This video is a decorative animation with no sound.
This chart is based on data from Barracuda AI.
Barracuda Research delivers actionable insights from trillions of IT events, AI-powered threat detection and real-world security incidents. Our advanced threat intelligence empowers IT security professionals with the knowledge to identify emerging threats, recognize the warning signs and implement effective protection strategies for their businesses.
Attackers are using the Whisper 2FA phishing-as-a-service (PhaaS) platform to steal login credentials multiple times through a real-time exfiltration loop.
See the details and the action to take to protect against the attacks:
Attackers are leveraging recent enhancements, including different types of CAPTCHA tests, more realistic URLs, compressed code, and more.
See the details and the action to take to protect against the attacks:
Attackers are using an uncommon obfuscation technique: creating random invisible characters in the source code to help evade anti-phishing scanners and obstruct signature-based YARA rules.
See the details and the action to take to protect against the attacks:
Attackers are using steganography in phishing campaigns to launch malicious JavaScript files that have been heavily disguised to make it hard for security systems to recognize them.
Attackers are trying to connect endpoints to unpatched ScreenConnect deployments – or installing ScreenConnect themselves – for unauthorized access to and control of victim systems.
See the details and the action to take to protect against the attacks:
Cybercriminals are stealing or buying usernames and passwords (credentials) and using them to break into systems. Once inside, they launch ransomware attacks or steal sensitive data.
See the details and the action to take to protect against the attacks:
See the details and the action to take to protect against the attacks:
Barracuda Managed XDR and the SOC team recently mitigated a ransomware attack that tried to evade detection by exploiting tools in the target’s infrastructure and disguising the malicious activity as everyday IT.
Barracuda Managed XDR and the SOC team recently helped two companies mitigate incidents where attackers compromised computers and installed ScreenConnect remote management software.
At one company, there were signs of data exfiltration linked to a convoluted series of malicious downloads. At the other company, there was evidence of malicious scripts and persistence techniques.
Ransomware attackers often use scheduled tasks to automate different stages of the attack, maximizing the impact of the attack while reducing the chances of detection. Attackers create scheduled tasks for several reasons, including:
The Office of the CTO comprises Barracuda’s leading threat researchers and technical experts who can provide authoritative insight on a wide variety of cybersecurity topics.
These include:
Connect with Barracuda’s Office of the CTO
“An agentic AI operator will run cyberattacks end-to-end, gathering what it needs, crafting convincing lures, trying a path, watching how the target’s protection or defense reacts, then quietly shifting tactics and timing until it gets what it wants.”
Yaz Bekkar
Principal Consulting Architect – XDR, EMEA
Frontline security predictions 2026: The battle for reality and control in a world of agentic AI
“In 2026, attackers will shift from static tactics to dynamic, context-aware approaches with payloads that are tailored based on device, user activity or timing to evade automated detection.”
Ashok Sakthivel
Director – Engineering, Email Protection
Frontline security predictions 2026: The phishing techniques to prepare for
Barracuda provides a wide range of cyberthreat and cybersecurity insights, tools and support to help organizations and security researchers better understand the rapidly evolving threat landscape and how to manage risk.
Talk to an expert about BarracudaONE and Managed XDR
Company Information
Our Websites