Want to appear here? Talk with us

Agentic Risk
2026: The Year Agentic AI Becomes the Attack-Surface Poster Child

Many experts believe that 2026 is the year when smart computer agents will become the main target for bad actors.

Nearly half of the people who work in security think these autonomous tools will be the top way for hackers to break into companies.

While these agents help teams work much faster, they also create many new ways for things to go wrong.

The biggest worry is that these tools often have high levels of access but very few safety rules to stop them from being tricked.

Machines Talking to Machines

The way these tools work makes them very hard to watch because they can talk to other apps without a person in the middle.

A big risk is when developers rush to use new code that has not been checked for safety.

If just one small link in the chain is weak, an attacker can use it to reach the heart of a whole network.

Because these agents can make their own choices, they might accidentally share private data or follow bad instructions from a clever prompt.

New Threats Beyond Simple Data Theft

Hackers are now using these same smart tools to build much better fakes that look and sound just like real people.

Almost a third of security leaders think these deepfakes will be the main way to target top bosses and government leaders.

Traditional defenses are not enough to stop these new attacks because the machines move much faster than any human can react.

Companies must now focus on giving these bots only the exact access they need to do their job and nothing more.

This shift means that every company using smart tech needs a new plan to keep their digital world safe.

Securing the future means moving away from watching people and starting to watch the autonomous agents that are now doing the work for us.

Identity Hazard
Always-on privileged access is pervasive - and fraught with risks

Nearly nine out of ten workers log in with the highest level of computer power and stay that way all day.

This common habit is very dangerous because it leaves the "keys to the kingdom" wide open for hackers to steal.

Experts say this happens because our computer systems have become too messy and hard to manage over many years.

When someone has this much power all the time, even a simple typing mistake could delete an entire company's data.

Why We Keep the Power On

Many companies keep these high-power accounts active because they are afraid that turning them off will break their work.

As companies merge or move to the cloud, they often leave behind old accounts that nobody remembers but still have full access.

It is much easier to leave everything "on" than to go back and fix the complicated rules from the past.

This creates a huge "shadow" area where nobody knows exactly who has the power to change or delete important files.

The Shift To Just In Time Help

The old way of giving everyone permanent power is starting to change because the risks are getting too high.

Security leaders are now pushing for a model where you only get high-power access for the exact minutes you need it.

Once your task is done, the special power is taken away automatically so it cannot be used by a bad actor later.

This new way of working helps stop hackers from moving through a network even if they steal one person's password.

The goal for the future is to have no permanent high-power accounts at all, which makes the whole company much safer.

Moving away from always-on access is the only way to stay safe in a world where computer attacks are moving faster every day.

📺️ Podcast
Scaling a Modern SOC with Real AI Agents

Modern security teams are seeing a massive shift in how they use smart computer tools to catch hackers.

The main idea is that simple "chat" tools are being replaced by smart agents that can actually do tasks on their own.

While these agents help humans work faster, they also create a much larger area for bad actors to attack.

The conversation highlights that the biggest risk in 2026 will be how these autonomous bots manage their power and access.

From Chatting to Doing

The shift from basic AI to agentic AI means computers can now "think" and then "act" without a human clicking a button.

This helps security teams handle thousands of alerts that would normally take a person days to finish.

However, if these agents are not watched closely, they can be tricked into giving away company secrets.

Leaders are now focusing on building "guardrails" to make sure these bots only do what they are told.

The Human Side Of AI

Even with the best tech, humans are still the most important part of the security team.

The podcast explains that AI should be used to take away the "boring" work so people can focus on the hard problems.

A big part of the job now is teaching teams how to trust the machines while still checking their work for mistakes.

There is also a growing need for people from different backgrounds to help catch bias in the smart systems.

Building a diverse team is just as important as building a fast computer when it comes to stopping smart threats.

The future of security is not just about faster machines, but about how well humans and smart agents can work together as one team.

Souring Threats
Health-ISAC reports 55% surge in cyber incidents in 2025, as attacks rise and escalation looms in 2026

Hospitals and health groups faced a massive spike in digital attacks last year as bad actors targeted patient data.

A new report shows that the number of security incidents jumped by fifty-five percent in just one year.

This rise is driven by hackers who want to lock up systems and demand money or steal private medical records.

Many of these attacks start through third-party partners who have weak links in their own computer safety.

Trends In Health Attacks

The data shows that bad actors are getting much faster at breaking into systems once they find a gap.

Ransomware remains the top threat because it can stop a hospital from helping sick people in real time.

Hackers are also using smart tools to create fake emails that look very real to busy medical staff.

This makes it much easier for them to steal passwords and move through a network without being noticed.

Preparing For Next Year

Security leaders expect the number of attacks to grow even more as we move through 2026.

New rules are being written to make sure every health company has a solid plan to bounce back after a hit.

Sharing info about threats between different hospitals is now a key part of staying safe.

The report suggests that spending more on basic safety steps can stop most of these problems before they start.

Teams must focus on finding their weak spots before the hackers do to keep patient care running smoothly.

Staying ahead of these growing threats is the only way to protect our medical systems and the people who depend on them.

Data Leakage
8.7 billion records spilled: Inside the massive Chinese data leak

A massive pile of data has been found sitting open on the internet for anyone to see.

Security researchers found nearly nine billion records from China that were left without any password.

The data comes from many different sources like social media and shopping sites.

This leak is a big deal because it contains private info that can be used to trick people or steal their money.

What Was in the Leak

The records show names, phone numbers, and home addresses for millions of people.

There were also bits of chat messages and info about what people like to buy online.

Because the data was not locked, bad actors could have taken it at any time.

Researchers say this is one of the largest single leaks they have ever seen in one place.

The Risk of Big Databases

Keeping so much data in one spot creates a huge target for hackers.

Even if a company is very big, a single mistake can leave all that data open to the world.

This leak shows that many companies are still not doing enough to keep their servers safe and private.

When this much data gets out, it makes it much easier for criminals to send fake emails that look real.

People in other countries should also worry because this data can be used to plan bigger attacks.

Protecting our data is more important than ever now that billions of records can be lost with a single wrong click.

Shadow AI
The silent security gap in enterprise AI adoption

Many companies are rushing to use smart computer tools but are leaving a back door open for hackers.

While teams use these tools to work faster, they often forget to check where the secret company data goes.

This creates a hidden safety hole because the tools can save and learn from the private info people type into them.

If a worker puts a secret plan into a public tool, that plan could show up in an answer for someone else later.

Data Leaks in Plain Sight

The biggest problem is that most of these smart tools are not built to keep secrets by default.

One out of four workers has already shared sensitive company info with these bots without thinking.

Security teams often do not even know which tools their workers are using every day.

This makes it very easy for hackers to find and steal trade secrets by just asking the right questions.

Taking Control of the Tech

Companies need to set clear rules about what can and cannot be shared with these bots.

New software is being made to catch and hide secret data before it leaves the company network.

Training workers is also a huge part of staying safe in this new world.

It is better to use a private version of these tools that keeps all the data inside the company walls.

By being careful now, businesses can use the best tech without losing their most important secrets.

Fixing the quiet gaps in how we use smart tools today will prevent massive data losses tomorrow.

Stay safe!

Eyal Estrin, Author @ CSec Weekly