Introduction: The Paradox of a “Role-Model” Nation
As the United Arab Emirates (UAE) accelerates its “We the UAE 2031” vision, focusing on social, economic, investment and development aspects, the nation finds itself at a pivotal moment in its digital transformation. In the domain of cybersecurity, 2025 has been a year in which the UAE has been globally praised, whilst the focus domestically has turned to addressing historic challenges.
On the global stage, the UAE has cemented its reputation as a cybersecurity superpower, achieving “role-modelling” tier 1 status in the United Nations International Telecommunication Union Global Cybersecurity Index 2024. This notable recognition reflects the UAE’s mature legal framework, robust technical measures, proactive government vision and a strategy that is outpacing many Western jurisdictions.
However, domestically, the UAE Cyber Security Council’s State of the UAE Cybersecurity Report 2025 provides insight into the complex challenges on the ground. The speed of the UAE’s digital transformation initiatives, characterised by rapid AI adoption, smart city integration, and significant cloud migration, has created a rapidly expanding attack surface. In parallel, while the nation builds cutting-edge digital infrastructure, it is concurrently battling a historic “digital debt”, with nearly 50% of exploited vulnerabilities in the country being more than five years old.
For general counsel and C-suite leaders operating in the Emirates, the outlook for 2026 is defined by a shift from “voluntary compliance” to “mandatory resilience”. The newly released UAE National Cyber Security Strategy (2025-2031) (NCSS) strongly signals the end of a more relaxed era for digital governance. It introduces a strict system of approvals, supplychain checks and industry specific rules that will significantly change an organisation’s legal duties.
This article provides an analysis of the UAE cyber landscape. It combines key global insights from major companies such as Microsoft, CrowdStrike, Mandiant and others with local data from the UAE Cyber Security Council, Help AG, Group-IB and CPX, offering a strategic roadmap to drive governance and build resilience in 2026.
The Global Context: “Shadow Agents” and the Speed of Breach
To put the specific risks facing the UAE into context, it is helpful to first understand the outlook for the global threat landscape. AI’s influence on the threat environment and the anticipated shift toward autonomous attacks dominate the 2026 global narrative.
The rise of “shadow agents”
In 2025, organisations were challenged by the rapid adoption of AI tools and the associated risk of employees sharing sensitive data with public chatbots, now termed “shadow AI”. As both technology and users have advanced, Google Cloud and SentinelOne predict that “shadow agents” may become a predominant risk in 2026.
Employees are no longer just asking chatbots questions; they are deploying autonomous AI agents to execute complex workflows such as:
These agents possess identities and permissions. When an employee grants an unvetted AI agent read/write access to a corporate repository, they create a persistent, automated insider threat. For UAE firms that are heavily invested in AI adoption, such access creates a new “non-human” identity risk that bypasses traditional data loss prevention (DLP) controls.
The speed of compromise: the “48-hour” patch race
Threat actors have become more agile, likely using AI-enabled tools. CrowdStrike’s 2025 Global Threat Report notes that the average time between an initial compromise and network movement has dropped to just 48 minutes. The need for an organisation to move swiftly when an attack is detected has never been greater.
SonicWall’s 2025 Cyber Threat Report adds a concerning dimension: 61% of hackers now exploit new vulnerabilities within 48 hours of public disclosure. If these vulnerabilities are not patched rapidly, an organisation is at significant risk within only two days.
This global speed stands in stark contrast to the local reality. With the UAE CSC reporting that 50% of UAE vulnerabilities are more than five years old, local organisations could be losing the race before it begins. Attackers do not need expensive zero-days when unpatched legacy systems remain exposed for years.
The trust deficit
Forrester predicts 2026 as the “year of reckoning” for trust, where deepfakes render standard biometric verification unreliable. In the UAE, where business is often conducted via voice and video calls, the ability to distinguish “human” from “synthetic” is becoming a legal and operational risk. These techniques have been used in past years to elicit bank transfers through pressure from a senior executive whose voice has been meticulously recreated using deepfake technology. That technology now extends to live video, where seeing is no longer believing.
The UAE Threat Landscape 2025: Anomalies and Escalations
While global trends set the tempo, the UAE’s threat landscape in 2025 displayed distinct, localised characteristics, driven by the region’s high concentration of wealth and rapid digitisation.
The DDoS explosion
Contrary to the global trend of gradual increases, the UAE experienced a hyperlocalised surge in attacks in 2024, followed by a reduction in 2025.
Help AG’s 2025 Report confirms that DDoS attacks in the UAE have surged to over 373,429 incidents at the end of 2024, a staggering 862% increase since 2019. More recently, in October, NetScout reported that the UAE experienced 3,477 attacks in the first half of 2025, with the average attack duration among the longest at just over 27 minutes.
