Perly Consulting │ Beck Eco

The State of Play

A living index of AI adoption across industries — where established practice meets the bleeding edge
UPDATED DAILY

The AI landscape doesn't move in one direction — it lurches. Some techniques leap from experiment to table stakes in a single quarter; others stall against regulatory walls, technical ceilings, or organisational inertia that no amount of hype can dislodge. Knowing which is which is the hard part. The State of Play cuts through the noise with a rigorously maintained index of AI techniques across every major business domain — classified by maturity, evidenced by real-world adoption, and updated daily so you always know where you stand relative to the field. Stop guessing. Start knowing.

The Daily Dispatch

A daily newsletter distilling the past two weeks of movement in a domain or two — delivered to your inbox while the index updates in the background.

AI Maturity by Domain

Each dot marks the weighted maturity of practices within a domain — hover for a brief summary, click for more detail

DOMAIN
BLEEDING EDGEESTABLISHED

Phishing detection & prevention

GOOD PRACTICE

TRAJECTORY

Plateau

AI that identifies phishing attempts across email, messaging, and web, including sophisticated spear-phishing campaigns. Includes NLP-based email analysis and URL reputation scoring; distinct from data loss prevention which protects outbound data rather than detecting inbound threats.

OVERVIEW

AI-powered phishing detection is a proven, widely deployed practice — but it faces a critical bifurcation in 2026 between technical capability and operational effectiveness. Detection research and vendor platforms have reached theoretical maturity: models exceed 97% accuracy in controlled settings, production deployments block billions of emails monthly, and the ecosystem spans leading vendors (Proofpoint, Barracuda, Cofense) to specialized entrants (Abnormal, IRONSCALES). Yet real-world evidence reveals persistent gaps. UK government data shows 38% of businesses report phishing attacks and 85% of breached organisations involve phishing in the attack chain. Real-world deployments reveal detection failures: large organisations consistently find 3,000+ phishing emails missed quarterly by leading platforms, while attackers have systematised response with phishing-as-a-service (90% of high-volume campaigns) and AI-assisted code generation (hybrid human-AI attacks achieving 54% click-through vs 12% human baseline). The defining tension is not technical but operational: the organisations deploying pure-detection play defenses face attackers adapting faster than filters improve, with multi-channel tactics (email, Teams, calendar, reverse proxies) overwhelming email-only controls. Practitioner surveys confirm overconfidence masking underpreparedness: 86% of attacks now use AI while only 17% of organisations deploy AI-powered defences. The practice remains on a plateau—mature capability coexisting with expanding threat surface and human-factor limitations that no detection improvement overcomes.

CURRENT LANDSCAPE

The attack surface has expanded decisively beyond email in May 2026. KnowBe4 and Barracuda telemetry document an unmistakable trend: while 86% of attacks now contain AI-generated content (up from 40% mid-2024), the delivery channels have fragmented. Calendar phishing surged 49%, Teams-based attacks jumped 41%, and reverse proxy credential attacks climbed 139%. Multi-channel orchestration is now standard attacker practice, overwhelming email-only defenses. On detection efficacy, large-scale vendor telemetry shows persistent gaps despite platform maturity. Microsoft Defender for Office 365 blocked 8.3 billion emails in Q1 2026, yet the same product experienced 147% surge in QR code phishing, 125% increase in CAPTCHA-gated attacks, and 175% jump in HTML-in-attachment delivery—all techniques designed to evade inspection. Abnormal AI's analysis of 800,000+ attacks across 4,600 organisations revealed that phishing tactics adapt to organisation size and workflow: small organisations face basic redirects (26.6%) while enterprises face sophisticated link shorteners (10.2%+) and file-sharing impersonation (12.4%). The tactics cluster precisely where defenses are weakest.

