Tech
What lies in store for the security world in 2026? | Computer Weekly
If 2024 and 2025 were the years organisations felt the strain of tightening budgets, 2026 is the year those decisions will fully manifest in their cyber risk exposure. Across both the private and public sectors, years of belt-tightening have led to reduced headcount, ageing infrastructure and postponed modernisation. Analyst reports show growth in cyber security spending has slowed markedly and many security teams are operating with fewer specialists than they had three years ago. The cumulative effect of this means fewer defenders, slower detection and weakening resilience at a time when adversaries are escalating in both ambition and sophistication.
The past year has provided irrefutable proof of how these gaps translate directly into risk. A major supply-chain compromise of Oracle Cloud reportedly exposed millions of records and impacted more than 140,000 tenants. The Salesloft/Drift breach illustrated how attackers can exploit interconnected SaaS ecosystems to cascade access across multiple organisations. Meanwhile, Jaguar Land Rover’s cyber incident halted vehicle production and disrupted supply chains for weeks, demonstrating how even relatively mature, well-funded industries can be brought to a standstill by a single compromise. These incidents reveal a systemic weakening of defensive capacity and third-party oversight.
This is the backdrop against which 2026 begins, and the legacy of recent budget cuts will continue to degrade the defensive posture of many organisations. With smaller teams and constrained resources, adversaries will enjoy longer dwell times, greater freedom to move laterally and more opportunities to exploit unpatched systems. Supply-chain compromise and zero-day exploitation will remain primary attack vectors, especially in environments where patch cycles have slowed or asset inventories are incomplete. Compounding this is the fact that several national cyber bodies have themselves faced funding and workforce reductions, limiting their ability to coordinate incident response at scale. In short, the high-impact attacks of 2025 should not be viewed as peaks, unfortunately, but as early indicators of a worsening trend.
However, budget pressure is not the only factor reshaping the threat landscape. A parallel shift is emerging that is driven by a rise in what might be termed casual cyber aggression, outside the more predictable threats such as nation states or organised crime threat actors. Across the UK, several high-profile incidents in 2025 have been traced back to loosely affiliated individuals, often teenagers, wielding commodity hacking tools, rented botnets and downloadable exploit kits. These attackers are not motivated by complex financial schemes or geopolitical goals, instead drawn by curiosity, frustration, social validation or the mere thrill of notoriety.
This behaviour is being fuelled by two converging forces. First, the accessibility of attack tooling has increased dramatically. Automated scripts, ransomware-as-a-service platforms and AI-driven reconnaissance tools require minimal technical expertise, lowering the barrier to entry. Second, the volume of open source intelligence, from corporate data leaks to overshared social media profiles, has exploded. Executives, public figures and organisations leave digital footprints that can be assembled into highly persuasive social engineering campaigns. For would-be attackers, the pathway from idea to impact has never been shorter.
What appears to be eroding at the same time – maybe due to the frequency of attacks or complacency – is the perceived risk of consequence. Arrests and prosecutions for cyber offences remain rare relative to the scale of attacks; and within online communities where many of these individuals operate, reputation and bravado often outweigh caution. Combined with social disaffection and worsening economic pressures, hacking is becoming, for some, a form of digital expression by offering an accessible outlet with very real-world repercussions and very little perceived consequence.
In 2026 that will translate into an expectation of more erratic and attention-grabbing attacks by small groups or individuals using widely-available tools. While these incidents may lack technical sophistication, their public visibility and collateral impact, particularly when they target public services, transportation networks or major consumer brands, will make them strategically significant. They also risk eroding public trust in digital services at a moment when that trust is already fragile.
Of course, it wouldn’t be a look ahead without the mention of the rapid evolution of artificial intelligence in cyber security on top of everything. Back in 2020, predictions that AI would reshape defensive strategies seemed optimistic; today, they look understated. By 2025, an IBM report revealed more than two-thirds of organisations reported using AI in their cyber security programmes and nearly a third rely on it extensively. AI now underpins anomaly detection, automated response, threat-hunting and vulnerability management. But cyber criminals have adopted it just as aggressively. Research suggests that the majority of email-based attacks now incorporate AI, and AI-assisted ransomware campaigns are becoming the norm.
Generative AI has made it far easier to craft targeted phishing emails, credible social-engineering scripts and realistic deepfake impersonations. For high-value targets such as CEOs, the oversharing of personal and professional information online materially increases risk. And the growing maturity of agentic AI, those autonomous systems capable of multi-step tasks, introduces both powerful defensive opportunities and new avenues for attack.
