Cybersecurity 2026

Last Updated March 17, 2026

UAE

Trends and Developments


Authors



Ankura Consulting Group LLC is an independent global expert services and advisory firm with more than 2,000 professionals across 35+ offices executing projects in more than 115 countries. The firm delivers solutions that combine deep local market knowledge with international scale. Ankura’s data & technology practice helps organisations harness the power of information through advanced analytics, artificial intelligence, and digital transformation. The firm provides innovative solutions for forensic investigations and regulatory matters when handling digital evidence and eDiscovery, while its visualisation platforms and predictive models enable faster, smarter decision-making. Ankura’s cybersecurity capabilities address the full spectrum of digital risk, from proactive services such as vulnerability assessments, penetration testing, and cloud security design to responsive measures including incident investigation, breach containment and recovery planning. By combining deep technical expertise, cross-border collaboration, and industry-specific insight, Ankura delivers practical, scalable and future-ready solutions that protect critical assets, ensure regulatory compliance and unlock the full value of data for clients.

Introduction: The Paradox of a “Role-Model” Nation

As the United Arab Emirates (UAE) accelerates its “We the UAE 2031” vision, focusing on social, economic, investment and development aspects, the nation finds itself at a pivotal moment in its digital transformation. In the domain of cybersecurity, 2025 has been a year in which the UAE has been globally praised, whilst the focus domestically has turned to addressing historic challenges.

On the global stage, the UAE has cemented its reputation as a cybersecurity superpower, achieving “role-modelling” tier 1 status in the United Nations International Telecommunication Union Global Cybersecurity Index 2024. This notable recognition reflects the UAE’s mature legal framework, robust technical measures, proactive government vision and a strategy that is outpacing many Western jurisdictions.

However, domestically, the UAE Cyber Security Council’s State of the UAE Cybersecurity Report 2025 provides insight into the complex challenges on the ground. The speed of the UAE’s digital transformation initiatives, characterised by rapid AI adoption, smart city integration, and significant cloud migration, has created a rapidly expanding attack surface. In parallel, while the nation builds cutting-edge digital infrastructure, it is concurrently battling a historic “digital debt”, with nearly 50% of exploited vulnerabilities in the country being more than five years old.

For general counsel and C-suite leaders operating in the Emirates, the outlook for 2026 is defined by a shift from “voluntary compliance” to “mandatory resilience”. The newly released UAE National Cyber Security Strategy (2025-2031) (NCSS) strongly signals the end of a more relaxed era for digital governance. It introduces a strict system of approvals, supplychain checks and industry specific rules that will significantly change an organisation’s legal duties.

This article provides an analysis of the UAE cyber landscape. It combines key global insights from major companies such as Microsoft, CrowdStrike, Mandiant and others with local data from the UAE Cyber Security Council, Help AG, Group-IB and CPX, offering a strategic roadmap to drive governance and build resilience in 2026.

The Global Context: “Shadow Agents” and the Speed of Breach

To put the specific risks facing the UAE into context, it is helpful to first understand the outlook for the global threat landscape. AI’s influence on the threat environment and the anticipated shift toward autonomous attacks dominate the 2026 global narrative.

The rise of “shadow agents”

In 2025, organisations were challenged by the rapid adoption of AI tools and the associated risk of employees sharing sensitive data with public chatbots, now termed “shadow AI”. As both technology and users have advanced, Google Cloud and SentinelOne predict that “shadow agents” may become a predominant risk in 2026.

Employees are no longer just asking chatbots questions; they are deploying autonomous AI agents to execute complex workflows such as:

  • “review the 50 contracts within this folder”;
  • “find all emails about payments to company X within my mailbox”; and
  • “where have I stored the latest financial proposal in my cloud storage?”.

These agents possess identities and permissions. When an employee grants an unvetted AI agent read/write access to a corporate repository, they create a persistent, automated insider threat. For UAE firms that are heavily invested in AI adoption, such access creates a new “non-human” identity risk that bypasses traditional data loss prevention (DLP) controls.