Real-world deployments validate vendor maturity but expose operational constraints. Shinhan Financial Group deployed real-time phishing detection across its banking group and prevented 800M won in customer losses within two weeks—concrete evidence that detection at scale works when properly tuned. Yet simultaneous evidence shows structural fragmentation limiting effectiveness: independent incident response data places phishing at only 17% of initial access (down from historical 30%+), as attackers pivot to vulnerability exploitation (38%)—a sign that email defenses have matured enough to force attacker adaptation. The phishing-as-a-service ecosystem, documented by Microsoft and Barracuda, industrialised attacks: 90% of campaigns now use PhaaS kits, with 3.4 billion AI phishing emails sent daily globally. Cofense metrics show a single piece of malicious content reaching new targets every 19 seconds. The constraint on effectiveness is now operational: only 17% of organisations deploy AI-powered defenses despite 82.6% of attacks containing AI. Practitioner readiness lags threat evolution—a fundamental tension that detection capability alone does not resolve.

TIER HISTORY

ResearchJan-2017 → Jan-2017
Bleeding EdgeJan-2017 → Jan-2018
Leading EdgeJan-2018 → Jan-2019
Good PracticeJan-2019 → present

EVIDENCE (150)

— Cofense Vision 3.2 uses clustering to identify polymorphic campaigns, Triage 3.0 routes automated responses; campaign creation compressed from hours to minutes with AI integration.

— Aggregated 89 verified statistics from 26 publishers (IBM, CrowdStrike, Microsoft, ENISA, KnowBe4, Mandiant): AI phishing 54% CTR vs 12% human (4.5x gap); 82.6% of phishing emails contain AI; initial-access time collapsed 8+ hours to 22 seconds.

— 3.1B email telemetry: 1 in 3 emails malicious/spam; 48% of malicious activity is phishing; 34% of companies experience monthly account takeover; 90% of high-volume campaigns use phishing-as-a-service kits.

— 3.4B daily AI phishing emails at 82.6% prevalence; 54% click-through rate vs 12% human; 47.3% bypass rate of Proofpoint/Mimecast/Google filters; 192x acceleration in attack generation time with GenAI.

— AI-powered agents for Red Teaming (attack simulation), Phishing SOC (forensics in minutes), and Phishing Simulation (hyper-personalized training); addresses operational gaps in defense at machine speed.

— Named Korean financial conglomerate deployed real-time phishing detection across group companies; in 2 weeks prevented 800M won customer asset damage, analyzing 1,111 suspected transactions with 41 confirmed phishing attempts.

— Mandiant 15-year incident dataset shows structural shift: vulnerability exploitation (38%) now exceeds phishing (17%) as primary initial access; signals maturation of phishing defenses forcing attacker pivot.

— KnowBe4 six-month analysis: 86% of phishing AI-driven; calendar phishing +49%, Teams attacks +41%, reverse proxies +139%; multi-channel orchestration replacing email-only tactics.