The trends point to the evolution of DDoS attacks as a weaponised feature of the geopolitical landscape. Hacktivist groups and state-sponsored actors are increasingly using DDoS attacks to disrupt critical infrastructure, particularly the government, telecommunications, and financial sectors.
For legal teams, this redefines “operational resilience”. A DDoS attack is no longer a force majeure event; it is a foreseeable risk that requires extensive planning and a mitigation strategy. Many companies are now insisting that contracts with service providers include specific SLAs (service level agreements) for DDoS mitigation and recovery; general availability is no longer adequate.
Ransomware: the rise of the micro-affiliate
The global ransomware ecosystem is consolidating, but in the UAE, it is fragmenting. Group-IB’s High-Tech Crime Trends 2025 report notes a significant escalation in the region, with a 44% increase in underground recruitment efforts by ransomware affiliates targeting GCC countries.
This shift can be seen as dominance of “big game hunters” like LockBit3 has diluted (dropping from 31% to 16% market share). In their place, a swarm of smaller, agile, and aggressive groups like RansomHub, DarkVault and Everest has emerged. Everest, in particular, was the most active group in 2025, specialising in “double extortion” (encrypting data + threatening leaks).
This fragmentation complicates the legal response to extortion. Smaller groups are less predictable, often lack the “customer service” infrastructure of established cartels to facilitate decryption, and they may be less aware of US OFAC sanctions lists. This increases the legal risk for UAE companies considering ransom payments.
Identity and the deepfake phishing wave
The UAE has one of the highest smartphone penetration rates in the world, making it a testing ground for next-generation social engineering.
Kaspersky reported a 21.2% surge in phishing attacks in the UAE in Q2 2025 alone. It has been observed that these are not generic emails; they are AI-enhanced and tailored to the victim or environment. At a more sophisticated level of phishing, threat actors breach an environment, exfiltrate emails, and use them to gain insights and train AI models to develop an attack plan. These attacks are often sophisticated, multi-channel and use deepfake voice cloning to impersonate trusted entities or executive leadership.
Microsoft’s Digital Defence Report 2025 notes that 97% of identity attacks globally are password-based. In the UAE, the attack vector has shifted to bypassing multi-factor authentication (MFA) through “MFA fatigue” and token theft, facilitated by these AI-driven social engineering campaigns. Many of these attacks involve impersonating Microsoft 365 authentication, with users unknowingly providing their credentials and MFA tokens to an attacker on a spoofed website.
The business sabotage anomaly
Globally, Palo Alto’s Unit 42 found that 86% of major incidents now involve deliberate “business disruption” or sabotage.
In contrast, Microsoft data reveals that 52% of cyberattacks in the UAE are financially motivated (ransomware/extortion), the sabotage threat remains acute for critical infrastructure. Unlike financial firms, which face theft, if left unchecked, UAE energy and utility providers could face state-sponsored attackers targeting operational technology assets, mirroring global sabotage trends but with higher geopolitical stakes.
Comprehensive Regulatory Environment: 2025-2026 Legislative Updates
If the threat landscape is considered to be evolving, the regulatory landscape can be seen as having undergone a revolution. The UAE Cyber Security Council made significant progress in 2025 by introducing strict liability and consolidated oversight.
The Central Bank of the UAE Federal Decree-Law No 6 of 2025
Effective September 2025, this law represents a consolidated overhaul of the financial regulatory framework.
Strict liability – The law enhances the CBUAE’s supervisory and enforcement capabilities, allowing for significant administrative penalties and, in severe cases of negligence regarding consumer funds, criminal liability for management.
DIFC Data Protection Amendment Law No 1 of 2025
Dubai International Financial Centre (DIFC) enacted this amendment in July 2025, and the law now aligns with the most aggressive aspects of GDPR enforcement.
Federal Decree-Law No 26 of 2025 (Child Digital Safety)
Drafted in 2025 and enacted in January 2026, this law imposes new cyber-safety obligations on digital platforms.
Strategic Response: The National Cyber Security Strategy (2025-2031)
The UAE Government’s response to the hostile cybersecurity environment is the National Cyber Security Strategy (2025-2031) (NCSS). The strategy is structured around five pillars and shifts the UAE’s focus from “capacity building” to “active defence”.
Pillar 1: establishing highly effective and cohesive cybersecurity governance
This pillar aims to provide clarity, eliminate overlaps and promote collaboration among entities at the federal, sectoral, and emirate levels.
The rollout of the National Cyber Accreditation Programme (NCAP) during 2026 will begin to restrict the use of unaccredited cybersecurity service providers for critical information infrastructure (CII).
Organisations must audit their supply chain to ensure their managed security service provider (MSSP) and cloud vendors hold the necessary UAE accreditation.
