White Hat To Combat Cyber-Attacks

Cyber threats on Israeli companies, organisations, and infrastructure grow daily. The Israeli National Cyber Security Authority has been concentrating its efforts to thwart this threat using sub-contractors, cyber companies that each one deals with the defense of a different critical sector. 

One of these companies is White Hat. The company’s CEO, Sharon Nimirovski, says hackers prefer to attack industrial installations through component suppliers and services providers, e.g. accountants and lawyers. The Tel-Aviv company, founded by an elite intelligence unit, supplies cybersecurity to private organisations and to nation states in the future.

“Our intelligence center monitors all sorts of threats and in all levels. We operate with this regard as a military elite unit for the prevention of cyber-attacks”, said the CEO in an interview to iHLS.

He added that currently, hackers are capable of inflicting damages in property and lives just as armies, using a variety of weapons. 

“Hackers can nowadays cause various faults to chemical industries which store large quantities of dangerous agents, thus causing widespread disasters.”

According to Nimirovski, Israel has been challenged by various threats due to the situation in the region and the conflicting forces. He said that threats have been growing from week to week, and each time the company’s experts meet new kinds of threats. “This invisible enemy is sophisticated and uses a wide variety of ways for causing damage.” He added that currently, private companies help the National Cyber Security Authority established by the Israeli government in the detection and prevention of evolving threats. 

“We were assigned to deal with a certain sector. Of course, I cannot reveal which one, however, this sector has a great potential for damages.”

The company CEO said that sometimes an evolving threat is detected but the problem is that it is not clear when and where it will be executed. 

“We are dealing with a realm where many things are not immediately clear, so an intelligence array has to be established in order to decrease uncertainty, which might be critical in this case.”He added that his team detects threats that are already in the “backyard” of the threatened customer. “Through the intelligence operations room, we are capable of alerting the customer that someone is about to attack him through a certain vulnerability.”

All this is executed, according to Nimirovski, by a complete system of attack simulations that expose the customer’s vulnerabilities in each of his online systems. 

“We do not sit and wait that something happens in order to learn lessons. Rather, we try to take preventive steps, as attacks in this field might be very painful and cause tremendous damage.”

Currently, White Hat operates a threat detection array called White Knight. This system is active in the social media, detecting threats even at the stage of planning. “The problem is the huge amounts of information. This is why our system is an advanced big data system that knows how to expose the relevant information.” For the purpose of social media activity, the company operates human intelligence, which is, in fact, technological means that pretend to be human-based intelligence.

“Each of our employees operates such kind-of-human agents that roam around the net trying to detect preliminary signs to a hostile cyber activity.” 

He explained that one of the methods frequently employed by hackers is an attack through companies’ sub-suppliers. “The suppliers have got the most sensitive information and it is through them that assailants can get to the critical crossroads.”

The company CEO added that “in case of a state-sponsored attack, in most cases, it will be impossible to identify it. The amount of resources invested in it is so great that many resources will be required for hiding it.”

I-HLS:

You Might Also Read:

Israeli Cybersecurity Company Beats All Hackers:

Israeli Business Expands Its Cyber Footprint:

 

« Blockchain v World Cup – It Could Go To Penalties…
BMW Cars Can He Hacked »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CDW

CDW

CDW is a leading multi-brand provider of information technology solutions to business, government, education and healthcare customers in the United States, the United Kingdom and Canada.

Information Security Media Group (ISMG)

Information Security Media Group (ISMG)

Information Security Media Group is the world’s largest media organization devoted solely to information security and risk management.

National Crime Agency (NCA) - United Kingdom

National Crime Agency (NCA) - United Kingdom

The NCA's Cyber Crime Unit focuses on critical cyber incidents in the UK as well as longer-term activity against the criminals and the services on which they depend.

Nubo Software

Nubo Software

Nubo’s Virtual Mobile Infrastructure creates a virtual corporate device on your employee smartphones and tablets. Enable unlimited mobility without leaving any data at risk.

PrimeKey

PrimeKey

PrimeKey provides organisations with the ability to implement security solutions such as e-ID, e-Passports, authentication, digital signatures, unified digital identities and validation.

Proton Data Security

Proton Data Security

Proton Data Security is a certified small business specializing in the design, manufacturing and sales of data security products for permanent erasure of hard drives, tapes and optical media.

Worldline

Worldline

Worldline IIoT solutions allow industrial companies to start their digital transformation journey with industrial level cyber security standards (IEC 62443 ready).

NSW Cyber Security Innovation Node

NSW Cyber Security Innovation Node

NSW Cyber Security Innovation Node is part of a national network designed to foster and accelerate cyber capability and innovation across Australia.

JM Search

JM Search

JM Search’s Information Technology Executives Practice sources the most sought-after technology roles including CIO, CTO, CISO, CDO and other senior posts.

ClassNK Consulting Service (NKCS)

ClassNK Consulting Service (NKCS)

ClassNK Consulting provides consulting services to the maritime industry with a focus on safety, security and compliance.

ClearVector

ClearVector

ClearVector is a leading provider of realtime, identity-driven security for the cloud.

Alibaba Cloud

Alibaba Cloud

Alibaba Cloud is committed to safeguarding the cloud security for every business by leveraging a comprehensive suite of enterprise security services and products on the platform.

Cranium

Cranium

AI is being implemented into every business process, but nobody knows whether their AI is secure. Our mission is to deliver security and trust to the AI revolution.

JanBask Training

JanBask Training

JanBask Training is a dynamic, highly professional, global online training provider committed to propelling the next generation of technology learners with a whole new way of training experience.

NMi Group

NMi Group

NMi Group is a global pioneer in mission-critical Testing, Inspection, Certification, and Calibration (TICC) services.

Cyber Castellum

Cyber Castellum

Cyber Castellum is a cybersecurity consulting firm that specializes in the identification of security vulnerabilities in an organization’s technology landscape.