The beginning of 2026 marks a major turning point for cybersecurity in France. Within just a few weeks, large-scale attacks struck key sectors — healthcare, public finances, postal services, and sports federations — exposing the data of tens of millions of citizens and disrupting essential services.
•22 December 2025 – 5 January 2026: La Poste and Banque Postale – Unprecedented DDoS attack rendering services inaccessible
•January 2026: OFII (French Immigration Office) – Exfiltration of 2.1 million rows of personal data via a compromised subcontractor
•January 2026: Urssaf – Fraudulent access potentially affecting 12 million employees through compromised partner credentials
•Late January 2026: FICOBA file (Bercy) – Illegitimate consultation of 1.2 million bank accounts through impersonation of a civil servant's credentials
•February 2026: Cegedim Santé – Breach of the MLM medical software exposing 15 million patient records, including 169,000 sensitive medical files
•December 2025 – March 2026: French sports federations – Systemic wave (tennis, gymnastics, swimming, sailing, golf, athletics)
90M+ French accounts compromised in January 2026 alone (based on certain estimates
1,366 security incidents handled by ANSSI in 2025
200+ days average detection delay for an intrusion in certain sectors (source: IBM Cost of a Data Breach)
24 hours maximum initial notification deadline imposed by the NIS 2 Directive
The conclusion is unambiguous: recent attacks no longer rely on known signatures. They leverage legitimate tools and protocols (living-off-the-land), exploit software supply chains, and use credential stuffing. Traditional signature-based detection models can no longer identify them effectively.
• Recent attacks no longer rely on known signatures
• They leverage legitimate tools and protocols
• Traditional detection models can no longer identify them effectively
A large number of NDR (Network Detection and Response) solutions rely on open-source detection engines such as Suricata. While using a proven tool may seem reassuring, it carries three structural limitations that explain why these solutions failed in the face of 2026 cyberattacks.
Suricata detection rules are publicly available, widely reused across vendors. The detection baseline therefore remains fundamentally identical from one vendor to the next. Attackers systematically test their offensive tools against these rules before any operational deployment.
What is a signature in cybersecurity?
A signature is a rule used to identify a known pattern in network traffic. By definition, it cannot detect novel attacks (zero-day).
This detection model is, by nature, reactive: it can only identify what has already been observed and categorised.
Suricata applies thousands of signatures to every packet transiting the network. As throughput increases, this approach can become a significant bottleneck, requiring costly hardware infrastructure in a context of exponential network traffic growth.
Faced with the obsolescence of signatures, next-generation NDR solutions adopt a radically different approach: AI-driven behavioural detection. Jizô AI is among them.
Jizô AI is an advanced observability platform whose detection architecture is entirely proprietary. It was designed from the outset to transcend the inherent limitations of the signature-based model.
Unlike signatures that search for known patterns, behavioural detection continuously models the normality of each infrastructure to detect any significant deviation — including zero-day attacks invisible to signature-based approaches.
Anomalous behaviour is defined as a deviation from the local norm, regardless of the industry, geography, or size of the organisation. This approach enables the detection of zero-day attacks that signatures cannot identify.
Detection covers the entire attack chain: reconnaissance, lateral movement, C2, exfiltration, and OT/ICS impact — leveraging the MITRE ATT&CK IT and ICS frameworks.
Jizô AI covers IT infrastructure, OT/ICS environments (Modbus, S7comm, OPC UA, DNP3, PROFINET, BACnet, etc.) and hybrid clouds (AWS, Azure, GCP) via native integration, providing enriched visibility into network flows.
• Detection: developed entirely in-house, without any open-source engine or shared signature base.
• Jizô Advisor (AI-powered investigation assistant): no client data is transmitted to third parties.
• Threat intelligence (CTI): delivered by the dedicated HOSHI research team.
• Native compliance with the NIS 2 Directive and the French Cyber Framework (ReCyF) by ANSSI.
CyF) de l'ANSSI
From the outset, we made a choice that raised eyebrows: not to integrate Suricata. Everyone told us it was a risk. But the real question is: what risk do you take when you detect exactly the same things as everyone else, with rules that attackers can know by heart? We chose to invest in our own models. It takes longer, it demands more, but it is the only path to offering detection that an attacker cannot anticipate.
The table below summarises the fundamental differences between a conventional NDR solution based on Suricata and Jizô AI (behavioural NDR):
Three converging forces make behavioural NDR indispensable.
The threat is intensifying: ANSSI handled 1,366 incidents in 2025. AI is amplifying attacks (phishing, deepfakes) and signature-free techniques (supply chain, living-off-the-land) are multiplying, rendering traditional approaches obsolete.
Regulation demands it: NIS 2, currently being transposed through the Resilience Act (Loi Résilience), requires essential entities to maintain continuous monitoring and report incidents within 24 hours. The French Cyber Framework (ReCyF) by ANSSI (March 2026) specifies the expected measures, and several thousand French organisations are now in scope.
The State has made it a strategic priority: The French National Cybersecurity Strategy 2026–2030 (presented in January 2026) places technological sovereignty, proactive detection, and attack attribution at the heart of France's ambitions, a philosophy fully aligned with Jizô AI.
The 2026 cyberattack wave should not be treated as an anomaly. It is the foreseeable outcome of an ecosystem in which attackers innovate at a pace that static signature-based defences can no longer match.
Jizô AI embodies a paradigm shift: detection built on observing network behaviour, not on prior knowledge of the threat. With unified IT, OT, and cloud coverage, a fully proprietary artificial intelligence, and real-time operation up to 10 Gbps, the platform meets both the operational and regulatory requirements facing CISOs today.
• Signatures can no longer detect modern cyberattacks (zero-day, supply chain, living-off-the-land)
• AI-driven behavioural detection has become essential to identify deviations from the established baseline
• French regulatory requirements (NIS 2 Directive, ANSSI French Cyber Framework) reinforce this need
• MTTR can be reduced from several days to under one hour with a behavioural NDR solution