Quarter Overview
The opening quarter of 2026 reflects a threat landscape that has matured significantly in its use of automation and AI-assisted tooling — on both sides of the security boundary. Ransomware operations continue to refine their extortion playbooks, layering pressure mechanisms beyond simple encryption. IoT infrastructure, much of it deployed before security-by-design requirements became standard, remains a persistent source of botnet activity targeting European networks. For European mid-market organisations, the compounding effect is meaningful: threats are becoming more sophisticated while regulatory obligations are accelerating in parallel. Organisations navigating NIS2, DORA, and the forthcoming Cyber Resilience Act simultaneously need to treat threat intelligence not as a reporting exercise but as a direct input into operational risk decisions.
Top 3 Threats This Quarter
1. AI-Augmented Attacks
The integration of large language models and generative AI tools into offensive operations has moved from theoretical concern to documented reality. Security vendors and threat intelligence providers reported throughout 2025 and into 2026 that AI is being applied across multiple phases of the attack lifecycle.
Phishing and social engineering at scale. AI-generated phishing content has become markedly more convincing. Earlier indicators — poor grammar, inconsistent tone, generic salutations — are increasingly absent. Multilingual capability means that language is no longer a meaningful filter: Dutch, German, and French-language lure content can now be generated with the same fluency as English. Spear-phishing campaigns that previously required manual research and writing effort can be templated and scaled rapidly. Organisations in the mid-market that rely heavily on email hygiene training should treat this as a material shift in baseline assumptions.
Deepfake-assisted business email compromise. The more targeted concern is the use of synthetic voice and video in business email compromise (BEC) scenarios. Security researchers have documented cases where audio deepfakes of senior executives were used to authorise fraudulent wire transfers. As the underlying technology becomes more accessible and the cost of generating convincing audio drops, this attack surface expands. Finance teams, treasury functions, and anyone in a payment-authorisation role warrant specific procedural controls independent of purely technical defences.
AI-assisted reconnaissance. At the pre-intrusion stage, AI tooling is being applied to accelerate vulnerability identification and target profiling. Passive reconnaissance that previously required skilled manual effort — mapping exposed attack surfaces, correlating leaked credentials, identifying unpatched systems — is increasingly automatable. This shortens the window between vulnerability disclosure and exploitation at scale.
Defensive guidance. Technical email controls (DMARC, DKIM, SPF) remain foundational. Beyond these, out-of-band verification procedures for high-value financial transactions are no longer optional. Staff awareness training should be updated to reflect that AI-generated content may be indistinguishable from legitimate communications without additional verification steps.
2. Ransomware Multi-Extortion Evolution
The ransomware business model has continued to professionalise. What began as a binary proposition — pay for decryption or lose your data — has evolved into a structured extortion framework with multiple independent leverage points.
Multi-layered extortion models. Modern ransomware operations routinely combine encryption with data exfiltration, followed by threats to publish stolen data, sell it to competitors, or notify affected customers and regulators directly. Some campaigns now add distributed denial-of-service pressure against victim infrastructure as a fourth lever. Each mechanism is designed to operate independently: even organisations with functional backups face extortion pressure from the data theft component.
Ransomware-as-a-Service maturity. The RaaS affiliate model has matured to the point where technical sophistication is no longer the principal barrier to entry. Affiliates access tooling, infrastructure, and even victim negotiation support through established criminal marketplaces. ENISA's threat landscape assessments have consistently highlighted this industrialisation as a structural amplifier of ransomware impact across Europe.
Targeting of backup infrastructure. A significant tactical evolution is the deliberate targeting of backup systems prior to encryption. Ransomware operators now routinely identify and destroy or encrypt backup repositories before triggering the primary payload. Organisations whose recovery plans depend on immutable or air-gapped backup architecture have a material advantage; those relying on connected backup solutions face a meaningfully different risk profile.
Sector exposure. Healthcare and manufacturing remain primary targets, driven by high operational pressure to restore systems quickly and, in healthcare particularly, by the sensitivity of the data held. European manufacturing organisations with OT environments integrated into corporate IT networks carry compounded risk.
Defensive guidance. Immutable backup infrastructure — whether tape, air-gapped storage, or cloud-based immutable blob storage — is the single highest-impact control against the encryption component. Incident response plans should account explicitly for multi-extortion scenarios, including pre-agreed communication protocols covering regulator notification obligations under NIS2 and sector-specific requirements.
3. IoT Botnets
Legacy IoT devices continue to represent a structurally problematic attack surface. Devices deployed five to ten years ago — industrial sensors, network-attached storage, cameras, and access control systems — were not designed with ongoing security update capability, and many remain in service well beyond the effective security support lifecycle of their firmware.