The speed of compromise: the “48-hour” patch race

Threat actors have become more agile, likely using AI-enabled tools. CrowdStrike’s 2025 Global Threat Report notes that the average time between an initial compromise and network movement has dropped to just 48 minutes. The need for an organisation to move swiftly when an attack is detected has never been greater.

SonicWall’s 2025 Cyber Threat Report adds a concerning dimension: 61% of hackers now exploit new vulnerabilities within 48 hours of public disclosure. If these vulnerabilities are not patched rapidly, an organisation is at significant risk within only two days.

This global speed stands in stark contrast to the local reality. With the UAE CSC reporting that 50% of UAE vulnerabilities are more than five years old, local organisations could be losing the race before it begins. Attackers do not need expensive zero-days when unpatched legacy systems remain exposed for years.

The trust deficit

Forrester predicts 2026 as the “year of reckoning” for trust, where deepfakes render standard biometric verification unreliable. In the UAE, where business is often conducted via voice and video calls, the ability to distinguish “human” from “synthetic” is becoming a legal and operational risk. These techniques have been used in past years to elicit bank transfers through pressure from a senior executive whose voice has been meticulously recreated using deepfake technology. That technology now extends to live video, where seeing is no longer believing.

The UAE Threat Landscape 2025: Anomalies and Escalations

While global trends set the tempo, the UAE’s threat landscape in 2025 displayed distinct, localised characteristics, driven by the region’s high concentration of wealth and rapid digitisation.

The DDoS explosion

Contrary to the global trend of gradual increases, the UAE experienced a hyperlocalised surge in attacks in 2024, followed by a reduction in 2025.

Help AG’s 2025 Report confirms that DDoS attacks in the UAE have surged to over 373,429 incidents at the end of 2024, a staggering 862% increase since 2019. More recently, in October, NetScout reported that the UAE experienced 3,477 attacks in the first half of 2025, with the average attack duration among the longest at just over 27 minutes.

The trends point to the evolution of DDoS attacks as a weaponised feature of the geopolitical landscape. Hacktivist groups and state-sponsored actors are increasingly using DDoS attacks to disrupt critical infrastructure, particularly the government, telecommunications, and financial sectors.

For legal teams, this redefines “operational resilience”. A DDoS attack is no longer a force majeure event; it is a foreseeable risk that requires extensive planning and a mitigation strategy. Many companies are now insisting that contracts with service providers include specific SLAs (service level agreements) for DDoS mitigation and recovery; general availability is no longer adequate.

Ransomware: the rise of the micro-affiliate

The global ransomware ecosystem is consolidating, but in the UAE, it is fragmenting. Group-IB’s High-Tech Crime Trends 2025 report notes a significant escalation in the region, with a 44% increase in underground recruitment efforts by ransomware affiliates targeting GCC countries.

This shift can be seen as dominance of “big game hunters” like LockBit3 has diluted (dropping from 31% to 16% market share). In their place, a swarm of smaller, agile, and aggressive groups like RansomHub, DarkVault and Everest has emerged. Everest, in particular, was the most active group in 2025, specialising in “double extortion” (encrypting data + threatening leaks).

This fragmentation complicates the legal response to extortion. Smaller groups are less predictable, often lack the “customer service” infrastructure of established cartels to facilitate decryption, and they may be less aware of US OFAC sanctions lists. This increases the legal risk for UAE companies considering ransom payments.

Identity and the deepfake phishing wave

The UAE has one of the highest smartphone penetration rates in the world, making it a testing ground for next-generation social engineering.

Kaspersky reported a 21.2% surge in phishing attacks in the UAE in Q2 2025 alone. It has been observed that these are not generic emails; they are AI-enhanced and tailored to the victim or environment. At a more sophisticated level of phishing, threat actors breach an environment, exfiltrate emails, and use them to gain insights and train AI models to develop an attack plan. These attacks are often sophisticated, multi-channel and use deepfake voice cloning to impersonate trusted entities or executive leadership.

