UAE Issues Fresh Warning on AI-Backed Cyber Risks

The UAE Capital
5 Min Read

Officials warn that hackers are using deepfakes and advanced digital deception to target users.

The concern is not simply the number of attacks. It reflects how cyber threats are evolving.

The Abu Dhabi Emergency, Crisis and Disaster Management Centre has highlighted a clear escalation in cyber risk, with artificial intelligence now playing a central role in modern attack methods rather than serving as a supporting tool.

According to Mohammed Hamad Al Kuwaiti, hostile actors are using AI systems to design and execute attacks faster and on a greater scale.

As a result, cyberattacks are becoming increasingly automated, adaptive, and far more difficult to distinguish from legitimate communication.

The Main Risks

The guide highlights six primary threats that grow during instability: phishing, financial fraud, account breaches, malware, fake social accounts, AI-powered scams, and data leaks from untrusted platforms.

Each follows the same logic, exploiting confusion and urgency.

AI has made these attacks more convincing through cloned voices, realistic visuals, and highly personalised messaging.

Why Vulnerability Increases

Cyberattacks often exploit behaviour as much as technology.

During periods of instability, people rely more heavily on digital channels, make faster decisions, and spend less time verifying information.

That shift creates ideal conditions for manipulation. The key triggers are consistent: fear and uncertainty, rushed decision-making without checks, the rapid spread of misinformation, and increased dependence on unofficial sources. As judgment compresses, the likelihood of error rises.

Recognizing the Signals of Deception

Fraud patterns remain surprisingly consistent, even as attack methods grow more sophisticated.

Urgent requests for personal data or verification codes, suspicious links, unexpected demands for money, unrealistic offers, and login alerts from unfamiliar devices remain common warning signs. Voice or video messages requesting sensitive information should trigger immediate caution.

Language often reveals risk as well. An unusual tone, excessive formality, or subtle inconsistencies can expose deception. Even the most advanced digital manipulation tends to leave traces.

The Scale of the Threat

The numbers are direct. The United Arab Emirates is facing between 500,000 and 700,000 cyberattacks each day, many of them targeting critical sectors.

This points to highly coordinated activity, often linked to state-backed actors.

Artificial intelligence has amplified both scale and efficiency, enabling continuous attacks at lower operational cost.

Compared with earlier periods, the threat environment has evolved significantly—both in volume and sophistication.

A Layered Defense Model

The UAE Cybersecurity Council operates through a layered defence system designed for proactive protection.

Its framework combines zero-trust architecture, the National Cybersecurity Operations Center, real-time monitoring, intelligence analysis, disinformation tracking, national simulation exercises, and rapid threat-sharing mechanisms.

The system is built to anticipate rather than react.

Detection, response, and operational continuity function as an integrated structure, allowing threats to be identified and addressed before disruption can escalate.

The Human Variable

Technology may power the attack, but human behaviour often determines the outcome. Individuals remain the first line of defence.

That means avoiding unknown links, never sharing passwords or verification codes, enabling multi-factor authentication, using strong and unique passwords, and verifying information through trusted official sources.

In this environment, digital discipline is more than good practice. It is what reduces exposure.

Conclusion

Cybersecurity has entered a new phase. The threat is no longer limited to isolated breaches—it now involves intelligent, scalable deception.

Artificial intelligence has increased both the speed and credibility of cyberattacks, turning everyday digital interactions into potential points of risk.

The response is equally clear. Systems must remain vigilant, and individuals must act with greater precision.

Awareness is no longer optional. It has become part of the digital infrastructure.

Read more news and follow us on Instagram

Share This Article