HISTORY

  • 2017: Phishing detection established as mature research discipline with widespread organizational awareness but selective AI-based defense adoption. Major vendor launches (Sentinel, Triage expansion) and documented deployments reducing susceptibility from 28% to under 10%; however, 64% of organizations lacked third-party solutions despite high threat volume and sophistication in campaigns like FreeMilk.
  • 2018: Vendor market consolidation and scale-up with Barracuda reaching 50,000+ customers (232% YoY Essentials growth) and Cofense's $400M acquisition by private equity, backing 10M+ workstation deployments. Enterprise validation through Fortune 500 testing showed Barracuda Sentinel outperforming Microsoft ATP by 621 missed attacks in side-by-side trial. Adversarial AI research (DeepPhish) demonstrated evasion capabilities accelerating in parallel with defense (0.69%→20.90% evasion rates), and real-world incidents at security-aware organizations (FS-ISAC phishing spread) revealed persistent human-factor vulnerabilities despite technical maturity.
  • 2019: Market consolidation and analyst validation with Cofense and Barracuda earning Gartner and Forrester recognition. USENIX Security 2019 research documented lateral phishing incidents across 92 organizations with 87.3% detection rates; separate Barracuda research showed cloud infrastructure (AWS, Azure) as phishing origin sources with deployed classifiers improving detection 3-5%. Global deployment expansion visible with Cofense entering Japanese market via managed services. Check Point analysis flagged detection gaps in cloud email platforms (Office 365, Gmail), highlighting architectural tensions as enterprises migrated.
  • 2020: Threat landscape intensity increased sharply with mobile phishing attacks rising 328% in Q3 while email gateways matured. Research methodologies advanced (NIST Phish Scale standardized training evaluation; comprehensive AI detection survey published). Vendor maturity demonstrated through international expansion and industry awards (Barracuda SC Awards for AI/ML in email security). However, critical vulnerabilities exposed limitations: Proofpoint URLDefense sandbox bypass (770+ character URLs) revealed gaps in production detection tools. Deployment infrastructure challenges persisted with tension between legacy email gateways and cloud-native solutions (Office 365, Gmail) as attack vectors diversified.
  • 2021: Market solidification continued with major platform GAs: Microsoft Attack Simulation Training launched integrated into Defender for Office 365; Barracuda released three new Email Protection plans validated by SE Labs as best in class; new entrants like Phished and dPhish provided alternative approaches to simulation and detection. Real-world deployments confirmed practice maturity with manufacturing and enterprise cases showing 30-50% email reduction and strong adoption metrics. However, attack success remained high: Proofpoint data showed 57% of organizations experienced successful phishing in 2020 with 34% paying follow-up ransoms, and CVE-2021-31608 revealed a URL bypass vulnerability in Proofpoint itself. Cross-customer threat intelligence sharing (demonstrated at Black Hat via Cofense) emerged as an emerging mitigation pattern, but detection limitations persisted.
  • 2022-H1: Vendor ecosystem expanded with new entrants (NVIDIA Morpheus with 99.68% accuracy) while established players consolidated. Threat volume accelerated: phishing attacks grew 29% globally to 873.9M annually with 400% surge in retail/wholesale. Real-world deployments (ACCO Brands with 6,000 users, Kappa Data) showed continued adoption and marginal improvements in awareness and team efficiency. Research advances: evasion-resistant detection models (Anti-SubtlePhish) achieved 98.8% accuracy but training effectiveness studies revealed fundamental limits—training alone insufficient to prevent user susceptibility, signaling maturity plateau where technical gains face persistent organizational barriers.
  • 2022-H2: Proofpoint's Supernova behavioral engine demonstrated large-scale efficacy, blocking 19M BEC/phishing attacks monthly and preventing a $194M theft among select customers. Training improvements measurable: KnowBe4 benchmarking 9.5M users showed phishing click rates dropping from 32.4% baseline to 5% after 12 months training. Research on AI-generated phishing and psychological trait scoring advanced detection techniques. However, critical incident exposed vulnerability: September 2022 Barracuda email security gateway outage caused global email delays, revealing infrastructure reliability concerns despite vendor maturity. Practice showed technical progress alongside operational and human-factor bottlenecks.
