UAE's national cyber defense system blocked coordinated campaign involving network infiltration, ransomware deployment and phishing operations designed to destabilize essential services. The UAE Cyber Security Council announced Saturday that national cyber defenses successfully thwarted organized terrorist show more ...
cyberattacks targeting the country's digital infrastructure and vital sectors in coordinated operations designed to destabilize the nation and disrupt essential services. The attacks marked a qualitative shift in terrorist tactics through exploitation of artificial intelligence technologies to develop sophisticated offensive tools. The Council confirmed that attackers attempted network infiltration, deployment of ransomware and conducted systematic phishing campaigns targeting national platforms. The use of AI-powered attack tools represents an evolution in terrorist groups' technical capabilities, demonstrating how extremist organizations now harness advanced technologies previously associated with nation-state actors or cybercriminal syndicates. National cyber defense systems operating around the clock detected and blocked the threats before disruptions occurred. The Council said individual safety, personal data protection and continuity of critical services remain top priorities, with defenses maintained through cooperation between service providers, national and international entities, and specialized organizations leveraging strategic partnerships and advanced international technical expertise. The announcement provided limited specifics about which vital sectors faced targeting, the attacks' exact timing or the terrorist groups responsible. Officials stated the national cybersecurity system strengthens protection, accelerates recovery capabilities and enhances digital resilience but offered no technical details about detection methods, attack vectors or infrastructure targeted. The timing coincides with Ramadan's beginning, when charitable giving increases across the UAE and Muslim world. The Council urged residents to remain vigilant online and adopt safe practices when using digital platforms, particularly when making donations or sharing personal and financial information. [caption id="attachment_109735" align="aligncenter" width="400"] Image: UAE Cyber Security Council on LinkedIn[/caption] Cybercriminals traditionally exploit seasonal increases in online activity, making religious observance periods high-risk windows for fraud and social engineering attacks. Also read: UAE Cyber Security Council Warns Stolen Logins Fuel Majority of Financial Cyberattacks The Council shared guidance on protecting data and avoiding fraud, warning that attackers leverage increased digital transactions during Ramadan to harvest credentials and financial information. The seasonal advisory shows how threat actors adapt campaigns to cultural contexts, timing attacks when targets are most likely to lower defenses or trust unsolicited communications claiming charitable purposes. The UAE's announcement reflects broader regional cybersecurity concerns as Middle Eastern nations face persistent targeting from terrorist organizations, nation-state actors and financially motivated cybercriminals. Critical infrastructure including energy, telecommunications, transportation and financial services represents high-value targets where successful attacks could produce cascading failures affecting millions. The defensive success follows the Council's earlier warning that "over 90,000 to 200,000 breach attempts strike the UAE infrastructure every single day." The statistics hardline the escalating threat velocity as automation and artificial intelligence lower barriers to entry for less sophisticated actors while simultaneously enhancing capabilities of advanced persistent threats. Also read: UAE Cyber Security Council Flags 70% Smart Home Devices as Vulnerable The UAE has positioned itself among the first nations globally to implement comprehensive post-quantum cryptography strategies, anticipating threats from quantum computing's eventual ability to break current encryption standards. The government expanded cooperation with QuantumGate, the national platform specializing in quantum-resilient cybersecurity, focusing on enhancing anticipation and mitigation of quantum decryption risks before capabilities emerge. Dr. Mohammed Al Kuwaiti, Head of Cybersecurity for the UAE Government, previously stated the country's approach centers on anticipating threats rather than waiting for them to materialize. The proactive posture reflects recognition that defensive cybersecurity requires continuous evolution matching or exceeding adversary innovation cycles. The lack of attribution details in the announcement prevents assessment of whether attacks originated from established terrorist organizations, state-sponsored actors masquerading as terrorists or cybercriminal groups. The "terrorist" designation carries significant geopolitical implications but without evidence linking attacks to specific groups, independent verification remains impossible. However, the defensive success demonstrates the UAE's substantial investment in national cybersecurity infrastructure and international partnerships.
The attacks cost banks more than $20 million in losses last year, as criminals used many of the same tools and tactics they have wielded for more than a decade.
A Russian-speaking hacker used generative AI to compromise the FortiGate firewalls, targeting credentials and backups for possible follow-on ransomware attacks.
Russian cyberattacks targeting Ukraine’s energy infrastructure are increasingly focused on collecting intelligence to guide missile strikes rather than immediately disrupting operations, Ukrainian cybersecurity officials said.
Recent ransomware attacks targeting Romania’s critical infrastructure were likely part of a broader Russian hybrid operation aimed at undermining the country’s stability, Romania’s top cybersecurity official said.
A Russian-speaking threat actor used commercial generative artificial intelligence tools to help compromise more than 600 FortiGate firewall devices across more than 55 countries earlier this year, researchers have found.
Air Côte d'Ivoire did not respond to requests for comment but released a statement on Friday confirming reports that hackers had breached its systems on February 8. Last week, the INC ransomware gang claimed it stole 208 GB of data from the airline.
The Iranian hacking group known as MuddyWater (aka Earth Vetala, Mango Sandstorm, and MUDDYCOAST) has targeted several organizations and individuals mainly located across the Middle East and North Africa (MENA) region as part of a new campaign codenamed Operation Olalampo. The activity, first observed on January 26, 2026, has resulted in the deployment of new malware families that share
Security news rarely moves in a straight line. This week, it feels more like a series of sharp turns, some happening quietly in the background, others playing out in public view. The details are different, but the pressure points are familiar. Across devices, cloud services, research labs, and even everyday apps, the line between normal behavior and hidden risk keeps getting thinner. Tools
As more organizations run their own Large Language Models (LLMs), they are also deploying more internal services and Application Programming Interfaces (APIs) to support those models. Modern security risks are being introduced less from the models themselves and more from the infrastructure that serves, connects and automates the model. Each new LLM endpoint expands the attack surface, often in
Cybersecurity researchers have disclosed what they say is an active "Shai-Hulud-like" supply chain worm campaign that has leveraged a cluster of at least 19 malicious npm packages to enable credential harvesting and cryptocurrency key theft. The campaign has been codenamed SANDWORM_MODE by supply chain security company Socket. As with prior Shai-Hulud attack waves, the malicious code embedded
Cybersecurity researchers have disclosed details of a new cryptojacking campaign that uses pirated software bundles as lures to deploy a bespoke XMRig miner program on compromised hosts. "Analysis of the recovered dropper, persistence triggers, and mining payload reveals a sophisticated, multi-stage infection prioritizing maximum cryptocurrency mining hashrate, often destabilizing the victim
The Russia-linked state-sponsored threat actor tracked as APT28 has been attributed to a new campaign targeting specific entities in Western and Central Europe. The activity, per S2 Grupo's LAB52 threat intelligence team, was active between September 2025 and January 2026. It has been codenamed Operation MacroMaze. "The campaign relies on basic tooling and the exploitation of legitimate services