Hackers Threaten To Attack Israel's Cyber Infrastructure

People associated with the Anonymous hackers' organisation are threatening to attack Israel's cyber infrastructure in April 7th.

This annual "tradition" began in April 2013, winning the name OpIsrahell. Operatives associating with Anonymous previously warned that they intended to "wipe Israel off the map of the Internet," but the damage actually caused by the annual attacks was negligible.

Are Israeli companies concerned about the attack announced for April 7 this year? A survey by the research department of "People and Computers" indicates that enterprises are taking the threat seriously, but that most of them are taking no special measures. The survey included 80 computing executives in large and medium-sized enterprises.

55% of the respondents said that they had made no special preparations for an Anonymous attack, while 45% said they took any threat seriously, and were bolstering security for their information systems. 43% of those questioned admitted that they had previously been victimised by a cyber-attack not related to, Anonymous. 

92% of those questioned said that the damage caused by the attack amounted to tens of thousands of shekels, while the rest estimated the damage in the hundreds of thousands of shekels.

Commenting on the findings, People and Computers group CEO Peli Hanamer Peled said, "The results of the survey of IT managers in Israel reflect an appropriate level of security among enterprises in general, not just for April 7. 

One of the reasons for this is the growing awareness of cyber threats on the part of enterprises, reflected in larger allocations of resources for IT managers for protecting the enterprise's information systems."

Globes

Hamas Upgrades Cyber Espionage Capability:

Cyber Threats To Israel’s Air Traffic Control:

Stuxnet, Secrecy & The New Era of Cyber War:

 

 

 

« Hong Kong’s 3.7 Million Voters Exposed in Massive Breach
Here Comes China’s Crypto-Currency »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

2|SEC Consulting (2-SEC)

2|SEC Consulting (2-SEC)

At 2|SEC Consulting, we deliver an end-to-end service of cyber and information security solutions which are tailored to each client’s exact security needs.

Lantronix

Lantronix

Lantronix is a global provider of secure data access and management solutions for Internet of Things (IoT) and information technology assets.

a1qa

a1qa

a1qa specializes in the delivery of full-cycle software QA and application testing services.

Insta Group

Insta Group

Insta are a trusted cyber security partner for security-critical companies and organizations.

Preempt Security

Preempt Security

The Preempt Platform delivers adaptive threat prevention that continuously preempts threats based on identity, behavior and risk.

Cybersec Infohub

Cybersec Infohub

Cybersec Infohub is a Hong Kong government programme to enhance the exchange of cyber security information with industry and enterprises to jointly defend against cyber attacks.

Beyond Identity

Beyond Identity

Beyond Identity employs an elegantly simple concept, the personal certificate authority and self signed certificates, to replace passwords.

Key Cyber Solutions

Key Cyber Solutions

Key Cyber is an IT consulting firm that specializes in agile software development services, program management and infrastructure services, cyber security and cloud and managed services.

Redwall Technologies

Redwall Technologies

Redwall provides cybersecurity expertise and technology to prevent and respond to emerging threats against mobile applications and connected infrastructures.

Towerwall

Towerwall

Towerwall offers a comprehensive suite of security services and solutions using best-of-breed tools and information security services.

MDSec

MDSec

MDSec is a consultancy with a passion for information security. Our consultants specialise in application, mobile and hardware security and targeted red team attacks.

Hawk AI

Hawk AI

Hawk AI’s mission is to help financial institutions detect financial crime more effectively and efficiently using AI to enhance rules and find anomalies.

CUBE3 AI

CUBE3 AI

CUBE3.AI is a web3 security platform that provides real-time transaction protection for smart contracts, safeguarding against cyber exploits, fraud, and compliance risks.

Custocy

Custocy

Custocy is a unique collaborative AI technology that identifies sophisticated and unknown (zero-day) attacks.

Heritage Cyber World

Heritage Cyber World

Heritage Cyber World is a one stop solution for all your security needs that brings together a team of security experts and analysts to deliver high-class security services.

Inoxoft

Inoxoft

Inoxoft delivers IT security consulting, assessment, and protection services to help businesses secure their infrastructure, applications, and sensitive data.