CrowdStrike reported an 89% increase in AI-enabled attacks.

AI-accelerated phishing and automated reconnaissance are the main use cases.

CrowdStrike published the "2026 Global Threat Report," detailing how adversaries use GenAI and how they attack AI.

Highlights:

My take:

  1. Threat actors using AI is not surprising. Frontier labs know it and respond with KYC and misuse detection.
  2. Serious operators will switch to OSS models for better control over their stack. OSS models are getting good enough.
  3. Cloud providers should expect an increase in GPU/TPU abuse, as actors' economics and habits favor cheap or free tokens.
  4. People are installing OpenClaw in corporate environments. CrowdStrike's 2027 Global Threat Report will likely be full of OC compromises.
  5. The 93% of businesses that said they understand AI risks "quite well" or "very well" should read CrowdStrike's report.

CrowdStrike 2026 Global Threat Report

CrowdStrike 2026 report: 89% increase in AI-enabled attacks year over year GenAI used at scale for social engineering: fake personas and translated phishing lures Malicious MCP server postmark-mcp forwarding emails to attacker-controlled addresses Prompt injection embedded in phishing emails to disrupt AI-based triage systems AI systems targeted directly through Langflow exploitation and WormGPT tooling