Nonstop Cyber Attack - Israel Builds Hack-Proof Defense

488x-1.png

Israel is the second most hacked country in the world. Here's what they're doing about it.

In 2013, Israel Electric Corp. registered several hundred potential hacks on its grid each hour. Last year, the figure grew to 20,000.

None succeeded. Israel Electric, which controls more than 80 percent of the country’s power production, has dramatically increased its cyber personnel, developed new defense tools and enhanced employee training, said Yosi Shneck, senior vice president of information and communications. The new protections reflect a nationwide effort to make Israel one of the most hack-proof countries in the world.

While attempted hack attacks on Israel reached 2 million a day during last year’s fighting in Gaza, the country has yet to report destructive events such as the theft of data from about 22 million people at the US Office of Personnel Management.
Hacking Call The threat is growing. Anonymous, a loosely connected global hacker collective, called in April for a hacking onslaught on the country. The Jewish state was the second most hacked country in the world after the US that month, according to monitoring website Hackmageddon.

Two Cables
Only two cables link Israel’s Internet network to the world, giving its companies an advantage on the digital battlefield, said Yaron Blachman, director of cyber and technology consulting at PricewaterhouseCoopers Israel. ‘‘They can just turn to their Internet service provider and disconnect,” he said.
Israel started building up its defenses more than a decade ago. In 2002, the government created the National Information Security Authority to protect critical infrastructure. In 2012 it established the National Cyber Bureau, an agency within the office of Prime Minister Benjamin Netanyahu that coordinates and advises on policy. The authority established this year will be responsible for protecting civilian entities such as banks, said Yitzhak Ben-Israel, who helped found it.

Flame Virus
Iran says Israel tried to sabotage its nuclear program with the Stuxnet virus. It also attributed the Flame virus, which wreaked havoc on Iranian computer systems in the energy sector, to “illegitimate regimes.” Israeli officials have declined to confirm or deny whether the country was involved.
Learning to fend off attacks can be profitable. Israel Electric formed a unit called CyberGym with security consulting firm CyberControl to offer companies around the world a simulated control center to practice protecting their networks.

Bank Protections
Attacks and attackers targeting the Israeli financial sector have increased and become more sophisticated, according to a May report by Cytegic and cyber consulting firm Konfidas. Lenders have largely been unsuccessful in reining them in, it said. The industry targeted most by hack attacks: information technology.

Information Management

 

« UK MPs are No longer Exempt from Surveillance
Darkcode Hacking Forum Forced Offline »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CIO

CIO

CIO provides technology and business leaders with insight and analysis on information technology trends

DataLocker

DataLocker

DataLocker offers both hardware based external storage and software based cloud storage encryption solutions.

Jetico

Jetico

Jetico provides pure & simple data protection software for all sensitive information throughout the lifecycle. Solutions include data encryption and secure data erasure.

SecurePay

SecurePay

SecurePay is Australia's premier payment gateway, with a range of secure online payment solutions for online retailers, SMEs and enterprise businesses.

IUCC Cyber Unit - Israel

IUCC Cyber Unit - Israel

IUCC Cyber Unit safeguards Israel’s National Research & Education Network (NREN).

Moxa

Moxa

Moxa is a leading provider of industrial networking, computing, and automation solutions for enabling the Industrial Internet of Things.

Protocol Labs

Protocol Labs

Protocol Labs is a research, development, and deployment institution for improving Internet technology.

Variti

Variti

Variti Intelligent Active Bot Protection technology — traffic analysis, detection and stopping of malicious bots in real-time and effective response to DDoS attacks.

INFRA Security & Vulnerability Scanner

INFRA Security & Vulnerability Scanner

INFRA is a powerful platform with an easy interface for any kind of Ethical Hacking, from corporate monitoring and VAPT (vulnerability assessments and penetration testing) to military intelligence.

ProofID

ProofID

ProofID is a specialist provider of Identity Access Management (IAM) solutions. We focus on the solving the complex needs of the modern enterprise.

Center for Infrastructure Assurance and Security (CIAS)

Center for Infrastructure Assurance and Security (CIAS)

CIAS is developing the world's foremost center for multidisciplinary education and development of operational capabilities in the areas of infrastructure assurance and security.

SightGain

SightGain

SightGain is the only integrated risk management solution focused on cybersecurity readiness using real-world attack simulations in your live environment.

Node4

Node4

Node4 provide advanced, cloud-led digital transformation solutions, delivered with technical expertise, innovation and exceptional service to drive your business forwards.

Core to Cloud

Core to Cloud

Core to Cloud provide consultancy and technical support for the planning and implementation of sustainable security strategies.

Camelot Secure

Camelot Secure

Camelot Secure Secure360 platform is a holistic redefinition of what world-class cybersecurity strategies can be. Prepare. Protect. Deploy.

Point3 Security

Point3 Security

Point3 Security is a premier information security organization that provides the industry with the talent screening and analytical tools to enhance its workforce.