Taking all of this into account, three trends stand out.
First, the knock-on effects of underinvestment will continue; i.e. fewer breaches overall, but those that do occur will be larger, more complex and more damaging due to longer dwell times and interconnected supply chains.
Second, casual cyber aggression will become more visible, testing societal resilience and challenging policymakers to rethink digital accountability.
Third, the AI arms race will accelerate on both sides, with defenders and attackers deploying increasingly autonomous systems, driving the next stage of the cat-and-mouse dynamic.
It’s fair to say that 2026 will not necessarily be the most catastrophic year in cybersecurity but it could be one of the most telling. The choices organisations make now, in restoring investment, rebuilding cyber skills and governing AI responsibly, will determine whether the curve bends towards resilience or further fragility.
Anthony Young is CEO at Bridewell, a managed security services provider working in the UK and US.
Tech
Here’s Every Country Directly Impacted by the War on Iran
On February 28, United States and Israeli forces launched a series of strikes on Iran, kicking off turmoil in the Middle East.
Pete Hegseth, the secretary of the Department of Defense, said in a recent press conference that the operation could last as long as eight weeks. President Donald Trump himself said in a press conference on March 2 that the administration projected the operation would last four or five weeks but had “the capability to go far longer than that.”
This week Iran has responded in turn, attacking Israel, regional US embassies and military bases, and other sites across the Middle East. Iran has peppered neighboring countries with hundreds of drone and ballistic missile strikes since the operation began. While many of these have been intercepted, over a thousand people have died in the region and multiple buildings have been damaged, including luxury hotels in Dubai, US military bases and embassies, and international airports and marine ports.
Israel has also started bombarding Lebanon, following strikes at the country by the Lebanese militant group Hezbollah.
The Trump administration has given various, and at times seemingly contradictory, justifications for the military action, citing everything from potential “nuclear threat” to unverified claims that Iran attempted to interfere in the 2020 and 2024 US presidential elections. As of March 5, Congress, which in the US has the sole power to declare war, has not done so.
The attacks have already disrupted supply chains, creating uncertainty for the oil and gas and fertilizer industries as key infrastructure has been targeted or shut down out of caution. Shipping traffic has halted along the Strait of Hormuz, a critical route.
As the conflict continues to escalate and expand, WIRED is tracking which countries have been affected and how. This article was last updated on March 5.
Iran
As of March 4, Iranian state media estimates that over 1,000 people have died in the country since the US-Israeli attacks began. Several schools and hospitals have been hit, according to Al Jazeera. The Israeli Air Force says it has struck Iran with over 5,000 munitions since the beginning of the operation.
Israel
Israel has faced retaliatory strikes from Iran. As of March 4, at least 11 people have died and over 40 buildings have been damaged in Tel Aviv, according to Al Jazeera.
Azerbaijan
On March 5, Azerbaijan said drone attacks launched from Iran had crossed over the country’s borders and damaged an airport building and two civilians. President Ilham Aliyev of Azerbaijan said that the country’s military forces “have been instructed to prepare and implement appropriate retaliatory measures,” according to Reuters. Iran has denied responsibility for the attacks, according to Al Jazeera.
Bahrain
Missile and drone strikes have targeted different locations in Bahrain, including a US naval base, according to the BBC. On March 2, Amazon reported that a drone strike occurred in close proximity to one of its data centers in the country. CNBC later reported that Iranian state media said that Iran had targeted the data center because of the company’s support of the US military.
Cyprus
On March 2, a drone strike hit a British air base in Cyprus, according to Reuters. It caused limited damage and no casualties. Greece, the UK, and France have lent defensive support to the country, according to a Bloomberg report.
Iraq
Since February 28, there have been reports of multiple Iranian strikes aimed at a US military base near the Erbil International Airport, according to the nonprofit monitoring group Armed Conflict Location and Event Data.
Jordan
Jordan’s armed forces have intercepted dozens of missiles since the start of the conflict. At least one Iranian-backed militant group in Iraq has claimed responsibility, according to the Associated Press. On March 2, the US Embassy in the country announced that all its personnel had temporarily departed.
Kuwait
Kuwait has endured multiple waves of Iranian missile and drone attacks since February 28. On March 2, US Central Command said in a statement that three US fighter jets were accidentally struck down by Kuwaiti air defenses during an attack that included Iranian aircraft, missiles, and drones.