Microsoft’s Digital Defence Report 2025 notes that 97% of identity attacks globally are password-based. In the UAE, the attack vector has shifted to bypassing multi-factor authentication (MFA) through “MFA fatigue” and token theft, facilitated by these AI-driven social engineering campaigns. Many of these attacks involve impersonating Microsoft 365 authentication, with users unknowingly providing their credentials and MFA tokens to an attacker on a spoofed website.

The business sabotage anomaly

Globally, Palo Alto’s Unit 42 found that 86% of major incidents now involve deliberate “business disruption” or sabotage.

In contrast, Microsoft data reveals that 52% of cyberattacks in the UAE are financially motivated (ransomware/extortion), the sabotage threat remains acute for critical infrastructure. Unlike financial firms, which face theft, if left unchecked, UAE energy and utility providers could face state-sponsored attackers targeting operational technology assets, mirroring global sabotage trends but with higher geopolitical stakes.

Comprehensive Regulatory Environment: 2025-2026 Legislative Updates

If the threat landscape is considered to be evolving, the regulatory landscape can be seen as having undergone a revolution. The UAE Cyber Security Council made significant progress in 2025 by introducing strict liability and consolidated oversight.

The Central Bank of the UAE Federal Decree-Law No 6 of 2025

Effective September 2025, this law represents a consolidated overhaul of the financial regulatory framework.

  • Expanded perimeter – The law expands the Central Bank of the UAE’s (CBUAE) supervisory perimeter to explicitly capture emerging technology firms conducting licensed financial activities (Fintechs, payment service providers, crypto-asset firms and others).
  • Mandatory fraud reporting – Article 149 establishes a statutory obligation to implement “robust fraud prevention and detection mechanisms.” Crucially, it mandates the prompt reporting of confirmed fraud and security breaches to the Central Bank, including fraud traditionally associated with technology, such as social engineering and identity theft.

Strict liability – The law enhances the CBUAE’s supervisory and enforcement capabilities, allowing for significant administrative penalties and, in severe cases of negligence regarding consumer funds, criminal liability for management.

DIFC Data Protection Amendment Law No 1 of 2025

Dubai International Financial Centre (DIFC) enacted this amendment in July 2025, and the law now aligns with the most aggressive aspects of GDPR enforcement.

  • Private right of action – The most notable change for general counsel to consider is that there is now a statutory right for individuals to sue for “financial loss and damage not involving financial loss, such as distress”. This creates an environment in which class-action-style litigation could follow a data breach, significantly increasing the financial risk profile of a cyber incident.
  • Processor liability – In the past, data processors (vendors) would build indemnity for themselves against regulatory fines into their contracts with data controllers. This is no longer the case: data processors are now directly liable for their own compliance failures and for acting outside the controller’s instructions.
  • Adequacy assessments – New requirements mandate that controllers must conduct and document a transfer impact assessment for high-risk processing activities even when transferring data to a jurisdiction considered “adequate”. This assessment should ensure that local surveillance laws do not undermine the actual level of protection.

Federal Decree-Law No 26 of 2025 (Child Digital Safety)

Drafted in 2025 and enacted in January 2026, this law imposes new cyber-safety obligations on digital platforms.

  • Content filtering – Internet service providers and digital platforms operating in the UAE are obligated to implement active content filtering mechanisms and age verification systems.
  • Compliance impact – For tech companies and social platforms, this requires deploying AI-driven content moderation tools and strict age-gating. Failure to comply attracts heavy fines.

Strategic Response: The National Cyber Security Strategy (2025-2031)

The UAE Government’s response to the hostile cybersecurity environment is the National Cyber Security Strategy (2025-2031) (NCSS). The strategy is structured around five pillars and shifts the UAE’s focus from “capacity building” to “active defence”.

Pillar 1: establishing highly effective and cohesive cybersecurity governance

This pillar aims to provide clarity, eliminate overlaps and promote collaboration among entities at the federal, sectoral, and emirate levels.

The rollout of the National Cyber Accreditation Programme (NCAP) during 2026 will begin to restrict the use of unaccredited cybersecurity service providers for critical information infrastructure (CII).

