Help AG, the cybersecurity arm of e& enterprise and the region’s Managed Security Services Provider, unveiled its State of the Market Report 2025. The Help AG report explores how AI-driven attacks, data-centric threats, and quantum-readiness are reshaping enterprise and government security strategies across the GCC.
Distributed Denial-of-Service, DDoS cyberattacks in the UAE surged from 38,797 in 2019 to 373,429 in 2024 — a 862.45% increase, as observed by Help AG. The report reveals a sharp escalation not only in volume but also in sophistication, with attacks becoming more targeted and persistent.
In one instance, a single DDoS attack lasted more than 35 days in 2024. While volumetric attacks were fewer, the strategic focus on government and critical infrastructure is raising significant alarm across the cybersecurity community.
Speaking at the sidelines of the launch, Stephan Berner, Chief Executive Officer of Help AG, said: “We are witnessing a shift from cybersecurity to cyber autonomy where systems do not just defend, they decide. In a region driving the world’s most ambitious digital projects, automation alone is not enough. Autonomy, built on trust, intelligence, and sovereign infrastructure, is the new frontier.”
Nicolai Solling, Chief Technology Officer of Help AG, added: “Resilience in cybersecurity now means protecting the technologies shaping our future—AI, quantum computing, and the expanding digital ecosystem. At Help AG, we enable organisations to stay not only secure, but agile in the face of rapid innovation and growing complexity.”
Help AG’s report highlights the rise of Generative AI-powered phishing and impersonation attacks that are faster, stealthier, and harder to detect. Phishing remains the top threat vector, initiating 90% of incidents in 2024, while credential-based breaches participated in 45% of reported cases.
Ransomware has continued to evolve, with 66% of organisations in the GCC impacted and many facing double extortion tactics. The consequences are not just operational as 36% of companies that suffered breaches reported board or C-suite fallout.
The Help AG report highlights the concerning rate of data exfiltration attacks, which are becoming more sophisticated, using stealthy tools like collaboration apps and cloud storage to siphon information undetected. Attackers can quietly steal data, making breaches harder to trace and more damaging. This shift demands advanced monitoring and tighter controls on outbound traffic and third-party integrations.
In today’s world, cyber resilience defines competitive advantage. Help AG advocates investing in integrated backup, recovery, Digital Forensics and Incident Response, DFIR capabilities, and managed cyber defence services—ensuring organisations can contain, recover, and thrive after incidents, not just prevent them.
Help AG is calling on enterprises and government bodies to proactively adopt post-quantum cryptography, to protect long-life data assets against growing vulnerabilities.

With a year-on-year spike of 236% in Security-as-a-Service adoption, increased cloud misconfigurations, and evolving Operational Technology, Internet of Things, IoT threats, the Help AG report outlines a roadmap of priority investments.
Cybersecurity Consolidation
With complexity becoming a major risk, organisations are accelerating cybersecurity consolidation—favouring unified platforms that integrate detection, response, threat intelligence, and compliance. Help AG’s report shows a strong shift toward multi-year OPEX-driven models and managed security services, aligning investments to business outcomes.
Building Cyber Resilience
In today’s world, cyber resilience defines competitive advantage. Help AG advocates investing in integrated backup, recovery, Digital Forensics and Incident Response capabilities, and managed cyber defence services—ensuring organizations can contain, recover, and thrive after incidents, not just prevent them.
Securing AI Ecosystems
With Generative AI-driven threats escalating, organisations must secure their AI models, Application Programming Interfaces, APIs, and sensitive data pipelines. Help AG highlights the urgent need for securing both human and machine users across the full AI lifecycle, backed by robust governance, API protection, and Software-as-a-Service, SaaS observability.
Identity and Access Management
Strengthening IAM with adaptive authentication, behavioural monitoring, and advanced access controls is now foundational to defending critical assets.
Cloud Security Posture Management
Cloud misconfigurations and human error remain causes of breaches. Robust CSPM strategies help organisations proactively identify, prioritise, and remediate risks across multi-cloud environments, supporting secure, compliant growth.
AI-Powered Detection and Response
As cyberattacks grow more sophisticated, AI-driven solutions like User and Entity Behaviour Analytics, UEBA and Network Detection and Response, NDR are critical for real-time threat detection, insider risk management, and adaptive incident response.
Quantum-Readiness Assessment
While quantum computing threats are still emerging, Help AG stresses the need to act now. Organisations must assess crypto-inventories, prioritise migration planning, and integrate post-quantum security into long-term strategies to protect high-value assets.