Red Report 2026: insights into evolving cyber threats

Red Report 2026 reveals a shift in cyber tactics with an emphasis on stealth and persistence, redefining our approach to digital defence.

  • Monday, 16th February 2026 Posted 2 months ago in by Sophie Milburn
Picus Security, a security validation company, has released the Red Report 2026, highlighting a notable shift in cyber threats: the emergence of the "Digital Parasite". This analysis of over 1.1 million malicious files and 15.5 million actions in 2025 shows a strong emphasis on stealth, evasion, and persistence by cyber adversaries.

Evolving Malware Techniques

The report identifies trends in malware behaviours:

  • Malware Doing Math: Strains such as LummaC2 use trigonometry to calculate the Euclidean distance of mouse angles. By detecting perfectly consistent mouse movements, these strains can distinguish between human users and automated sandboxes, avoiding activation when monitored.
  • The "Play Dead" Phenomenon: Virtualisation and sandbox evasion are now the fourth most common technique, allowing malware to remain dormant and evade detection by analysis tools.
  • Shift From Encryption to Extortion: The use of encryption has dropped by 38%, with attackers increasingly exfiltrating data silently for extortion purposes.
Stealth and Persistence

Research by Picus Labs, validated through real-world attack simulations, shows a trend towards maintaining access and avoiding detection:

  • Process Injection: For the third consecutive year, process injection is the most common technique, allowing malicious code to blend with legitimate applications.
  • Physical Insider Threats: State actors, including DPRK operatives, are using physical IP-KVM devices to control hardware directly, bypassing software defences.
  • Living Off the Cloud: Attackers route command-and-control traffic through trusted services such as OpenAI and AWS, blending with normal network activity.
  • Identity is the New Perimeter: One in four attacks involve stolen passwords from browsers, enabling attackers to operate as valid users.
These techniques allow attackers to minimise their operational footprint, reducing signals that would normally trigger security alerts and increasing the potential impact of their activity.

Closing the Gaps in Cyber Defence

The Red Report 2026 highlights the need for continuous protection strategies. Static assessments are insufficient against threats designed to remain undetected. Regular validation of security controls against real adversary behaviours is essential.

By simulating attacks continuously, organisations can assess the effectiveness of detection and prevention controls against stealth-focused techniques and identify gaps before they can be exploited.

Cato Networks joins Westcon-Comstor's AWS Marketplace

Posted 2 days ago by Sophie Milburn
Westcon-Comstor has added Cato Networks to its AWS Marketplace programme, expanding cloud procurement options for partners.

Atlassian introduces AI-powered 'Remix' for confluence

Posted 2 days ago by Sophie Milburn
Atlassian Corporation has introduced new AI features in Confluence that enable content to be transformed into formats such as charts, infographics,...
Cynomi has enhanced its platform with AI Insights and co-worker Agents, aimed at supporting cybersecurity service delivery for MSPs and MSSPs.

DXC Technology and ServiceNow forge AI partnership

Posted 2 days ago by Sophie Milburn
DXC Technology and ServiceNow have announced a collaboration to integrate AI into enterprise operations across global business functions.

Cloudera updates hybrid data and AI platform capabilities

Posted 2 days ago by Sophie Milburn
Cloudera has announced updates to its hybrid data and AI platform aimed at supporting enterprise data environments.
WatchGuard Technologies has launched a new endpoint security portfolio that introduces changes to traditional EDR licensing models.

SonicWall reveals 2026 Cyber Protect Report

Posted 2 days ago by Sophie Milburn
SonicWall's latest report identifies the 'Seven Deadly Sins of Cybersecurity', focusing on protection outcomes crucial for small and medium-sized...
Hammer AI Works is an end-to-end ecosystem designed to support AI adoption across organisations.