Press

Target Located

By Help AG

By 
In 1971, John Draper used a whistle, found in a cereal box, to reproduce a 2,600 Hz tone able to allow phreaks to make free calls – wire fraud was born. This was a man acting on no other motive than personal gain, but how the game has changed. Just last year, oil giant Saudi Aramco suffered a very serious and very public cyber attack, which floored 30,000 machines. This was a very sophisticated and organised act of cybercrime.
The growth of targeted attacks has been documented in the global press, but the severity is possibly understated. Last year, the former US defence secretary, Leon Panetta, said that a “cyber Pearl Harbour” could one day take place. Others have since stated that cyber warfare is as much a priority as physical acts of terrorism.
So serious is the risk that many government bodies are now recruiting the services of dedicated cyber-security officers to keep a full-time eye on assets.
“The cyber-threat landscape, now a complex tapestry encompassing a broad range of elements, has both public and private sector organisations in every industry sector on the hunt for tactical and strategic solutions that ensure protection of their critical assets,” says Dr. Mahir Nayfeh, Vice President, Booz Allen Hamilton, MENA.
And as Franz Erasmus, Practice Manager, Security Solutions, CA Technologies, says, the movement of the digital age has of course played into the hands of the hackers, given the increasing number of avenues they are capable of infiltrating.
“Organisations and states started realising how dependent and vulnerable they are with the en masse movement of even the most basic of government services to a computer-based structure,” he explains.
Rob McMillan, Research Director, Gartner, says the frequency of cyber-attacks has increased along with the complexity, which has caused serious issues for government entities.
“There has been an exponential increase in the frequency of cyber-attacks. The Y2K era saw a huge surge in viruses or trojans like ILOVEYOU, Anna Kournikova or CODE RED, which had major impacts in terms of disruption across the globe.  However, the attacks have not only increased in frequency but they have progressed from simple-unstructured to advanced-structured to complex-coordinated over the past few years. Hackers are often paid for causing sabotage and therefore their intentions and determination are undeterred,” he says.
Regionally, the Middle East has been at the height of some high profile attacks – whether acts of cyber-war or large government attacks, such as the Aramco story mentioned earlier. Nicolai Solling, Director of Technology Services, help AG, believes that the media plays a crucial role in addressing these attacks.
“Awareness has always been the key to efficiently combating cyber-crime and the media coverage of high-profile attacks across the Middle East over the last couple years has definitely caught the attention of IT departments. Because of this, one of the strong security trends in the region has been the increasing implementation of security standards such as the ADSIC initiative in Abu Dhabi and the ISO/IEC 27,001 certificates in the U.A.E. and other Gulf states,” he says.
However, the ways and means of addressing such breaches can still be improved, he says.
“What is often surprising and worrying, however, is that many organisations choose a reactive approach to security issues instead of actually addressing the problem through architecture and policy. A good example here is the issue of advanced malware or zero-day attacks – everyone knows that they are there, but only a few organisations proactively address the issue.”
Global red alert
“President Obama promised more cash for cyber-wars in the U.S. 2014 military budget. And the U.S.A. is not the only country who cares about the matter.”
It’s clear from this quote by Alexander Zarovsky, Head of International Business Development, InfoWatch, that targeted cyber-crime is now officially a top-level priority for the largest states and governments. Obama’s recent budget proposals suggest that although overall spending has been cut by $3.9 billion, cyber defence efforts have seen an $800 million boost, taking the budget to $4.7 billion.
Moreover, this action has been replicated more locally – and to an impressive standard.
“Both governments and enterprises are treating cyber-crime as a very serious issue. Here in the U.A.E., we have seen that the government has in the last year enacted two new security laws – (i) Law No. 5 of 2012 Concerning Combating Information Technology Crimes (Cyber-crimes Law) and (ii) Law No. 3 of 2012 on Establishing the National Electronic Security Authority (E-Security Authority Law) – that relate specifically to cyber-crime. In fact, the country has even ranked fourth internationally for cyber-security,” says Chris Moore, Regional Sales Director, Blue Coat.
He continues, “Although most of what has been reported in the last year has related to attacks on government and public sector organisations, there has been a lot of cyber-criminal activity targeted at enterprises. Of course, these figures are hard to come by given that no organisation would willingly and openly discuss vulnerabilities in its IT infrastructure. Still, there are ongoing discussions within the IT community and security is a topic that is definitely a top priority for IT decision makers.”
Defending complex attacks
The increasing sophistication of targeted attacks does call for a more focused and intelligent approach to defence. However, Miguel Barojos, Vice President of Sales, SEMEA, SafeNet, believes these defences are coming.
“The lack of physical barriers in the digital world makes it easy to replicate the attacks that happened in the U.K. one week to the Middle East the next one, but I believe that we will also see sophistication in the cyber-defence infrastructure being built in the future to overcome the threat,” he says.
Corey Nachreiner, Director of Security Strategy, WatchGuard, adds, “I believe there is much more awareness and interest in information and network security. Companies in that region are realising that firewalls alone are not going to prevent attacks, and that they need to invest in more technology and people to protect themselves from these cyber-risks. As a result, I believe the region is investing more in cyber-security, and I’ve seen more security companies and professionals start to develop in the Middle East.”
The argument between whether states are lacking behind in the cyber-war or not could and will rage on. Every time a major government entity is attacked or coverage of a large enterprise breach is publicised, the argument is going to resurrect.
It’s difficult to know exactly how far we are in our defences as the organised cyber-crime scene is a constant battle.
“We’re at the beginning of the road when it comes to stomping out these kinds of attacks, but the good news is that attackers are also at the beginning of their own road. Many cyber-espionage tools and kits are still to be developed, so governments should scrutinise even what seems to be a tiny piece of the network,” explains Catalin Cosoi, Chief Security Strategist, Bitdefender.
Getting owned
One highly attractive victim for hacktivists is of course security vendors themselves. This is an example of how sensitive the security threat landscape is. How publicly can a security vendor discuss a breach? Hacktivists are constantly pushing the boundaries, making it harder and harder for companies to defend themselves.
The future of cyber-crime may look bleak depending on what view you take. But it’s no secret now that governments and enterprises are fully aware of the severity of the situation. Whether or not enough budget will be granted or enough resources will be considered to properly combat this, it’s a waiting game.