Pillar 2: delivering a safe, secure and resilient digital environment
Focused on protecting the population and critical assets, this pillar emphasises resilience through coordinated technical capabilities.
The Secure Supply Chain Program, in line with global best practices, moves the UAE towards requiring Software Bill of Materials (SBOM) transparency for government procurement.
Middle East firms frequently cite third-party breaches as a top risk, and this initiative makes vendor risk management a compliance obligation.
The Cyber Pulse programme continues to empower the populace, having already trained 20,000 women in cybersecurity, a traditionally male field.
Pillar 3: enabling the rapid and secure adoption of innovation
To harness the potential of emerging technologies such as AI, this pillar focuses on mitigating the associated security and privacy risks.
Establishing a Quantum Secure Program to mitigate the wave of impending “harvest now, decrypt later” global threats. As quantum computing approaches and the potential for rapid decryption looms, the UAE is actively funding post-quantum cryptography (PQC) research to build resilient data protection.
Given the current pace of change and continued forward-looking approach, UAE authorities may issue guidance in 2026 requiring financial and government entities to produce a PQC migration roadmap.
Pillar 4: strengthening national digital and cyber capabilities
This pillar is dedicated to enhancing the UAE’s data, operational and technical maturity while fostering a vibrant local ecosystem.
Pillar 5: fostering national and international collaboration and partnerships
Recognising cybersecurity as a borderless challenge, this pillar emphasises engaging with strategic partners and scaling public-private partnerships.
The “Cyber Crystal Ball” platform is a unified AI-powered system for sharing relevant, timely, and actionable threat intelligence with trusted international partners and within the UAE ecosystem, to revolutionise real-time intelligence and combat ransomware.
The UAE assumes a global leadership role in forums such as the Counter Ransomware Initiative (CRI), underscoring its commitment to collective global action.
Sector-Specific Perspectives
Financial services and Web 4.0
Kaspersky’s 2025 Financial Threat Report notes a 35.7% increase in ransomware globally, with the Middle East specifically experiencing a 37% increase in spyware and a 26% increase in password stealers.
Check Point predicts a “tech tsunami” as AI, Quantum and Web 4.0 collide. As a global crypto hub, with Dubai’s Virtual Assets Regulatory Authority (VARA) and Abu Dhabi Global Markets (ADGM) actively enforcing regulations, UAE organisations will need to develop resilience against Web 4.0 threats such as smart contract exploits.
The CBUAE’s Recovery Planning Regulations place a strong focus on the operational resilience of financial sector entities. For these entities, it is no longer sufficient to prevent a breach; they must demonstrate the ability to recover critical services within strict recovery time objectives (RTOs) whilst under attack.
Energy & utilities
Mandiant identifies the Middle East as a tense region amid operations by the Iran-nexus threat actor. These operations focus on attacking targets of strategic and operational relevance, which include industrial control system (ICS) attacks.
The convergence of information technology and operational technology expands the attack surface, requiring even more rigorous integrity checks. The UAE’s CSC has developed a framework of security controls to ensure a unified cybersecurity approach across the UAE. Particularly relevant for energy & utilities, the information assurance standards (IAS) and framework must be implemented and audited, with potential fines for non-compliance.
Healthcare
CNBC previously reported that medical records are highly valuable, selling on the dark web for approximately USD60/record – much more than the price of an identity number or a credit card.
For the UAE (and many other nations), data sovereignty is paramount. Federal Law No 45 of 2021 (PDPL) establishes the requirements for localisation, transfer restrictions and security measures to support sovereign data objectives. Healthcare data is effectively “grounded” within the physical borders unless special provisions are arranged.
In a cyber breach at a healthcare institute, the most sensitive information in the country is placed in the hands of an unknown third party in an unknown jurisdiction, thereby impinging on the rights of data subjects.
Conclusion: The 2026 Action Plan
The UAE has successfully transitioned from a consumer of technology to a global innovator. However, the 2025 data shows that the adversary is evolving just as quickly, exploiting legacy gaps and leveraging AI to bypass traditional defences.
For the C-Suite and other strategic leaders, 2026 represents a shift in gears. Cybersecurity is no longer just about protecting data; it is about protecting the licence to operate.
Strategic recommendations for 2026
By implementing the strategic recommendations outlined above, specifically the urgent eradication of legacy digital debt and the governance of agentic AI, organisations can pivot from a reactive defence posture to a stable state of sovereign assurance. In doing so, they not only protect their own licences to operate under the new strict liability regimes of the CBUAE, DIFC and ADGM, but also actively contribute to the UAE’s ambition to become the world’s most secure digital economy.
Index Tower East
Unit 1701
Dubai International Financial Centre
Dubai, UAE
+971 5856 24020
Muthmainur.Rahman@ankura.com www.ankura.com