Looking toward 2026, several existing dynamics are expected to intensify. The volume of published vulnerabilities will continue to grow, with near immediate exploitation, often concentrated at the end of the week. The time available for defensive teams to react will keep shrinking.
According to FIRST projections, close to 59,000 CVEs could be published over the year. At this scale, any purely reactive security strategy becomes unrealistic. State sponsored actors, particularly Russian groups, along with opportunistic cybercriminals, are likely to push further a model of offensive reuse. Campaigns inspired by past operations such as WannaCry or NotPetya will no longer be exceptions but repeatable playbooks, reusing tools, infrastructure, and tactics with high efficiency.
For many organizations, the most likely scenario remains large scale data leaks or confirmed breaches of critical institutions. The publication of sensitive data will serve both destabilization goals and demonstrations of power. At the same time, the AI hype is expected to collide with operational reality. High costs, difficult integration, uneven results. Expectations will adjust, making room for more pragmatic and field driven use cases.