  • 2023-H1: Cloud-native ML pipelines accelerated deployment speed (Barracuda on Databricks blocking tens of thousands daily); Check Point's Zero Phishing GA claimed 4x zero-day detection. Research identified AI-generated phishing (71% undetected) and novel attacker tactics (11-15% of orgs hit). Analyst validation continued (Forrester Wave, Gartner Market Guide), but emerging threat sophistication—especially adversary-generated content—revealed structural limitations in purely technical defenses. Tension between detection capability advancement and threat evolution remained unresolved.
  • 2023-H2: Vendors expanded capabilities (Cofense vishing service, Proofpoint AWS Marketplace integration, Barracuda 950B event analysis across customers) and analyst recognition held. However, AI-driven threat acceleration became undeniable: 1,265% increase in malicious phishing since ChatGPT, 31,000 daily attacks. Detection systems degraded year-over-year: Microsoft Defender missed 25% more phishing, secure email gateways missed 29% more in 2023 vs 2022. IBM study showed ChatGPT-generated emails matched human-crafted campaigns in click effectiveness. 71% of AI-generated attacks evaded production detection. Practice reached inflection point where threat evolution outpaced defense advancement.
  • 2024-Q1: Vendor scale continued (Barracuda Sentinel ecosystem integration) and research advanced with IEEE Access study documenting GPT-4 phishing at 30-44% CTR and LLM detection trade-offs. However, production deployment fragility emerged: Proofpoint Attachment Defense outage at major university left emails unscanned; Cofense metrics showed SEGs missing 30-50% of threats with malicious bypasses increasing 100%+ YoY. Offensive AI tooling adoption accelerated (WormGPT, FraudGPT) with deepfakes enabling $25M attacks. Practice demonstrated sustained technical advancement masked by widening detection gaps in production systems—commodity AI tools now accessible to attackers, detection evasion techniques outpacing traditional ML defense models.
  • 2024-Q2: Vendor innovation accelerated with Proofpoint GA of LLM-based pre-delivery detection (NexusAI) and Adaptive Email Security platform updates; Barracuda continued ML pipeline scaling blocking tens of thousands daily. Threat landscape intensified: Zscaler documented 60% YoY increase in AI-driven attacks across 2B blocked transactions; BEC attacks grew to 10.6% of social engineering vectors with 70% surge in conversation hijacking. Research showed detection capability maturity (NTT ChatSpamDetector 99.70% accuracy) alongside robustness limitations (451k site evaluation revealed >93% false positive rate in visual detection). Practitioner overconfidence emerged: 96% of security professionals perceive GenAI threat yet 73% overestimate their deepfake detection ability, exposing perception-reality gap in organizational defenses.
  • 2024-Q3: ML research matured (274K-URL study: 97.52% accuracy; LLM-human framework: 80%+ effectiveness) while deployment dynamics shifted: Fortune 1000 manufacturer replaced Proofpoint with Abnormal AI citing 10x better detection and $876k savings, signaling vendor-neutral migration patterns. Threat acceleration continued: 40% of BEC attacks AI-generated; Microsoft 365 native security showed 47% phishing miss rate (70% for BEC), exposing platform dependency risks. Organizational investment surged: 75% of CISOs identified phishing as greatest AI-powered threat with 70% increasing budgets, yet 58% cited lack of expertise. Practice reached mature plateau where technical sophistication (detection accuracy near 97-99%) coexisted with widening real-world deployment gaps driven by mainstream platform limitations and accelerating attacker AI adoption.
  • 2024-Q4: LLM-based phishing research matured with frameworks improving detection robustness (PEEK raising training samples from 21.4% to 84.8%, boosting accuracy to 88%+) and adversarial approaches (PEN reducing attack success by 70%); human-subject studies validated AI-automated spear phishing at 54% CTR matching human experts, with AI detection exceeding 90% accuracy. Real-world deployments revealed critical gaps: Fortune 500 insurer detected 6,454 Proofpoint-missed attacks in three months, signaling that vendor market leadership masks persistent detection failures. Attacker adoption accelerated with 500K+ quishing campaigns in three months and LLM-generated emails becoming production threat; open-source detection reached 95-96% accuracy, democratizing defenses. Practice remained at inflection point: technical capability plateaued near theoretical maximums while threat sophistication and deployment fragility continued diverging, with attacker AI and evasion tactics outpacing vendor mitigation in mainstream platforms.
