remote access trojans (RATs) that quietly embed themselves and exfiltrate data unnoticed for months.
These highly modular attacks constantly change their behavior and use legitimate tools – overwhelming traditional signature- or rule-based defenses. What’s required is cyber defense that analyzes behavior itself, regardless of name or attack vector. With self-learning AI, patterns can be detected that evade classical detection – and risks can be stopped before they escalate.
4. Attacks on Firewalls – 17 Days Before the CVE
Perimeter and edge devices have become a favorite target. Firewalls, VPN gateways, or IoT controllers are exploited deliberately and early – often long before a vendor releases a security update. Darktrace, for example, detected suspicious activity on a firewall 17 days before an official security advisory.
The challenge: many of these devices are well documented but insufficiently monitored – especially when network and endpoint security operate in silos. The solution lies in systems like Darktrace NEXT™, which correlate network data with endpoint telemetry, enabling seamless investigation from packet to process. Only those who understand the link between traffic and the specific process on a device can truly stop threats.
5. Shadow IT and Blind Spots in The Cloud
Cloud and SaaS bring agility – but also security gaps. Shadow IT, undocumented instances, or outdated configurations create dangerous blind spots. In many organizations, there’s no comprehensive overview of digital assets, attack surfaces, or realistic attack paths.
Date: 08.12.2025
Naturally, we always handle your personal data responsibly. Any personal data we receive from you is processed in accordance with applicable data protection legislation. For detailed information please see our privacy policy.
Consent to the use of data for promotional purposes
I hereby consent to Vogel Communications Group GmbH & Co. KG, Max-Planck-Str. 7-9, 97082 Würzburg including any affiliated companies according to §§ 15 et seq. AktG (hereafter: Vogel Communications Group) using my e-mail address to send editorial newsletters. A list of all affiliated companies can be found here
Newsletter content may include all products and services of any companies mentioned above, including for example specialist journals and books, events and fairs as well as event-related products and services, print and digital media offers and services such as additional (editorial) newsletters, raffles, lead campaigns, market research both online and offline, specialist webportals and e-learning offers. In case my personal telephone number has also been collected, it may be used for offers of aforementioned products, for services of the companies mentioned above, and market research purposes.
Additionally, my consent also includes the processing of my email address and telephone number for data matching for marketing purposes with select advertising partners such as LinkedIn, Google, and Meta. For this, Vogel Communications Group may transmit said data in hashed form to the advertising partners who then use said data to determine whether I am also a member of the mentioned advertising partner portals. Vogel Communications Group uses this feature for the purposes of re-targeting (up-selling, cross-selling, and customer loyalty), generating so-called look-alike audiences for acquisition of new customers, and as basis for exclusion for on-going advertising campaigns. Further information can be found in section “data matching for marketing purposes”.
In case I access protected data on Internet portals of Vogel Communications Group including any affiliated companies according to §§ 15 et seq. AktG, I need to provide further data in order to register for the access to such content. In return for this free access to editorial content, my data may be used in accordance with this consent for the purposes stated here. This does not apply to data matching for marketing purposes.
Right of revocation
I understand that I can revoke my consent at will. My revocation does not change the lawfulness of data processing that was conducted based on my consent leading up to my revocation. One option to declare my revocation is to use the contact form found at https://contact.vogel.de. In case I no longer wish to receive certain newsletters, I have subscribed to, I can also click on the unsubscribe link included at the end of a newsletter. Further information regarding my right of revocation and the implementation of it as well as the consequences of my revocation can be found in the data protection declaration, section editorial newsletter.
That’s why Darktrace combines external attack surface analysis with internal exposure intelligence. The platform assesses which systems are truly exploitable – based on live data, vulnerabilities, and linked assets. This way, security teams don’t just see that a system is vulnerable – they see how realistic an attack actually is. The result: focus on what matters instead of patching blindly.
6. Security Teams Stuck in Tool Overload
SOC teams often work with half a dozen tools – each with its own logic, UI, and alerts. The result: context is lost, processes take forever, and errors creep in. Meanwhile, the attack continues. Especially in large organizations, this tool fragmentation costs time, resources, and nerves.
This is where the integrated platform approach comes in: with agentic AI that not only analyzes, but also independently draws conclusions. Darktrace’s example: the Cyber AI Analyst correlates data from email, network, SaaS, identity, and endpoints – and automatically creates coherent incident reports. Instead of drowning in individual alerts, analysts immediately see the full picture – and act in seconds, not hours.
7. AI Attackers Are Here – and Defenders Are Still Asleep
The threat posed by AI-based attacks is not hypothetical – it’s already reality. Seventy percent of German companies are already feeling the effects. Yet almost half feel insufficiently prepared. Often, there’s a lack of know-how, resources, or the courage to transform. At the same time, pressure is growing to become more efficient – with fewer staff but more responsibility.
Meanwhile, 86 percent of German security professionals see platform-based security solutions as more effective than a collection of individual tools. Because AI can not only detect threats, but also respond to them automatically – faster, more consistently, and more scalably than manual teams.
Conclusion: If You Want to Defend Today, You Need to Think Ahead Tomorrow
The reality is clear: attackers rely on automation, intelligence, and precision. Defenders must follow suit – with connected platforms that don’t just collect data, but understand it. Those still operating with isolated solutions risk drowning in an ocean of information.