When Your Data Is Under Siege: Cybersecurity and Artificial Intelligence in Times of Crisis
The battlefield is no longer confined to geographical borders; it has extended deep into digital networks and our personal devices. Amid regional tensions, citizens find themselves on the front lines—not with a weapon in hand, but with a phone in their pocket and an online bank account.
This shift reflects a qualitative change in the nature of cyber threats, which no longer target only technical infrastructure but also humans themselves as the most influential link. With the use of artificial intelligence to analyze behavior, simulate patterns, and create misleading content that is difficult to distinguish, the speed and accuracy of attacks have multiplied, and their scope has expanded to include individuals as well as institutions, creating challenges that go beyond technical breaches to undermine trust in the digital environment.
In the Kingdom of Bahrain, which is undergoing advanced digital transformation in the financial and government services sectors, this reality poses more complex security challenges where technical, behavioral, and economic dimensions intersect, necessitating the strengthening of national readiness and the establishment of an integrated system capable of proactive and effective response.
The Kingdom of Bahrain has witnessed a sharp rise in cyberattacks during periods of tension, with the rate of increase exceeding 800% in March 2026. These attacks ranged from denial-of-service attacks to ransomware attacks targeting institutional data. Paradoxically, the most targeted sectors were not military, but rather included banks, telecommunications companies, and government services—that is, the lifeblood of citizens’ daily lives.
Artificial intelligence has made an unprecedented impact on cybercrime, as phishing scams now rely on tools capable of mimicking human writing styles or imitating voices, making it more difficult to distinguish between what is real and what is fake. Deepfake technologies are also used for extortion and spreading misinformation, while cybersecurity systems rely on AI itself to detect and predict threats, making it a double-edged sword. The saying “don’t believe it until you see it” is no longer sufficient; rather, it is now more appropriate to say: “don’t believe it until you verify it” .
In times of crisis, fear becomes a tool in the hands of attackers, as current events are exploited to craft misleading messages that push individuals to make hasty decisions. For example, fears of power outages may be exploited through fake ads or fraudulent links targeting individuals in moments of anxiety, when verification takes a backseat to the pressure of need.
This escalation poses a direct threat to the security of personal data and the financial sector, especially with the spread of simple yet dangerous practices, such as using outdated devices or connecting to unsecured public networks. The attacks also highlight the importance of not relying on a single platform, the necessity of adopting business continuity plans, and the need to train staff on emergency response.
Conversely, the individual’s role remains central to strengthening cybersecurity through basic practices such as verifying the sender’s identity, using strong passwords, enabling two-factor authentication, and continuously updating systems.
It also highlights the importance of public awareness as the first line of defense, as different groups face varying levels of risk; children and some young people may encounter risks through apps and games, while older adults are more vulnerable to social engineering scams. This underscores the need to design targeted awareness programs that take these differing needs into account.
The Kingdom of Bahrain adopts an integrated approach to enhancing its cybersecurity through the National Cybersecurity Strategy 2025–2028, and by strengthening the role of the National Cyber Security Center, alongside developing human capabilities through specific initiatives, foremost among which is the Arab International Conference and Exhibition on Cyber Security (AICS), which serves as a platform for exchanging expertise and showcasing the latest practices, as well as opening up to international experiences by hosting and participating in advanced events, including interactive sessions and labs from DEF CON—one of the world’s most renowned and largest conferences on information security and ethical hacking—within the AICS exhibition. This enhances the readiness of national personnel and solidifies the Kingdom’s position as a leading regional hub in this field.
The Kingdom of Bahrain has demonstrated remarkable readiness in containing attacks and mitigating their effects, thereby setting an example in rapid response and building a cohesive defense system. Nevertheless, cybersecurity remains a shared responsibility, beginning with individual awareness and extending to the integration of national efforts.
In a world where geopolitical crises intersect with the digital realm, geographical distance is no longer sufficient for protection; rather, awareness and preparedness have become the first line of defense.
All rights reserved by the Bahrain Center for Strategic, International, and Energy Studies (Dirasat). No part of this study may be quoted without citing the source, nor may it be republished in print or electronically without the prior written consent of the Bahrain Center for Strategic, International, and Energy Studies (Dirasat).
The views expressed in this study are those of the author and do not necessarily reflect the views of the “Dirasat” Center.
Note: This article has been automatically translated, the full article is available in Arabic.
Dr. Omar Mohamed AlShaikh, Non-Resident Fellow