Iran and Saudi Marching To Cyber War!

iranian-saudi-cyber-conflict-5-alt.png

Iran and Saudi Arabia, regional rivals in the Middle East, may be engaged in cyber warfare, according to a new report by threat intelligence firm Recorded Future. http://http://ow.ly/SsGv9

 

As the two powers vie for influence over the civil wars in Yemen and Syria and regional dominance, Tehran and Riyadh have begun using cyber attacks to release critical intelligence.

 WikiLeaks released on June 19 over half a million cables from the Saudi Foreign Ministry, including several "Top Secret" reports from the country's General Intelligence Services after a hack by a group calling itself the Yemeni Cyber Army. Recently, the Washington Post  reported that the theft of the Saudi Cables bore indications of Iranian hackers. 
"These events fit a pattern that looks and smells like Iranian-proxy actors," said Jen Weedon, manager of threat intelligence at FireEye, a firm specializing in cyber-security. The incident "definitely resembles past activity we've seen by Iranian groups."

Some analysis’s have suggested that the civil war in Yemen is effectively a proxy-war between the two regional powers, with the predominately-Shiite Iran backing the Houthi rebels while the Sunni Saudi Arabia supports the current government.

In 2014, Iranian hackers began a cyber operation against 16 countries, including the United States, targeting government organizations for information, according to FoxNews.com. Iran has increased cyber-attacks since the US and Israel halted the Iranian nuclear program with a computer virus in 2010.
"There has been a long running rivalry between Iran and Saudi Arabia, the Saudis see us as an ally, the Iranians see us as an adversary, that's always placed limitations on what they could do to one another," said Christopher Griffin, executive director of the Foreign Policy Initiative.

But in recent years, increasing sectarian tension along with civil wars in the region has allowed for greater antagonism between the countries.
"It's been this low-key cyber volleying back and forth at each other. It now looks like someone got tired of this and said 'look I'm going to yank up this game' to a different level," said Ahlberg to FoxNews.com. "When we look at this and take apart this Yemen Cyber Army and really try to understand who they are. They look a lot like other Iranian actors."

Ein News:  http://bit.ly/1Kq7Zxd

 

« North Korean Leader Has His Own Cellular Network
Spy Agencies Go Recruiting on LinkedIn »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Packet Storm

Packet Storm

Packet Storm is an online resource for security tools, whitepapers, exploits, and advisories on computer security issues.

OneLogin

OneLogin

OneLogin simplifies identity management with secure, one-click access,for employees, customers and partners, through all device types, to all enterprise cloud and on-premise applications.

Fortify Experts

Fortify Experts

Fortify Experts is a search and recruitment firm specializing in Cyber Security.

WizNucleus

WizNucleus

WizNucleus develops, markets and supports a software platform (Cyberwiz-Pro) that enables Critical Infrastructure enterprises to ensure the future state of their cybersecurity and remain compliant.

Assured Enterprises

Assured Enterprises

Assured Enterprises provides comprehensive cyber risk identification, management and mitigation across all platforms.

Caveonix

Caveonix

Caveonix’s RiskForesight TM solution is an automated, proactive risk and compliance platform designed for hybrid and multi-cloud.

BigPanda

BigPanda

BigPanda is the first provider of Autonomous Operations solutions that empower IT Operations at large, complex enterprises.

Cyber Smart Defense

Cyber Smart Defense

Cyber Smart Defense is a specialist provider of penetration testing services and IT security audits.

Sababa Security

Sababa Security

Sababa Security is the first Italian innovation cyber security vendor, that provides security products, training, and managed services to protect diverse IT and OT environments.

HashiCorp

HashiCorp

At HashiCorp, we believe infrastructure enables innovation, and we are helping organizations to operate that infrastructure in the cloud.

Foresiet

Foresiet

Foresiet is the first platform to cover all of your digital risks, allowing enterprise to focus on the core business.

ThreatCaptain

ThreatCaptain

ThreatCaptain is a Cybersecurity Leadership Development Company driven to enhance and illuminate cybersecurity risk through strategic alignment and informed business decision-making.

NVISO Security

NVISO Security

NVISO is a pure-play cyber security consulting firm, focused mainly on the Financial Sector, the Technology Sector, and Government & Critical Infrastructure.

Interlynk

Interlynk

Interlynk's #SBOM and # VEX-powered platform automates and continuously monitors first-party and vendor software supply chains and helps meet #FDA, #CRA, #GSA, and #DoD compliance obligations.

WIIT Group

WIIT Group

WIIT Group are focused on a single goal: securing our clients’ critical processes and enabling them for digital transformation.

Dark Entry

Dark Entry

Dark Entry provide solutions to safeguard businesses, leveraging advanced technologies and intelligence-driven approaches to detect and mitigate risks associated with compromised data.