Lebanon
Israel attacked southern Lebanon after the militant Lebanese group Hezbollah launched rocket and drone attacks against them. Lebanon prime minister Nawaf Salam subsequently banned Hezbollah’s military and security activities, according to Al Jazeera.
Oman
Oman’s Duqm commercial port has been hit by several drone attacks, according to Al Jazeera. Omani authorities have said at least one oil tanker off the country’s port of Khasab in the Strait of Hormuz has been attacked.
Qatar
On March 2, QatarEnergy posted on X saying that it would halt production of liquified natural gas following a military attack on its operational facilities in the country. It did not attribute the attack to any particular country. On March 3, it posted again, saying that it would also stop the production of additional products, including urea, polymers, methanol, and aluminum.
Saudi Arabia
Infrastructure in Saudi Arabia has been targeted with projectiles. On March 3, the US embassy in Riyadh, the country’s capital, was damaged following an attack. On March 4, Reuters reported that one of the Saudi Aramco’s largest domestic refineries of Saudi Aramco, the majority state-owned oil company, was targeted by an attempted drone attack.
Syria
Tom Fletcher, the United Nations undersecretary-general for humanitarian affairs and emergency relief, says that civilians and civilian infrastructure were under attack in several countries including Syria.
Turkey
On March 4, the Turkish Ministry of National Defence announced that NATO had intercepted ballistic munitions launched from Iran, and that munition fragments had fallen into Hatay, a province that borders the Mediterranean Sea and Syria. Iran has denied any missile launch towards the country.
United Arab Emirates
As of March 4, UAE Ministry of Defence officials say that the country has intercepted hundreds of drone and missile attacks from Iran. Despite the relatively high rate of interceptions, debris created by the fallout has still damaged areas of the country. In Dubai, the luxury hotel Burj Al Arab was struck by debris, as well as the Palm Jumeirah, a man-made island home to high-end hotels and apartments. On March 2, Amazon Web Services announced that two of its facilities were directly struck in the country, causing “elevated error rates and degraded availability.”
Countries Evacuating Citizens
On March 2, US assistant secretary of state for consular affairs Mora Namdar posted on X urging Americans to depart from several middle eastern countries due to “serious safety risks.” On March 4, Reuters reported that the US military has offered seats on military transport planes to Americans trying to leave the region.
Over a dozen countries have announced that they will be evacuating their citizens from the area or sponsoring repatriation flights, including the UK, Ireland, Germany and Italy.
Tech
OpenAI Had Banned Military Use. The Pentagon Tested Its Models Through Microsoft Anyway
OpenAI CEO Sam Altman is still in the hot seat this week after his company signed a deal with the US military. OpenAI employees have criticized the move, which came after Anthropic’s roughly $200 million contract with the Pentagon imploded, and asked Altman to release more information about the agreement. Altman admitted it looked “sloppy” in a social media post.
While this incident has become a major news story, it may just be the latest and most public example of OpenAI creating vague policies around how the US military can access its AI.
In 2023, OpenAI’s usage policy explicitly banned the military from accessing its AI models. But some OpenAI employees discovered the Pentagon had already started experimenting with Azure OpenAI, a version of OpenAI’s models offered by Microsoft, two sources familiar with the matter said. At the time, Microsoft had been contracting with the Department of Defense for decades. It was also OpenAI’s largest investor, and had broad license to commercialize the startup’s technology.
That same year, OpenAI employees saw Pentagon officials walking through the company’s San Francisco offices, the sources said. They spoke on the condition of anonymity as they aren’t licensed to comment on private company matters.
Some OpenAI employees were wary about associating with the Pentagon, while others were simply confused about what OpenAI’s usage policies meant. Did the policy apply to Microsoft? While sources tell WIRED it was not clear to most employees at the time, spokespeople from OpenAI and Microsoft say Azure OpenAI products are not, and were not, subject to OpenAI’s policies.
“Microsoft has a product called the Azure OpenAI Service that became available to the US Government in 2023 and is subject to Microsoft terms of service,” said spokesperson Frank Shaw in a statement to WIRED. Microsoft declined to comment specifically on when it made Azure OpenAI available to the Pentagon, but notes the service was not approved for “top secret” government workloads until 2025.
“AI is already playing a significant role in national security and we believe it’s important to have a seat at the table to help ensure it’s deployed safely and responsibly,” OpenAI spokesperson Liz Bourgeois said in a statement. “We’ve been transparent with our employees as we’ve approached this work, providing regular updates and dedicated channels where teams can ask questions and engage directly with our national security team.”
