<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>Cyber Threat Alliance</provider_name><provider_url>https://www.cyberthreatalliance.org</provider_url><title>Threats and cyber-attacks in 2026: Which will be the most complex and have the greatest impact... expected or not? - Cyber Threat Alliance</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="HMSlyAC2B7"&gt;&lt;a href="https://www.cyberthreatalliance.org/threats-and-cyber-attacks-in-2026-which-will-be-the-most-complex-and-have-the-greatest-impact-expected-or-not/"&gt;Threats and cyber-attacks in 2026: Which will be the most complex and have the greatest impact&#x2026; expected or not?&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://www.cyberthreatalliance.org/threats-and-cyber-attacks-in-2026-which-will-be-the-most-complex-and-have-the-greatest-impact-expected-or-not/embed/#?secret=HMSlyAC2B7" width="600" height="338" title="&#x201C;Threats and cyber-attacks in 2026: Which will be the most complex and have the greatest impact&#x2026; expected or not?&#x201D; &#x2014; Cyber Threat Alliance" data-secret="HMSlyAC2B7" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script nonce="2ce19bea8f"&gt;
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
//# sourceURL=https://www.cyberthreatalliance.org/wp-includes/js/wp-embed.min.js
&lt;/script&gt;
</html><thumbnail_url>https://www.cyberthreatalliance.org/wp-content/uploads/2026/01/CTA_blog_SIC-01-01-01-1024x696.png</thumbnail_url><thumbnail_width>1024</thumbnail_width><thumbnail_height>696</thumbnail_height><description>By Michael Daniel, CTA President &amp; CEO Cyber threats have never been static, and 2026 will be no different. The digital environment will continue to evolve, with malicious actors and defenders changing behaviors in response to each other. &nbsp;While some surprises are inevitable at a small scale, the changes in cyber threats at the macro &hellip; Continued</description></oembed>
