The security landscape in 2026

Adversary trends and defender strategies derived from real-world telemetry
The security landscape is undergoing a rapid transformation.

Adversaries’ AI-driven threat innovation is evolving at an accelerated pace via streamlined information synthesis and automated workflows. This is resulting in more diverse adversary capabilities and new, indirect avenues of access. AI’s role on both sides of the cyber battle is anticipated to shift significantly as these technologies become more widespread.

The Elastic Global Threat Report uncovers real-world threat activities, revealing a fundamental shift in how adversaries achieve success today. It also includes a new section describing our visibility from non-telemetry sources, highlighting which malware families and threat behaviors were seen externally.

Access brokers are increasingly using information stealers to maintain a distance from collective defense efforts, significantly escalating the risks of credential exposure through cloud storage and other services. Trojanised software, which represented about 61% of all malware samples observed, was a major contributor; the ClickFix methodology is one of the most common techniques used to deliver trojans and infostealers. More than 24% of malware samples on Windows represented named infostealer code families.

The Elastic Global Threat Report

This report from Elastic in late 2025 covers the following key trends in depth:

  • Adversary priorities on Windows are changing
  • The cloud attack surface is highly concentrated
  • Adversaries are weaponising AI to lower the barrier to entry for cybercrime
  • The theft of browser credentials has industrialised

The Elastic Global Threat Report
More in Cyber Security
CyberSync 2026 | 2-3 June
CyberSync 2026 | 2-3 June

In-person networking and hospitality events for cybersecurity professionals and technology providers.


CyberSync Sponsor Spotlight: Alice
CyberSync Sponsor Spotlight: Alice

Security, Safety, and Trust for the AI Era.


CyberSync Sponsor Spotlight: HPE
CyberSync Sponsor Spotlight: HPE

Delivering Exceptional Experiences with a Differentiated Portfolio.


CyberSync Sponsor Spotlight: Cytix
CyberSync Sponsor Spotlight: Cytix

AppSec for agentic development.


CyberSync Sponsor Spotlight: NormCyber
CyberSync Sponsor Spotlight: NormCyber

Cyber resilience that keeps your business in business.


CyberSync Sponsor Spotlight: Wallarm
CyberSync Sponsor Spotlight: Wallarm

Your AI Isn’t Waiting.


CyberSync Sponsor Spotlight: TENEX
CyberSync Sponsor Spotlight: TENEX

AI-Native. Human-Led. United Against Every Threat.


CyberSync Sponsor Spotlight: Doppel
CyberSync Sponsor Spotlight: Doppel

The AI-Native Social Engineering Defense Platform.


CyberSync Sponsor Spotlight: Rossnet
CyberSync Sponsor Spotlight: Rossnet

Executive Assurance for Organisational Intelligence and Resilience.


CyberSync Sponsor Spotlight: Elastic Cloud on AWS
CyberSync Sponsor Spotlight: Elastic Cloud on AWS

The answer to your biggest data challenges.


Culture change
Culture change

Is there a clear line between manipulation and influence, and should security leaders care?


Share this story

We're a community where IT security buyers can engage on their own terms.

We help you to better understand the security challenges associated with digital business and how to address them, so your company remains safe and secure.

Interested in what you see? Get in touch, and let's start a conversation Get in touch