Are AI cyber threats overhyped?
As cyber teams turn to the threats posed by AI, rising attacks by state-sponsored groups and ransomware gangs remain the biggest threat
We’re just over a week into 2026 but already, enterprise cybersecurity teams will be hard at work repelling attacks – and business leaders will be worrying about the year ahead.
On the one hand, we’re told that AI tools are beginning to empower security teams to go further and faster. On the other, the use of AI by hackers to launch attacks also appears to be on the rise.
All of this is happening against a backdrop of rising geopolitical tensions and continual attacks by state-sponsored hacking groups against businesses. How will all this come together in 2026 and beyond?
In this episode, Jane and Rory are joined by Jamie Collier, lead advisor in Europe at Google Threat Intelligence Group, to explore the risks – both novel and ordinary – enterprises face in 2026.
Highlights
"I think one of the big reflections for me is just the extent to which threat actors are adapting to what I would call modern infrastructure. We think about the way that a lot of these traditional attacks have worked, we've seen that typical hack moving through the network, escalating privileges, etc. When we look towards defending cloud, SaaS, these sorts of spaces, it's a very different space, a lot more emphasis on identity and that is providing, effectively, a bypass to a lot of those complex threat operations where these threat actors can just really log in."
"The most obvious way that for actors are using AI is probably the most boring in terms of it's just different levels of automation of their attack life cycle. It's crafting phishing emails. It's conducting reconnaissance. I think that sort of goes without saying, and actually a lot of that is in areas we're not necessarily going to fully see, because they're going to be doing that with their own models, etc."
"There is a lot more to North Korea than just IT workers, right? We see also very big targeting of software developers, we see cryptocurrency remains a primary target, and I think given that their kind of dual objective of financial motivated operations and strategic intelligence gathering, it actually exposes a lot of organizations to all sorts of different types of North Korean threats that range from tailored targeting, to employment fraud, to initial access to cryptocurrency theft, ransomware, supply chain compromise."
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
Footnotes
- NCSC issues urgent warning over growing AI prompt injection risks – here’s what you need to know
- Cyber experts have been warning about AI-powered DDoS attacks – now they’re becoming a reality
- Salt Typhoon attack on US congressional email system ‘exposes how vulnerable core communications systems remain to nation-state actors’
- OpenAI says prompt injection attacks are a serious threat for AI browsers – and it’s a problem that’s ‘unlikely to ever be fully solved'
- OpenAI turns to red teamers to prevent malicious ChatGPT use as company warns future models could pose 'high' security risk
- A flaw in Google’s new Gemini CLI tool could’ve allowed hackers to exfiltrate data
- Google says you shouldn't worry about AI malware – but that won’t last long as hackers refine techniques
- North Korean IT workers: The growing threat
- North Korean hackers continue targeting developers in open source malware campaign - and experts say as many as 36,000 victims have been snared so far
- CRINK attacks: which nation state hackers will be the biggest threat in 2026?
Subscribe
- Subscribe to The IT Pro Podcast on Apple Podcasts
- Subscribe to The IT Pro Podcast on Spotify
- Subscribe to the IT Pro newsletter
- Join us on LinkedIn

Rory Bathgate is Features and Multimedia Editor at ITPro, overseeing all in-depth content and case studies. He can also be found co-hosting the ITPro Podcast with Jane McCallion, swapping a keyboard for a microphone to discuss the latest learnings with thought leaders from across the tech sector.
In his free time, Rory enjoys photography, video editing, and good science fiction. After graduating from the University of Kent with a BA in English and American Literature, Rory undertook an MA in Eighteenth-Century Studies at King’s College London. He joined ITPro in 2022 as a graduate, following four years in student journalism. You can contact Rory at rory.bathgate@futurenet.com or on LinkedIn.
-
Tool sprawl: the risk and how to mitigate itIn-depth Many firms are struggling with tool sprawl, and it’s having a negative impact on their security – what can be done?
-
A critical HPE OneView flaw is being exploited in the wildNews A maximum-severity HPE OneView vulnerability is being actively exploited in the wild, prompting an alert by CISA.
-
The future of threat detectionITPro Podcast To fight sophisticated threats, cybersecurity teams will need to unify data like never before
-
November rundown: CrowdStrike's insider threatITPro Podcast As CrowdStrike grappled with a malicious employee, Cloudflare suffered a major outage
-
Getting a grip on digital identityITPro Podcast As AI agent adoption explodes, security leaders will need better identity controls than ever before
-
Let’s talk about digital sovereigntyITPro podcast In the age of AI and cloud, where data resides is a key consideration
-
Can cyber group takedowns last?ITPro Podcast Threat groups can recover from website takeovers or rebrand for new activity – but each successful sting provides researchers with valuable data
-
July rundown: Salt Typhoon and SharePoint scaresITPro Podcast US public sector organizations are under serious threat from the state-backed hacking group
-
Can the UK ban ransomware payments?ITPro Podcast Attempts to cut off ransomware group profits could instead harm businesses
-
We need to talk about operational technologyITPro Podcast Groups like Volt Typhoon are abusing poor hygiene in critical infrastructure to pre-position for attacks