Organisations must audit their supply chain to ensure their managed security service provider (MSSP) and cloud vendors hold the necessary UAE accreditation.

Pillar 2: delivering a safe, secure and resilient digital environment

Focused on protecting the population and critical assets, this pillar emphasises resilience through coordinated technical capabilities.

The Secure Supply Chain Program, in line with global best practices, moves the UAE towards requiring Software Bill of Materials (SBOM) transparency for government procurement.

Middle East firms frequently cite third-party breaches as a top risk, and this initiative makes vendor risk management a compliance obligation.

The Cyber Pulse programme continues to empower the populace, having already trained 20,000 women in cybersecurity, a traditionally male field.

Pillar 3: enabling the rapid and secure adoption of innovation

To harness the potential of emerging technologies such as AI, this pillar focuses on mitigating the associated security and privacy risks.

Establishing a Quantum Secure Program to mitigate the wave of impending “harvest now, decrypt later” global threats. As quantum computing approaches and the potential for rapid decryption looms, the UAE is actively funding post-quantum cryptography (PQC) research to build resilient data protection.

Given the current pace of change and continued forward-looking approach, UAE authorities may issue guidance in 2026 requiring financial and government entities to produce a PQC migration roadmap.

Pillar 4: strengthening national digital and cyber capabilities

This pillar is dedicated to enhancing the UAE’s data, operational and technical maturity while fostering a vibrant local ecosystem.

  • A key initiative, the Cyber E71 programme, was established as a business incubator to nurture cyber startups and innovation in the UAE.
  • The Cyber Sniper initiative aims to upskill national talent and federal government personnel to address the latest security challenges.

Pillar 5: fostering national and international collaboration and partnerships

Recognising cybersecurity as a borderless challenge, this pillar emphasises engaging with strategic partners and scaling public-private partnerships.

The “Cyber Crystal Ball” platform is a unified AI-powered system for sharing relevant, timely, and actionable threat intelligence with trusted international partners and within the UAE ecosystem, to revolutionise real-time intelligence and combat ransomware.

The UAE assumes a global leadership role in forums such as the Counter Ransomware Initiative (CRI), underscoring its commitment to collective global action.

Sector-Specific Perspectives

Financial services and Web 4.0

Kaspersky’s 2025 Financial Threat Report notes a 35.7% increase in ransomware globally, with the Middle East specifically experiencing a 37% increase in spyware and a 26% increase in password stealers.

Check Point predicts a “tech tsunami” as AI, Quantum and Web 4.0 collide. As a global crypto hub, with Dubai’s Virtual Assets Regulatory Authority (VARA) and Abu Dhabi Global Markets (ADGM) actively enforcing regulations, UAE organisations will need to develop resilience against Web 4.0 threats such as smart contract exploits.

The CBUAE’s Recovery Planning Regulations place a strong focus on the operational resilience of financial sector entities. For these entities, it is no longer sufficient to prevent a breach; they must demonstrate the ability to recover critical services within strict recovery time objectives (RTOs) whilst under attack.

Energy & utilities

Mandiant identifies the Middle East as a tense region amid operations by the Iran-nexus threat actor. These operations focus on attacking targets of strategic and operational relevance, which include industrial control system (ICS) attacks.

The convergence of information technology and operational technology expands the attack surface, requiring even more rigorous integrity checks. The UAE’s CSC has developed a framework of security controls to ensure a unified cybersecurity approach across the UAE. Particularly relevant for energy & utilities, the information assurance standards (IAS) and framework must be implemented and audited, with potential fines for non-compliance.

Healthcare

CNBC previously reported that medical records are highly valuable, selling on the dark web for approximately USD60/record – much more than the price of an identity number or a credit card.

For the UAE (and many other nations), data sovereignty is paramount. Federal Law No 45 of 2021 (PDPL) establishes the requirements for localisation, transfer restrictions and security measures to support sovereign data objectives. Healthcare data is effectively “grounded” within the physical borders unless special provisions are arranged.