More Sources

Help AG x Securonix Article Cover
News
TechAfrica News - Help AG Expands AI-Powered Cloud SOC Capabilities Through Renewed Partnership with Securonix

Help AG has expanded its partnership with Securonix to enhance its AI-driven Cloud SOC services in the UAE. The collaboration strengthens threat detection and automation, reinforcing Help AG’s market leadership recognized by IDC and Gartner.

The Quantum Leap
Press
The Quantum Leap - On the Ground at Black Hat MEA 2025 with Help AG & Sandbox AQ

Help AG and SandboxAQ are collaborating to prepare Saudi Arabia for the post-quantum era by strengthening cryptographic resilience. The partnership supports secure digital transformation and long-term cybersecurity readiness.

Nikola Kukoljacs Gulf News
Press
Gulf News - The Dubai trailblazer mindset for 2026: How to win beyond the rat race without burnout

Nikola Kukoljac, Vice President of Solution Architecture at Help AG, shares in an interview with Gulf News how reflection, micro-steps, and “controlled chaos” help him balance leadership and life. He emphasizes emotional clarity, realistic planning, and steady progress—proving that success doesn’t have to be a race, but a journey built on small, sustainable steps.

Cybersecurity Image
News
The Catalyst - Help AG leads the way in AI driven security solutions

In an interview with The Catalyst, Safwan Akram, Country Manager KSA highlighted Help AG’s role in strengthening Saudi Arabia’s cybersecurity landscape and supporting digital transformation. He emphasized innovation and proactive strategies to address evolving and AI-driven cyber threats.

Dr Aleksandar Valjarevic - Fast Company Middle East
Press
Fast Company Middle East - Dr Aleksandar Valjarevic Joins 25 Leaders on Creating Lasting Impact

Fast Company Middle East featured Dr Aleksandar Valjarevic, Acting CEO of Help AG, among 25 leaders shaping lasting impact across the region in 2025. He emphasized embedding cybersecurity into innovation, highlighting resilience, foresight, and trust as essential pillars for sustainable growth and long-term progress.

NextGen Cloud SOC
Press
Cyber Sentinels - Why Critical Infrastructure Protection Has Become A Global Imperative

Ahmad Ali, Principal OT & IoT Solution Architect at Help AG, emphasizes that protecting critical infrastructure is vital as growing digital interconnectivity increases exposure to cyber risks. He warns that nation-state actors, ransomware groups, and insider threats pose significant dangers, making proactive security essential to ensure resilience, continuity, and national security.

Download the Content

I’m interested in the solutions & services from?

(Choose all that apply)

Schedule a Consultation