Israel’s ‘Cyber Dome’ Defends Against Iranian Hackers

Israel’s Iron Dome defence system has long shielded it from incoming missiles and defend against incoming aerial attacks. Now, it is building a 'cyber dome' to defend against online attacks,  particularly from Iran.

The Israeli National Cyber Directorate’s head of international cooperation, Aviram Atzaba, said in an interview that this is a silent, invisible war and that while they are ” trying to hack everything they can,” so far “they have not succeeded in causing any real damage.” 

"It is a silent war, one which is not visible... For the past two years, we have been developing a cyber dome against cyberattacks, which functions like the Iron Dome against rockets." Atzaba said.

While Israel has fought Hamas in Gaza since October 7th, it has also been facing a significant increase in cyber attacks from Iran and its allies. According to Atzaba,  around 800 significant attacks targeting government organisations, the military, and civil infrastructures have been defeated. 

While Israel already has robust cyber defences, these consist of local, unconnected efforts and the directorate has been working to build a centralised, real-time system that works proactively to protect Israeli cyberspace.

Iran welcomed Hamas’s attack on Israel, and regional tensions have increased to unprecedented levels, particularly after Iran fired hundreds of missiles directly at Israel for the first time, in retaliation for a deadly Israeli air strike on the Iranian consulate in Damascus.

Former Israeli deputy national advisor,  Professor Chuck Freilich has described Iran is “an impressive enemy” with powerful offensive cyber capabilities. Freilich describes Iranian attacks as being intended not only to disable critical infrastructure, but also to collect data for intelligence and spread false information for propaganda purposes. Freilich considers that Iran's cyber capabilities are likely to improve with assistance from Russia and China, as well an emphasis on cyber training for students and soldiers, adding that the trend was “concerning for the future”.

Iran's investment in cyberwar capabilities was  prompted by the Stuxnet  attack in 2010 that inflicted physical damage on Iran's nuclear program. The Stuxnet was widely attributed to Israel in cooperation with the US. 

The Israeli system has various scanners that continuously monitor Israeli cyberspace for vulnerabilities and inform those at risk of the means to mitigate them. Israel’s cyber strength relies on close cooperation between the public, private and academic sectors, as well as Israel’s “white hat” hackers who help identify weaknesses.

“With cyber dome, all sources are fed into a large data pool that enables a view of the big picture and to invoke a national response in a comprehensive and coordinated manner.” according to Freilich. Of course, Israel is not the sole target of Iranian cyber attacks, with Iranian hackers also attacking US government and numerous private sector companies.  

I-HIS     |     France 24     |     Iran International     |     Hurriyet Daily News     |     Arab News     |     Khaleej Times   |

Iran International     |     CTech     |     Turkiye Newspaper     |     AFP

Image: Mohamed Nohassi

You Might Also Read: 

Iranian Hackers Targeted Israel’s Radar Systems:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Russia’s Malicious Cyber Activity Condemned
Notorious Cyber Criminal Sentenced »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

HireVergence

HireVergence

HireVergence is a full service IT staffing and recruiting firm with a focus on cyber and information security.

Tessian

Tessian

Tessian (formerly CheckRecipient) is a next-generation email security platform that helps enterprises counteract human error and significantly reduce the risk of data loss.

NextVision

NextVision

NextVision is a Cybersecurity and Technology company offering a range of solutions and services for Security, Compliance and IT Infrastructure Management.

Ledger

Ledger

Ledger is a leader in security and infrastructure solutions for cryptocurrencies and blockchain applications using its proprietary technology.

Identity Defined Security Alliance (IDSA)

Identity Defined Security Alliance (IDSA)

IDSA is a group of identity and security vendors, solution providers and practitioners that acts as an independent source of education and information on identity-centric security strategies.

CyCraft Technology Corp

CyCraft Technology Corp

CyCraft is an AI company that forges the future of cybersecurity resilience through autonomous systems and human-AI collaboration.

Cyber Security Courses

Cyber Security Courses

Cyber Security Courses was formed to help students in the UK find cyber security courses online.

TalaTek

TalaTek

TalaTek is a full-service risk management firm providing expert services in risk management, cybersecurity, and compliance.

SterlingRisk Programs

SterlingRisk Programs

SterlingRisk’s Cyber practice brings experience working with a wide array of clients across a broad spectrum of industries.

Corellium

Corellium

Corellium are dedicated to supporting our peers in the ARM community who seek to build more secure, performant, and accessible software and devices.

Pakistan Telecommunication Company Limited (PTCL)

Pakistan Telecommunication Company Limited (PTCL)

Pakistan Telecommunication Company Limited (PTCL) is the largest integrated Information Communication Technology (ICT) company of Pakistan.

Forta

Forta

Forta is a real-time detection network for security & operational monitoring of blockchain activity.

HADESS

HADESS

We are "Hadess", a group of cyber security experts and white hat hackers.

Corsearch

Corsearch

Combining AI-powered technology and decades of industry expertise, Corsearch is revolutionizing how companies establish and protect their brands.

Closed Door Security

Closed Door Security

Closed Door Security is the only cybersecurity team in the north of Scotland offering everything from IASME Certification to CREST-Accredited penetration testing.

Interlynk

Interlynk

Interlynk's #SBOM and # VEX-powered platform automates and continuously monitors first-party and vendor software supply chains and helps meet #FDA, #CRA, #GSA, and #DoD compliance obligations.