Cyber Threat Landscape Briefing 2026 banner image
Webinar

Cyber Threat Landscape Briefing 2026

2 July 2026 | 10:00 AM
45 mins
In 2026, threat actors are sharpening the tactics that already work. Offensive security tools, information stealers, ransomware affiliates, social engineering and abuse of trusted platforms remain in play, but adversaries are using them with greater speed, adaptability and resilience.

In this webinar, our cyber threat intelligence specialists will unpack the key findings from our latest Cyber Threat Intelligence Report, highlighting what security leaders need to understand now as they refine their priorities for 2026. 

Rather than simply reviewing the year’s activity, the session will focus on what the data means in practice: where attackers are adapting, which risks are becoming harder to detect, and how organisations can use threat intelligence to make better decisions. 

Webinar Highlights

  • How attackers are refining familiar tactics to move faster, evade better and recover quickly from disruption. 
  • How adversary infrastructure is shifting, with malicious hosting patterns, C2 frameworks and infrastructure rotation revealing where attackers are building, hiding and sustaining operations before compromise becomes visible. 
  • Why identity-led compromise is becoming central to modern cyber attacks, from stolen credentials and session tokens to OAuth abuse and non-human identities.
  • How information stealers continue to fuel ransomware, initial access and wider cyber crime.
  • Why ransomware is fragmenting, with data theft increasingly rivaling encryption as the main extortion lever.
  • How social engineering is evolving through techniques such as ClickFix, FileFix and ConsentFix.
  • Why trusted platforms, cloud services and first-party applications are becoming part of the attack chain.
  • How AI is amplifying attacker capability by accelerating reconnaissance, exploit development, social engineering and scale.
  • What emerging risks security leaders should watch in 2026, including edge device exploitation, DPRK-linked activity, supply chain compromise and the convergence of cyber crime and state-aligned operations. 

Speakers

Joshua Penny

Joshua Penny

Senior Cyber Threat Intelligence Analyst

Bridewell

Yashraj Solanki

Yashraj Solanki

Senior Cyber Threat Intelligence Analyst

Bridewell

Tom Igoe

Tom Igoe

Senior Cyber Threat Intelligence Analyst

Bridewell

Explore our Cyber Threat Intelligence Services

Register to Watch