Shahnawaz Sheik

The Rise of AI-Powered Cyberattacks

AI Is Creating a New Cybersecurity Crisis and Most Companies Are Unprepared

Reading time: 5 minutes
Shahnawaz Sheik
5/12/2026
Shahnawaz Sheik

Over the past year, one thing has become very clear in conversations with clients across different industries:

Cybersecurity threats are evolving much faster than most organizations are adapting.

For years, businesses focused heavily on ransomware, malware, firewall protection, and endpoint security. Those risks still exist, but the nature of cyber threats is now changing significantly because of Artificial Intelligence.

The challenge today is no longer just about protecting systems.

It is about protecting trust.

Attackers are now using AI to create highly personalized and convincing attacks at a scale we have never seen before.

We are already seeing:

  • AI-generated phishing emails with almost perfect grammar and business context
  • Deepfake voice scams targeting finance and HR teams
  • Fake executive video calls
  • AI-assisted social engineering campaigns
  • Automated reconnaissance against organizations using public information
  • Faster vulnerability exploitation using AI-driven tools

A few years ago, employees could often identify phishing emails because something “felt wrong.”

  • There were spelling mistakes.
  • Poor formatting.
  • Suspicious wording.

That gap is disappearing rapidly.

Some AI-generated phishing messages today are more professional than genuine business communication.

This creates a serious problem for organizations because traditional awareness methods are no longer enough on their own.

In many organizations, cybersecurity investments are still heavily focused on technology controls while governance, user behavior, and AI risk management are receiving far less attention.

That imbalance is becoming dangerous.

One of the biggest concerns I currently see is the uncontrolled use of public AI tools inside organizations.

Employees are using AI platforms every day to:

  • summarize contracts,
  • analyze spreadsheets,
  • draft client responses,
  • review financial data,
  • generate reports,

and process internal business information.

In many cases, this is happening without proper governance, data classification, or management approval.

Most employees are trying to improve productivity, not create security incidents.

But sensitive information is increasingly being uploaded into external AI platforms without organizations fully understanding:

  • where the data is stored,
  • how long it is retained,
  • whether it is used for model training,
  • or what regulatory exposure may exist.

This is creating a new category of cyber and compliance risk that many companies are still underestimating.

From my perspective, cybersecurity in 2026 is becoming less about perimeter security and more about identity, behavior, governance, and resilience.

Organizations can no longer rely only on:

  • traditional firewalls,
  • antivirus solutions,
  • annual awareness training,
  • or reactive incident response.

The threat landscape is moving too quickly.

The organizations that will remain resilient are the ones building cybersecurity into business operations rather than treating it as an IT-only function.


A few areas where businesses should urgently focus their attention


Most organizations still do not have clear policies around employee use of AI tools.

Businesses should define:

  • which AI platforms are approved,
  • what type of data can be shared,
  • acceptable use cases,
  • retention requirements,
  • and approval processes.

Without governance, shadow AI usage will continue growing silently across departments.

Identity has become one of the most targeted attack surfaces.

Organizations should strengthen:

  • Multi-Factor Authentication (MFA),
  • Privileged Access Management (PAM),
  • least privilege access,
  • identity monitoring,
  • and conditional access controls.

Compromised identities are now involved in a large percentage of successful cyber incidents.

Traditional awareness programs are becoming outdated.

Employees now need training on:

  • AI-generated phishing,
  • deepfake scams,
  • business email compromise,
  • social engineering,
  • and safe use of AI platforms.

Awareness training should become continuous and scenario-based rather than yearly compliance exercises.

Many businesses have improved their internal security posture while overlooking vendor and supply chain exposure.

Organizations should regularly assess:

  • vendor cybersecurity maturity,
  • data-sharing practices,
  • cloud security controls,
  • and incident response capabilities.

A weak third party can become the entry point for a major breach.

One issue I repeatedly observe is that many organizations have incident response documents that look good on paper but are not operationally tested.

Cyber incidents are no longer a question of “if.”

They are a question of “when.”

Organizations should regularly conduct:

  • tabletop exercises,
  • ransomware simulations,
  • business continuity testing,
  • and executive crisis response drills.

Response speed often determines the scale of business impact.

Another major shift happening right now is the increasing overlap between cybersecurity, regulatory compliance, and corporate governance.

Boards and executive management are now being held more accountable for cyber resilience.

A few years ago, cybersecurity was largely seen as an IT responsibility.

Today, a serious cyber incident can disrupt operations, impact revenue, damage reputation, and create regulatory consequences which is why leadership teams are paying much closer attention than before. It is becoming:

  • a governance issue,
  • a business continuity issue,
  • a reputational issue,
  • and increasingly a regulatory issue.

In many ways, the organizations that succeed over the next few years will not necessarily be the ones spending the most money on security technologies.

They will be the organizations that:

  • build strong cyber culture,
  • improve governance maturity,
  • integrate security into business decisions,
  • and create faster response capabilities.

AI is transforming productivity, operations, and innovation.

But it is also transforming the threat landscape faster than many organizations realize.

The businesses that adapt early will be in a much stronger position to manage future cyber risks.

The ones that delay may find themselves reacting to incidents they were never operationally prepared for.

Author is Director, Cyber Threat Management at Crowe UAE and can be reached at [email protected] or call +971 52 373 4662

 

Cyber Shield

Welcome to Cyber Shield Tuesday - your weekly pulse on the evolving world of Cyber Threat Management.

Stay ahead of emerging threats, vulnerabilities, and defense strategies with expert insights tailored for today’s digital risk landscape. Because in Cybersecurity, being informed is your first line of defense.

Detect. Defend. Recover.
Dawn Thomas
Dawn Thomas
Senior Partner - Governance Risk & Compliance
shahnawaz.sheik@crowe.ae
Shahnawaz Sheik
Director – Cyber Threat Management