We received a lot of exciting news from the UAE over the past week. Criminals exposed information about Emirati citizens' brokerage accounts and Wizz Air Abu Dhabi, an airline. The Cyber Security Council has unveiled 5 pillars of the National Cybersecurity Strategy. What will be the point of UEA’s cybersecurity attention in the upcoming years? Let’s dive in!
A major data leak affected the UAE’s citizens. Criminals exfiltrated sensitive personal and financia data from an interactive brokerage platform. According to the news, information includes records about a wide range of accounts, with deposits ranging from $250 to over $100,000.
There is no official statement about the incidents. Preliminarily, the database contains fresh records starting from 2023. Leaked data includes:
Exposed data can be used for criminal activities such as fraud, identity theft, and financial exploitation. Financial records are particularly valuable to cybercriminals. 60% of data breaches in 2024 involved personal, financial, and medical information.
In addition, the news on another data breach in the UAE was published. Preliminarily, malicious actors exfiltrated 22 GB of confidential information from Wizz Air Abu Dhabi, a low-cost airline operator based in Abu Dhabi. The company has not made any official statements so far. Wizz Air operates in deep integration with the state-owned Abu Dhabi Development Holding.
It is known that sensitive data was put on sale on a darknet website. The dataset contained such information as:
The UAE has been becoming more and more valuable as a target for criminals in the last years. Some adversary groups are motivated by the prospects of financial gains, while others are ideologically driven hacktivists. Cyberattacks are ranging from massive DDoS attacks to sophisticated advanced persistent threats. The United Arab Emirates takes second place in terms of average data breach costs worldwide, with the expenses reaching $8.75 million, according to IBM’s Cost of a Data Breach report.
To address the challenges emerging from constantly evolving cyber landscape, the UAE Cyber Security Council developed the National Cybersecurity Strategy. The full text isn’t publicly available yet, however, the governmental officials disclosed the main points of the program. The strategy is based on five pillars, with each pillar containing a set of initiatives that support the achievement of end goals.
The UAE pays close attention to the cybersecurity issues. The government is forming legal frameworks to address upcoming challenges and investing in a long-term project. It is expected that in the future, both private entities and state structures will continue to work hard to secure reliable protection against cyberthreats.
Information security is one of the central cybersecurity elements because nowadays data is the key asset for any business or governmental body. It is impossible to ensure data security without the implementation of specialized software and the expertise of experienced professionals. To address these issues, we developed our Managed Security Service. MSS provides holistic data protection and prevention of internal threats, ranging from data leak & corporate fraud prevention to revelation of systematic idleness. On top of that, it enhances compliance with legal demands and assists compliance reporting.
SearchInform uses four types of cookies as described below. You can decide which categories of cookies you wish to accept to improve your experience on our website. To learn more about the cookies we use on our site, please read our Cookie Policy.
Always active. These cookies are essential to our website working effectively.
Cookies does not collect personal information. You can disable the cookie files
record
on the Internet Settings tab in your browser.
These cookies allow SearchInform to provide enhanced functionality and personalization, such as remembering the language you choose to interact with the website.
These cookies enable SearchInform to understand what information is the most valuable to you, so we can improve our services and website.
These cookies are created by other resources to allow our website to embed content from other websites, for example, images, ads, and text.
Please enable Functional Cookies
You have disabled the Functional Cookies.
To complete the form and get in touch with us, you need to enable Functional Cookies.
Otherwise the form cannot be sent to us.
Subscribe to our newsletter and receive a bright and useful tutorial Explaining Information Security in 4 steps!
Subscribe to our newsletter and receive case studies in comics!