Bota Posted on 2026-01-12 09:30:00

From AI breaches to geopolitical threats - Here's what to expect from cybersecurity in 2026

From Dorian Koça

From AI breaches to geopolitical threats - Here's what to expect from

In 2025, Europe faced a wave of cyberattacks: from airport disruptions and allegations of election sabotage to GPS spoofing on the flight of European Commission President Ursula von der Leyen and attacks on satellites in space.

These cyberattacks also had major financial impacts, costing countries like France, Germany, Italy, and Spain a total of 300 billion euros in the last five years.

The need to address cybersecurity is more urgent than ever, and it is expected to be a major priority for governments. 2026 will be the year in which operations by actors such as Russia, China, Iran and North Korea will expand, the global market research company wrote in its cybersecurity forecast report.

The company said political instability and new technology will force cybersecurity and risk leaders to adapt this year.

One area that Google sees as particularly vulnerable to Chinese attacks is the semiconductor sector, due to competition from rivals such as Taiwan's TSMC and US export restrictions.

Russia's cyber operations are expected to continue in Ukraine, but will also "prioritize long-term global strategic goals," Google's report added, such as increasing information operations against the United States and other Western countries.

Artificial intelligence (AI) will reshape both the way attacks are carried out and the way they are defended against by 2026, according to Google and US cybersecurity firm Fortinet, which publishes an annual Global Threat Landscape Report.

Both companies singled out artificial intelligence agents, which are designed to take autonomous actions to help people and don't require a human to tell them what to do, as a new challenge for security teams.

Google also predicts that artificial intelligence will be used for new attack techniques, such as rapid injection, which manipulates artificial intelligence systems to bypass their built-in security protocols and follow hidden commands.

Live TV

Latest news
All news

Most visited