  • 2025-Q1: Vendor platform maturity deepened with Proofpoint Core Email Protection GA (99.99% threat block rate), Barracuda ML pipeline enhancements, and academic research advancing detection to 96.8% accuracy with reduced false positives. Channel expansion accelerated through Proofpoint-ConnectWise MSP integration enabling SMB deployment at scale. Threat landscape showed mixed signals: KnowBe4 reported 82.6% of phishing emails using AI with 76.4% polymorphic tactics and 17.3% volume increase; UC Berkeley warned of hyper-targeted AI-powered phishing becoming mainstream. Critical counter-signal emerged: Hoxhunt analysis from 2.5M users across 131+ countries found only 0.7-4.7% of phishing emails actually AI-generated, revealing hype-reality gap while human-crafted phishing remained dominant vector. Practice showed simultaneous technical advancement and threat acceleration with persistent deployment fragility in mainstream cloud platforms.
  • 2025-Q2: Attacker AI adoption accelerated with 51% of spam and 14% of BEC emails AI-generated by mid-year; threat volume surged with 70% YoY BEC increase and one malicious email every 42 seconds tracked by Cofense. Vendor platform capabilities matured: Barracuda launched multimodal AI sandbox with 3x detection power and 8x speed; Proofpoint and Cofense reported strong threat block metrics. However, real-world detection gaps persisted: global aerospace manufacturer deploying Abnormal alongside Proofpoint detected 3,232 missed attacks over three months ($5.8M exposure). Analyst perspectives highlighted fundamental tensions—AI-powered defenses advancing in capability, but plagued by false positives, privacy concerns, and organizational skill gaps limiting effective deployment. Practice showed highest evidence of simultaneous vendor capability advancement and attacker AI adoption with persistent deployment fragility and cost impact on real organizations.
  • 2025-Q3: Research consensus solidified with peer-reviewed systematic review confirming >99% accuracy for DL/Gen AI models (CNN, LSTM, TCN); controlled study (N=480) validated AI-generated training for user resilience without complex personalization. Market maturity accelerated: global phishing simulator market reached $113B with 7.2% CAGR; Proofpoint Prime deployments showed 237% ROI over three years. Vendor innovation continued with Barracuda multimodal AI analyzing text, images, URLs, and QR codes. However, deployment barriers persisted: practitioner feedback highlighted high costs, complex interfaces, and localization gaps in market-leading solutions, exposing organizational friction masking adoption metrics. Practice demonstrated maturity with technical capability and market validation coexisting alongside real deployment constraints limiting broader impact.
  • 2025-Q4: Research field maturity confirmed via peer-reviewed bibliometric analysis of 1,096+ documents showing decisive shift from ML to deep learning; attacker AI adoption (82.6% of phishing) and training effectiveness remained contested (54% CTR for AI phishing vs vendor claims of 86% ROI). Critical infrastructure vulnerability exposed: Proofpoint misconfiguration exploit enabled 3-14M spoofed emails daily. Healthcare sector phishing-triggered ransomware reached $10M+ recovery costs per incident. Ongoing enterprise adoption (Chicago Blackhawks) indicated continued platform deployment in vertical markets. Practice reached mature technical plateau (>99% accuracy in controlled research) coexisting with widening production deployment gaps, attacker AI acceleration, and quantified cost impact, signaling that technical sophistication and market size mask persistent organizational and operational vulnerabilities limiting real-world effectiveness.
  • 2026-Jan: Threat acceleration continued with 400% surge in successful AI-powered phishing scams in 2025. Barracuda threat research showed phishing kits doubled with 90% of high-volume campaigns using phishing-as-a-service, 48% incorporating MFA bypass and URL obfuscation tactics. Real-world deployments remained strong (Benchmark Electronics prevented 90% of incidents, Scalar achieved on-time email delivery), signaling continued platform adoption despite threat sophistication. Critical negative signal: Proofpoint service interruption on January 22 exposed reliability gaps in Microsoft 365 integration. Practitioner analysis predicted 90%+ of credential attacks will use sophisticated kits by end of 2026, with MFA no longer fail-safe. Practice sustained mature technical plateau coexisting with accelerating threat sophistication, organizational demand for advanced detection, and persistent platform reliability concerns limiting effectiveness in production environments.