In a cyber breach at a healthcare institute, the most sensitive information in the country is placed in the hands of an unknown third party in an unknown jurisdiction, thereby impinging on the rights of data subjects.

Conclusion: The 2026 Action Plan

The UAE has successfully transitioned from a consumer of technology to a global innovator. However, the 2025 data shows that the adversary is evolving just as quickly, exploiting legacy gaps and leveraging AI to bypass traditional defences.

For the C-Suite and other strategic leaders, 2026 represents a shift in gears. Cybersecurity is no longer just about protecting data; it is about protecting the licence to operate.

Strategic recommendations for 2026

  • Conduct a legacy audit (immediate) – 50% of UAE exploits use vulnerabilities that are more than five years old, a stark contrast to the global “48-hour” exploit window. Organisations should mandate a specific audit of all assets older than three years and prioritise patching or air-gapping these systems to close the “digital debt.”
  • Enforce AI governance (Q1 2026) – “Shadow agents” and AI-driven data leaks are the top emerging risks for 2026. To address these, organisations should evaluate and deploy cloud access security broker (CASB) solutions to block unauthorised AI ingestion and establish a cross-functional AI board to govern the use of AI, including the deployment of “agentic AI.”
  • Localise data strategy (ongoing) – The PDPL, DIFC, and ADGM laws heighten liability for cross-border transfers. Organisations should review cloud contracts to ensure strict data residency requirements are in place and ensure that “adequacy assessments” for DIFC transfers are thoroughly documented and up to date.
  • Adopt phishing-resistant identity (Q2 2026) – Phishing attacks continue to surge, and AI voice clones are increasingly capable of defeating standard multi-factor authentication (MFA). To address this, privileged users such as administrators and the C-Suite should transition to passwordless protocols like FIDO2 Security Keys, which rely on biometrics or external hardware keys for authentication. This approach offers significantly stronger protection against the latest wave of AI-enabled phishing techniques compared to traditional MFA.
  • Prepare for private litigation – The DIFC Amendment Law No 1 allows claims for “distress,” making it essential for organisations to update their incident response plans (IRP) to include specific legal workflows for mitigating “non-financial damage” claims. Fast, transparent communication after a breach is now a critical legal defence strategy.

By implementing the strategic recommendations outlined above, specifically the urgent eradication of legacy digital debt and the governance of agentic AI, organisations can pivot from a reactive defence posture to a stable state of sovereign assurance. In doing so, they not only protect their own licences to operate under the new strict liability regimes of the CBUAE, DIFC and ADGM, but also actively contribute to the UAE’s ambition to become the world’s most secure digital economy.

Ankura Consulting Group LLC

Index Tower East
Unit 1701
Dubai International Financial Centre
Dubai, UAE

+971 5856 24020

Muthmainur.Rahman@ankura.com www.ankura.com
Author Business Card

Trends and Developments

Authors



Ankura Consulting Group LLC is an independent global expert services and advisory firm with more than 2,000 professionals across 35+ offices executing projects in more than 115 countries. The firm delivers solutions that combine deep local market knowledge with international scale. Ankura’s data & technology practice helps organisations harness the power of information through advanced analytics, artificial intelligence, and digital transformation. The firm provides innovative solutions for forensic investigations and regulatory matters when handling digital evidence and eDiscovery, while its visualisation platforms and predictive models enable faster, smarter decision-making. Ankura’s cybersecurity capabilities address the full spectrum of digital risk, from proactive services such as vulnerability assessments, penetration testing, and cloud security design to responsive measures including incident investigation, breach containment and recovery planning. By combining deep technical expertise, cross-border collaboration, and industry-specific insight, Ankura delivers practical, scalable and future-ready solutions that protect critical assets, ensure regulatory compliance and unlock the full value of data for clients.

Compare law and practice by selecting locations and topic(s)

{{searchBoxHeader}}

Select Topic(s)

loading ...
{{topic.title}}

Please select at least one chapter and one topic to use the compare functionality.