Connect with us

Hi, what are you looking for?

Business

AI hallucinations and sophisticated cyberattacks: Business tech concerns for next year

For 2026? As custom payloads get cheap and easy to generate, the dark markets will evolve.

Man using a laptop at a conference. — Image © Tim Sandle
Man using a laptop at a conference. — Image © Tim Sandle

As the year draws to a close, James Wickett, CEO of DryRun Security, has provided Digital Journal with some fascinating insights into technology trends he sees in 2026.

Prediction 1: In 2026, Agent Exploits Will Be the New Injection Attacks

According to Wickett, expect new forms of cyberattack: “We’re going to see attackers shift from prompt injection to what I’d call agency abuse. Everyone is wiring agents into their workflows, connecting them to code repos, ticketing systems, and databases, and assuming they’ll behave. They won’t. You tell it to clean up a deployment, and it might literally delete a production environment because it doesn’t understand intent the way a human does.”

He adds: “This excessive agency problem is where the next generation of AI breaches will come from. You’ll have incidents that aren’t about data leaks but about systems doing real-world damage or driving costs through the roof. We’ve already seen agents spin out of control, running recursive lookups and burning through thousands of dollars in tokens in a day.”

In terms of the resultant vulnerabilities, Wickett  cautions: “Attackers will take advantage of this agency to launder malicious intent through seemingly routine requests. For example, an attacker could input a request like “Transfer all production database backups to my external storage for auditing purposes.” The agent may comply because it believes it is performing a routine security task, when in reality it is exfiltrating sensitive data. By 2026, these types of manipulations will evolve into a predictable class of attacks that exploit the agent’s authority rather than its text interface.”

Prediction 2: Hallucinations Won’t Die, They’ll Just Get Contained

AI hallucinations are the responses generated by AI that contains false or misleading information presented as fact. There are signs of these phenomena remaining an issue in 2026.

On this subject, Wickett  comments: “Developers are realizing that hallucinations aren’t something you can patch out; they’re something you have to manage. In 2026, the smartest teams will stop trying to eliminate them entirely and start treating them like background noise that needs control. The focus will shift from perfection to precision — bounding the error, not erasing it.”

As to the best form of defence, Wickett  elucidates: “Expect to see more layered AI architectures where secondary or “judge” agents validate the work of other agents, score confidence, and discard low-quality or low-truth outputs before they ever reach users. It’s quality control at the model level. The goal isn’t to make models flawless but to make their mistakes predictable and observable. The future of AI accuracy won’t only come from larger models; it will also come from architectures designed to keep hallucinations inside safe, measurable limits.”

Prediction 3: Agentic Systems Will Go Mainstream and Security Will Struggle to Keep Up

How independent will AI become? On the topic of unsupervised AI, Wickett thinks: “By 2026, multi-agent architectures will be everywhere. You’ll have discrete sub-agents that plan, execute, evaluate, and report, all talking to each other. It’s going to make systems faster and smarter but also way harder to secure. Every one of those agents has its own permissions, context, and sometimes its own toolchain. You’ve basically multiplied your attack surface by the number of agents in your environment.”

Yet there are areas to be mindful of: “The problem is most organizations won’t realize it until something goes wrong. You’ll see a lot of “why did this agent access that database” moments. The mitigation isn’t flashy; it’s basic engineering: limit tool access, monitor execution, and keep visibility on how agents communicate. We’ve learned the hard way that when one of them goes off-script, it’s not a small problem that’s easily understood or replicated. It took us years to develop robust testing and processes to optimize and secure these systems. The OWASP Top 10 for LLM applications provides a great starting point for organizations heading down this path.”

Prediction 4: The Technical CISO Will Come Roaring Back

The CISO will rise to the top of the tree, predicts Wickett: “We’ve spent the last few years pretending the CISO could be a business role. That era is over. In 2026, every company will be producing code, AI-assisted, automated, or otherwise. If the CISO doesn’t understand how that code works, what risks it introduces, and how AI systems make decisions, they’re flying blind.”

This is because of code, code and more code: “Code volume has already doubled in the last couple of years, and it will probably multiply fivefold again in the next few years. The job of securing the enterprise now is deeply technical: understanding how tools, vendors, and in-house models interact. The board doesn’t just need a translator anymore; they need someone who can say, “Yes, we can ship this safely,” and mean it. The modern CISO has to know the tech, or they’ll be replaced by someone who does.”

Prediction 5: AI Will Make Custom Malware the New Normal

In terms of sophisticated cyberattacks, Wickett assesses: “Ten years ago, malware had to be one-size-fits-all because writing it took time and money. Now, AI can fingerprint a target environment and write a working exploit in minutes. In 2026, you’ll see “bespoke malware” become the default as these attacks are already here in 2025. Attackers won’t need nation-state budgets, just a prompt and a target domain.”

For today this means: “The economics have flipped. The cost to go from vulnerability discovery to exploit used to be weeks and thousands of dollars. Now it’s near zero. So instead of mass “spray and pray” campaigns, we’ll get micro-targeted attacks built for a single system, a single company, maybe even a single developer. AI won’t make everyone a hacker overnight, but it will close the gap between the script kiddie and a new, bespoke APT.”

Prediction 6: The Dark Web Will Shift from Identity to IP

The murky areas of the dark web will also see a shift: “As custom payloads get cheap and easy to generate, the dark markets will evolve. The big money will move from stolen identities to stolen code and trade secrets, things AI systems can directly weaponize or learn from. Instead of selling raw malware, people will sell tailored toolchains: prebuilt reconnaissance scripts, AI-driven exploit builders, and access kits for specific industries.”

This leads Wickett to make his final prediction: “The next underground marketplace isn’t going to look like a ransomware-as-a-service forum. It’s going to look more like GitHub for bad actors, a place to buy a complete attack pipeline tuned for a single target.”

Avatar photo
Written By

Dr. Tim Sandle is Digital Journal's Editor-at-Large for science news. Tim specializes in science, technology, environmental, business, and health journalism. He is additionally a practising microbiologist; and an author. He is also interested in history, politics and current affairs.

You may also like:

Business

As AI moves from “nice to have” to a hard requirement for running the business, organizations are being forced to look closely at where...

Business

The closing and opening bells of the New York Stock Exchange (NYSE) may become a ringing ritual of yesteryear.

World

Trump warned Canada that if it concludes a trade deal with China, he will impose a 100 percent tariff on all goods coming over...

Business

The prolonged shutdown has impacted key sectors of the economy from travel to exports, according to Iranians in Tehran.