The year of machine deception

January 2026 Security Services & Risk Management, AI & Data Analytics

AU10TIX, an identity verification and fraud prevention provider, released Signals for 2026: The AU10TIX Global Identity Fraud Report Special Edition. The report reveals how early-warning intelligence is reshaping the future of fraud prevention amid rapid advances in artificial intelligence and quantum computing.

The special edition builds on the company’s year-long research into how fraud has shifted from isolated attempts to adaptive, self-optimising systems. What began as “repeaters”, recycled fraud behaviours that appeared across platforms, over time revealed distinct patterns that, once connected across industries, showed that seemingly isolated incidents were rehearsals for more adaptive attacks. These repeated signals have evolved into coordinated ecosystems powered by Fraud-as-a-Service and automated feedback loops.

As agentic AI systems learn to iterate, refine, and redeploy deception at scale, fraud is no longer a series of discrete events but a living system capable of improving itself through repetition. For this reason, the report identified 2025 as the Year of Machine Deception, a turning point where synthetic identities and automated fraud engines learn, adjust, and adapt in real time.

Fraud detection typically focuses on flagging irregularities, but in the age of systemic deception, these markers alone cannot be relied upon. As such, AU10TIX developed an early-warning framework capable of identifying the moment “truth begins to drift”. By continuously analysing behavioural, biometric, and metadata signals across billions of identity events, the system detects when small anomalies repeat across networks and begin to form a recognisable pattern. This converged-signal approach has revealed a 97.5% correlation between early behavioural irregularities and confirmed fraud attempts. In other words, signals that once appeared to be random noise are, in fact, a measurable precursor to coordinated attack activity.

“Fraud is no longer a static event; it’s a living signal moving through networks and devices,” said Yair Tal, CEO of AU10TIX. “At AU10TIX, we see the daily challenges our customers face as fraud evolves faster than ever. Our mission is to protect them, not just by responding to attacks, but by anticipating them. Our early-warning system helps ensure their businesses stay one step ahead, detecting risk before truth starts to drift”.

Signals to watch in 2026

The report warns of two emerging fronts in digital deception:

Agentic AI, or self-directed fraud engines, capable of autonomously creating and adapting synthetic identities.

Quantum risk threatens to upend the mathematical foundations of today’s encryption standards.

To counter these risks, AU10TIX has introduced a Predictive Resilience Framework that integrates anomaly intelligence with quantum-resilient cryptography across verification events. By uniting three interdependent stages—hash, encrypt, and predict—this unified model protects both the mathematics and the mechanics of trust. Together, these layers create a continuous defence framework: hashing keeps signals tamper-proof, post-quantum-aligned encryption protects data from emerging quantum decryption threats, and predictive analytics identify the earliest signs of AI-driven or behavioural spoofing attacks before they scale.

The report also identifies several leading indicators shaping the 2026 fraud landscape:

Presentation spoofing forecast to increase 100% in 2026: This includes any attempt to deceive a biometric or document verification system by presenting a fake or manipulated input (like a photo, mask, or deepfake) instead of a live, genuine person or authentic document.

Identity drift forecast to increase 60.7% in 2026: This refers to any gradual, subtle, or unauthorised change in a user's device metadata, behaviour, or credential history over time, deviating from their original, verified baseline.

Credential replay forecast to increase 36.4% in 2026: Malicious actors are increasingly intercepting valid data (such as usernames, passwords or session tokens) and fraudulently reusing or "replaying" that data to gain unauthorised access or perform prohibited actions.

As machine-driven deception accelerates, AU10TIX’s predictive resilience architecture positions businesses to stay ahead of threats that learn as fast as they attack.

The report is available here.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

“This Is Theft!” SASA slams Mafoko Security
News & Events Security Services & Risk Management Associations
The Security Association of South Africa (SASA) has issued a stark warning that the long-running Mafoko Security Patrols scandal is no longer an isolated case of employer misconduct, but evidence of a systemic failure in South Africa’s regulatory and governance structures.

Read more...
Making a mesh for security
Information Security Security Services & Risk Management
Credential-based attacks have reached epidemic levels. For African CISOs in particular, the message is clear: identity is now the perimeter, and defences must reflect that reality with coherence and context.

Read more...
Privacy by design or by accident
Security Services & Risk Management Infrastructure
Africa’s data future depends on getting it right at the start. If privacy controls do not withstand real-world conditions, such as unstable power, fragile last-mile connectivity, shared devices, and decentralised branch environments, then privacy exists only on paper.

Read more...
From friction to trust
Information Security Security Services & Risk Management Financial (Industry)
Historically, fraud prevention has been viewed as a trade-off between robust security and a seamless customer journey, with security often prevailing. However, this can impair business functionality or complicate the customer journey with multiple logins and authentication steps.

Read more...
Security ready to move out of the basement
AI & Data Analytics Security Services & Risk Management
Panaseer believes that in 2026, a board member at a major corporation will lose their job amid rising breaches and legal scrutiny, as organisations recognise that cyber risk is a business risk that CISOs cannot shoulder alone.

Read more...
Cyber remains top business risk, but AI fastest riser at #2
News & Events Security Services & Risk Management
The Allianz Risk Barometer 2026 ranks cybersecurity, especially ransomware attacks, as the #1 risk, while AI is the biggest riser and jumps from #10 to #2, highlighting the emerging risks for companies in almost all industry sectors.

Read more...
Access data for business efficiency
Continuum Identity Editor's Choice Access Control & Identity Management AI & Data Analytics Facilities & Building Management
In all organisations, access systems are paramount to securing people, data, places, goods, and resources. Today, hybrid systems deliver significant added value to users at a much lower cost.

Read more...
OT calculator to align cyber investments with business goals
Industrial (Industry) Information Security Security Services & Risk Management
The OT Calculator has been developed specifically for industrial organisations to assess the potential costs of insufficient operational technology (OT) security. By offering detailed financial forecasts, the calculator empowers senior management to make well-informed decisions.

Read more...
AI-powered classification across large areas
Axis Communications SA Surveillance Products & Solutions AI & Data Analytics
Axis Communications announced the upcoming launch of two innovative radars. Each device delivers a 180° or 270° horizontal field of detection, with accurate AI-powered classification across large areas, 24/7, in all weather and lighting conditions.

Read more...
Top five AIoT trends in 2026
IoT & Automation AI & Data Analytics
As we enter 2026, the convergence of artificial intelligence (AI) and IoT infrastructure is reshaping industries, unlocking unprecedented opportunities to optimise operations, enhance security, and improve sustainability.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.