Persistent botnet infrastructure. Botnet activity leveraging compromised IoT devices has targeted European network infrastructure throughout 2025 and into 2026. These botnets are used for distributed denial-of-service, as proxy networks to obscure attacker origin, and increasingly as persistent footholds for longer-term intrusion campaigns. NIS2's supply chain security requirements are directly relevant here: third-party IoT devices within a network perimeter are an in-scope risk regardless of whether they are managed by the organisation or a supplier.
CRA and the compliance gap. The Cyber Resilience Act addresses this category of risk at the product level, mandating security-by-design requirements and vulnerability management obligations for manufacturers of products with digital elements. However, the CRA compliance deadline is December 2027. The installed base of non-compliant devices will remain in service for years beyond that date, meaning the vulnerability surface exists regardless of the regulatory timeline.
Defensive guidance. Network segmentation is the most immediately actionable control — IoT devices should not have uncontrolled access to core business systems or the internet. Asset inventory of all IoT devices, including those managed by facilities or building management functions, is a prerequisite. Organisations should review supplier contracts to understand firmware update commitments and, where these are absent, should factor the risk into their NIS2 supply chain assessments.
Sector Spotlight: Financial Services
DORA enforcement began in January 2025. Financial entities in scope — which includes banks, insurers, investment firms, and a range of supporting ICT service providers — are now operating within a live regulatory framework with real supervisory expectations attached to it.
The first year of enforcement has brought the ICT risk management and third-party oversight requirements into focus. Threat intelligence is explicitly a component of DORA's ICT risk framework: Article 13 requires entities to have intelligence capabilities that inform their understanding of the threat landscape. This briefing, and others in the series, are designed to be directly relevant to that obligation.
Financial institutions remain high-priority targets for sophisticated threat actors. Nation-state affiliated groups continue to conduct reconnaissance against European financial infrastructure. Fraud operations — BEC, synthetic identity fraud, account takeover — are increasingly automated. The intersection of AI-augmented attack capability with the financial sector's complex third-party ICT dependencies creates a concentrated risk environment.
DORA's threat-led penetration testing (TLPT) requirements, applicable to significant entities, are becoming operationally real. Organisations in scope should ensure their threat intelligence inputs to TLPT exercises reflect current adversary techniques rather than generic frameworks alone.
Regulatory Response
ENISA threat landscape reporting. ENISA's annual threat landscape assessments remain the primary authoritative source for European threat intelligence at the policy level. Their analysis consistently highlights ransomware, social engineering, and attacks against critical infrastructure as the dominant concern categories — consistent with the threats examined in this edition.
EU AI Act. The AI Act's risk categorisation has implications for both offensive AI use and defensive AI deployment. High-risk AI system requirements will shape how security vendors can deploy AI-assisted detection and response tooling within the European market. The Act's prohibited applications category covers certain biometric and manipulation-related uses that are directly relevant to the deepfake threat surface discussed above.
Cyber Resilience Act — September 2026 milestone. CRA's vulnerability reporting obligations take effect in September 2026, ahead of the full product compliance deadline. Manufacturers of products with digital elements will be required to report actively exploited vulnerabilities to ENISA and relevant CSIRTs within 24 hours. For organisations purchasing such products, this creates a new information channel for threat intelligence that did not previously exist in a structured form.
Defensive Priorities for Q1 2026
-
Update your phishing and BEC controls. Review out-of-band verification procedures for financial transactions. Ensure DMARC is enforced (not monitoring-only) across all sending domains. Update awareness training to address AI-generated content and synthetic voice.
-
Audit your backup architecture against multi-extortion scenarios. Confirm that backup systems are either air-gapped or immutable. Test restoration procedures. Ensure backup scope covers critical data, not just systems.
-
Conduct an IoT asset inventory. Map all IoT devices in your environment including those managed outside IT (facilities, building management). Apply network segmentation. Review supplier firmware update commitments.
-
Align threat intelligence inputs to your regulatory obligations. Under NIS2, DORA, and sector-specific requirements, threat intelligence is increasingly an auditable input to risk management. Document how your understanding of the current threat landscape informs your risk assessments and controls.
-
Begin CRA preparation if products are in scope. If your organisation manufactures or substantially modifies products with digital elements sold into the EU market, the September 2026 vulnerability reporting deadline is approaching. Ensure your vulnerability disclosure processes and PSIRT function are mature enough to meet the 24-hour reporting window.
Threat Briefing is published quarterly by the Orizon team. It reflects general industry trends and authoritative public sources. It does not constitute legal or regulatory advice. For tailored threat analysis or compliance support, contact us.