In this webinar, our cyber threat intelligence specialists will unpack the key findings from our latest Cyber Threat Intelligence Report, highlighting what security leaders need to understand now as they refine their priorities for 2026.
Rather than simply reviewing the year’s activity, the session will focus on what the data means in practice: where attackers are adapting, which risks are becoming harder to detect, and how organisations can use threat intelligence to make better decisions.
Webinar Highlights
- How attackers are refining familiar tactics to move faster, evade better and recover quickly from disruption.
- How adversary infrastructure is shifting, with malicious hosting patterns, C2 frameworks and infrastructure rotation revealing where attackers are building, hiding and sustaining operations before compromise becomes visible.
- Why identity-led compromise is becoming central to modern cyber attacks, from stolen credentials and session tokens to OAuth abuse and non-human identities.
- How information stealers continue to fuel ransomware, initial access and wider cyber crime.
- Why ransomware is fragmenting, with data theft increasingly rivaling encryption as the main extortion lever.
- How social engineering is evolving through techniques such as ClickFix, FileFix and ConsentFix.
- Why trusted platforms, cloud services and first-party applications are becoming part of the attack chain.
- How AI is amplifying attacker capability by accelerating reconnaissance, exploit development, social engineering and scale.
- What emerging risks security leaders should watch in 2026, including edge device exploitation, DPRK-linked activity, supply chain compromise and the convergence of cyber crime and state-aligned operations.
Speakers
Joshua Penny
Senior Cyber Threat Intelligence Analyst
Bridewell
Yashraj Solanki
Senior Cyber Threat Intelligence Analyst
Bridewell
Tom Igoe
Senior Cyber Threat Intelligence Analyst
Bridewell