The World Economic Forum's Global Cybersecurity Outlook 2026 contains a statistic that should concern every organisation with a digital presence, from a Mumbai fintech startup to a Dallas hospital network: 87% of respondents now identify AI-related vulnerabilities as the fastest-growing cyber risk. The year 2026 has validated that concern with a relentless series of major incidents spanning every continent, every sector, and every organisation size. What has changed is not just the scale of attacks — it is the intelligence behind them. AI has fundamentally altered the offense-defence balance in cybersecurity, and the world is still catching up.
The Anatomy of AI-Assisted Attacks: What's Changed
Traditional cyberattacks relied on relatively static playbooks: phishing emails with recognisable patterns, ransomware deployed through known vulnerability classes, social engineering scripts that experienced security teams learned to recognise. AI has dismantled all of that. AI-powered attacks now generate personalised phishing content at industrial scale — emails that reference the target's real colleagues, use their organisation's actual terminology, and arrive at the psychologically optimal moment based on the target's digital behaviour patterns.
The first publicly reported AI-orchestrated hacking campaign appeared in late 2025, and in 2026, the technique has proliferated. AI agents can now autonomously scan for vulnerabilities, generate and test exploits, exfiltrate data without triggering traditional anomaly detection systems, and adapt their tactics in real time when encountering defensive measures. The WEF survey identified data leaks associated with generative AI (34% of respondents) and the advancement of adversarial AI capabilities (29%) as the two leading specific concerns for 2026.
From the US to India: How Major 2026 Breaches Share a Common Thread
The year's most significant breaches span geography but share a structural vulnerability: third-party vendor compromise. In the United States, the ShinyHunters ransomware group's theft of 275 million student records was achieved not by attacking 9,000 schools individually, but by compromising the student information system vendor that served all of them simultaneously. NYC Health + Hospitals lost data belonging to 1.8 million patients through a third-party vendor access pathway. The telecommunications provider Brightspeed lost over a million customer records to the Crimson Collective through a similar vector.
In India, the rapid digitisation of healthcare, banking, and government services has created new attack surfaces that have not yet been matched with proportionate cybersecurity investment. CERT-In, India's national cybersecurity agency, recorded a significant increase in reported incidents in FY26, with the healthcare and BFSI sectors disproportionately targeted. The convergence of India's massive digital payments infrastructure (processing 21.7 billion UPI transactions per month) with relatively nascent enterprise cybersecurity standards creates a target environment that international threat actors are actively exploiting.
The EU AI Act and US Deregulation: A Diverging Policy Response
Governments worldwide are responding to the AI-cybersecurity threat with diametrically opposite policy approaches. In the European Union, the AI Act's risk-based framework entered its implementation phase in 2026, with obligations applying progressively across AI risk categories. High-risk AI systems in critical infrastructure, healthcare, and financial services face mandatory security assessments, incident reporting requirements, and human oversight mandates that directly address the AI-enabled attack scenarios emerging in 2026.
In the United States, the Trump administration has taken a deregulatory approach to AI, issuing an executive order in December 2025 actively discouraging state-level AI regulation to preserve federal prerogative — while simultaneously requiring companies including Microsoft, Google, and xAI to provide early access to frontier AI models to the Commerce Department's Center for AI Standards and Innovation for national security testing. The result is a US approach that prioritises government access and innovation speed over the prescriptive private-sector mandates of the EU model.
Physical AI and the Emerging Threat Frontier
Beyond the well-publicised data breaches, cybersecurity professionals in 2026 are increasingly concerned about a newer threat class: attacks on physical AI systems. As AI-powered robots, autonomous vehicles, smart manufacturing systems, and drone fleets become operational in industrial settings across the US, India, and Asia, they introduce physical attack surfaces that traditional cybersecurity frameworks were not designed to address. Compromising an AI-controlled assembly line or an autonomous logistics fleet creates risks that go far beyond data theft — they extend to physical safety and operational continuity.
The convergence of physical and digital AI risk is the frontier that the global cybersecurity community is least prepared for, and most urgently needs to address. Whether through international standards bodies, government regulation, or industry consortia, building security-by-design into physical AI systems is the defining cybersecurity challenge of the latter half of this decade — for organisations in New Delhi, New York, and every major tech hub between them.