The Department of Defense did not respond to WIRED’s request for comment.
By January 2024, OpenAI updated its policies to remove the blanket ban on military use. Several OpenAI employees found out about the policy update through an article in The Intercept, sources say. Company leaders later addressed the change at an all-hands meeting, explaining how the company would tread carefully in this area moving forward.
In December 2024, OpenAI announced a partnership with Anduril to develop and deploy AI systems for “national security missions.” Ahead of the announcement, OpenAI told employees that the partnership was narrow in scope and would only deal with unclassified workloads, the same sources said. This stood in contrast to a deal Anthropic had signed with Palantir, which would see Anthropic’s AI used for classified military work.
Palantir approached OpenAI in the fall of 2024 to discuss participating in their “FedStart” program, an OpenAI spokesperson confirmed to WIRED. The company ultimately turned it down, and told employees it would’ve been too high-risk, two sources familiar with the matter tell WIRED. However, OpenAI now works with Palantir in other ways.
Around the time the Anduril deal was announced, a few dozen OpenAI employees joined a public Slack channel to discuss their concerns about the company’s military partnerships, sources say and a spokesperson confirmed. Some believed the company’s models were too unreliable to handle a user’s credit card information, let alone assist Americans on the battlefield.
Tech
Don’t Risk Birdwatching FOMO—Put Out Your Hummingbird Feeders Now
Though most people associate the beginning of March with the hopefulness of spring and the indignities of daylight saving time, there’s another important event taking place yards all over the country: hummingbird season.
While many species of hummingbirds can be seen in regions year-round, others are migratory, and this time typically marks their return from wintering grounds in Central and South America. These tiny birds can lose up to 40 percent of their body weight by the time they arrive here after having flown thousands of miles, and since many flowers haven’t bloomed yet, nectar feeders can be a source of essential fuel.
Though I test smart bird feeders year-round, I don’t use hummingbird feeders as often as I should, as it’s imperative that they be cleaned and refilled with new nectar every two or three days (a ratio of 1:4 granulated sugar to water is best, and avoid any dyes or additives) to prevent deadly bacteria and mold, and I don’t always have the time.
But if you are going to invest the energy in maintaining a hummingbird feeder, right now is the best time, as you have a chance to see migratory species you might not otherwise encounter, such as black-chinned hummingbirds. A smart feeder helps you ID them, whether they’re stopping at your feeder on their way north or arriving at their final destination.
Birdbuddy’s Pro is the smart hummingbird feeder I recommend and use myself when I’m not actively testing. The app is easy to navigate and sends cleaning reminders, the built-in solar roof keeps the battery charged, and, unlike other feeders, only the shallow bottom screws off for refilling. No having to pour sticky nectar through a narrow opening, or turn a giant cylinder upside down and risk spilling.
Note that it’s not perfect; the sensor is inconsistent and doesn’t capture every hummingbird that visits, but for the camera quality (5 MP photos, 2K video with slow-motion, 122-degree field of view) and ease of use, it’s a foible I’m willing to put up with. If you already have another Birdbuddy feeder, the hummingbird feeder images and videos will integrate seamlessly into your app feed.
Right now, the feeder is 37 percent off on Birdbuddy’s website—a deal I usually don’t see outside of shopping events like Black Friday or Amazon Prime Day. Note that the feeder only runs on 2.4 GHz Wi-Fi, and while it is fully functional without a subscription, a Birdbuddy Premium subscription will let you add friends and family members to your account so they can see the birds as well. That’s $99 a year through the app.
Power up with unlimited access to WIRED. Get best-in-class reporting and exclusive subscriber content that’s too important to ignore. Subscribe Today.
-
Fashion1 week agoPolicy easing drives Argentina’s garment import surge in 2025
-
Politics1 week agoWhat are Iran’s ballistic missile capabilities?
-
Business7 days agoIndia Us Trade Deal: Fresh look at India-US trade deal? May be ‘rebalanced’ if circumstances change, says Piyush Goyal – The Times of India
-
Business1 week agoAttock Cement’s acquisition approved | The Express Tribune
-
Politics1 week agoUS arrests ex-Air Force pilot for ‘training’ Chinese military
-
Business6 days agoGreggs to reveal trading amid pressure from cost of living and weight loss drugs
-
Sports6 days agoLPGA legend shares her feelings about US women’s Olympic wins: ‘Gets me really emotional’
-
Fashion7 days agoTexwin Spinning showcasing premium cotton yarn range at VIATT 2026