  • 2026-Feb: Research validation of dual-use AI published (LLM-automated phishing 54% CTR vs human experts, AI detection 97.25% accuracy with zero false positives), confirming technical parity but highlighting organizational deployment bottlenecks. Threat acceleration continued sharply: Cofense reported AI-powered phishing doubled pace to one attack every 19 seconds, with polymorphic attacks (76% unique URLs) and conversational attacks (18% of malicious emails) becoming standard; cross-industry analysis showed phishing 83% of email threats with 80% AI-powered, collaboration attacks surging 12%→31% YoY. Vendor ecosystem expansion: Proofpoint integrated AWS Security Hub Extended (Nexus AI stack); NTT DATA deployed Proofpoint protecting 6.5M emails daily. Practice revealed structural gap: research-validated defensive capability (97%+ accuracy) exceeded organizational deployment speed and cost constraints in production, with traditional gateway defenses and pattern-matching filters remaining ineffective against polymorphic, AI-generated attacks. Maturity plateau confirmed with synchronized threat acceleration and growing real-world ineffectiveness in mainstream deployments.
  • 2026-Mar/Apr: Threat landscape documenting phishing-as-a-service ecosystem at scale: Microsoft Threat Intelligence exposed Tycoon2FA reaching 500K+ organizations monthly with MFA bypass, token interception, evasion infrastructure, and coordinated global takedown with Europol; Tycoon2FA accounts for 59% of adversary-in-the-middle phishing, with fake CAPTCHA attacks up 563% in 2025. Real-world attack analysis showed malicious actors appending benign content (157 average line breaks) to bypass NLP detection—evidence of attackers actively targeting and defeating AI defenses. CISA reported a 300% YoY increase in AI-powered phishing with 200+ organizations compromised in 30 days; Kaseya 2026 data shows 83% of phishing emails contain AI-generated content; Netcraft disrupted 1.3M phishing websites in 12 months while documenting a 37% increase in attacks. Microsoft Defender Security Research documented large-scale AI-enabled device code phishing (EvilToken PhaaS toolkit) with dynamic code generation and AI-personalized lures, representing escalation beyond password theft to auth token abuse. Hornetsecurity survey of 500 UK leaders found 57% cite AI phishing as primary worry with 50% uncertain they can defend against AI-powered attacks. Comprehensive threat statistics confirm: AI phishing achieves 54% click rates versus 12% for traditional phishing; phishing simulation market projected to reach $224B by 2034. Human-factor research confirmed critical constraint: UC San Diego Health study found annual training shows 1-2% improvement vs 10-30% real click rates; 75% complete training in <1 minute. Vendor platform maturity: Proofpoint announced agentic workspace security with unified SEG/API architecture and AI governance, with Nexus AI ensemble analyzing 3.4B emails deployed at 85 Fortune 100 companies. However, post-detection gap identified: MDR analysis revealed structural fragmentation across email/identity/endpoint/cloud layers allowing 29-minute average eCrime breakout. Practice sustained mature technical equilibrium (detection 97%+, platforms GA at scale, analyst validation) coexisting with widened real-world deployment gaps, accelerated attacker adoption of phishing-as-a-service, and documented human-factor limitations in operational resilience.
  • 2026-May: Threat acceleration reaches new measurable peaks with broadened operational evidence. KnowBe4 six-month analysis confirms 86% of attacks AI-driven with 7x efficiency over manual campaigns and documents multi-channel fragmentation: calendar phishing +49%, Teams attacks +41%, reverse proxy credential attacks +139%. Barracuda 2026 Email Threats Report (3.1B emails analyzed) shows 1 in 3 emails malicious, 48% phishing, 34% of organizations experiencing monthly account takeover, 90% of campaigns using phishing-as-a-service kits. UK government survey (612K+ organizations) confirms 38% phishing prevalence with 85% of breached orgs involving phishing in incident chain. Microsoft Defender Q1 2026 telemetry: 8.3B phishing blocked but QR phishing (+146%), CAPTCHA attacks (+125%), and HTML-in-attachment delivery (+175%) reveal detection gaps widening as attackers move evasion inside email. Aggregated statistics (89 verified datapoints across IBM, CrowdStrike, Microsoft, Mandiant) quantify the AI-driven acceleration: 54% CTR for AI phishing versus 12% human baseline, 47.3% bypass rate against leading filters, initial-access time collapsed from 8+ hours to 22 seconds. Vendor product innovation: IRONSCALES released three purpose-built AI agents at RSAC 2026 (Red Teaming, Phishing SOC forensics, Simulation); Cofense Vision 3.2 clusters polymorphic campaigns with minutes-to-deployment response. Deployment maturity validated: Shinhan Financial Group's real-time voice phishing system prevented 800M won customer damage in two weeks. Structural negative signal: Mandiant M-Trends 2026 shows vulnerability exploitation (38%) now exceeds phishing (17%) as initial access vector, indicating phishing defenses have matured enough to force attacker pivot away from email. Practice demonstrates simultaneous technical maturation, expanded multi-channel attack surface, and persistent organizational deployment lag (17% AI defenses vs 82.6% AI-driven attacks).

TOOLS