DigitalCIO
No Result
View All Result
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
DigitalCIO
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
No Result
View All Result
Digitalcio
No Result
View All Result
Home Opinion and Analysis

Hamas Attacks on Israel – Underlining Advanced Hacking Mechanisms?

DigitalCIO Bureau by DigitalCIO Bureau
October 11, 2023
in Opinion and Analysis, Tech News
0
Hamas Attacks on Israel – Underlining Advanced Hacking Mechanisms?
88
SHARES
1.5k
VIEWS
Share on FacebookShare on Twitter

Recent attacks of Hamas on Israel have shown the world how crucial it is to have the highest level of readiness to face any attack. The diversionary tactics besides multi dimensional attack approach that have proved their effectiveness & impact in real world are very similar in the nature and style of attacks happening in the cyber & digital world. This article attempts to find the similarities in both the cases.

Hamas attack on Israel has proved again that no matter how big or powerful you are, a small loophole or mistake is enough to bring an elephant down to its knee. Yes, Israel will retaliate on a massive scale but the damage has already been done. A big dent is already made to Israel’s reputation. World is stunned and still in a hangover to come into terms with the massacre that happened on 7th October.  A multi pronged attack approach was adopted by Hamas and what not they have applied. Starting from paragliding attack to drone attack to ground hunting to aerial attack to massive level of rocket/mortar attacks. The so called unbeatable Israeli defence is brought almost to a halt. People still finding answers for the silence of iron dome anti missile system and more appropriately the ineffectiveness of the unstoppable defence system.

What Are Similar Here For Corporate or National Cyber Security Systems?

Hence, the same applies for Corporate and any national IT/Cyber Security system also. You have probably installed so called the best security systems/solutions available in industry or you might have outsourced best managed security services available in market, but that never offers you the luxury to be in a relaxed state. 24×7 monitoring, most effective alarming system for detecting any possible attack or to identify any unnatural behaviour and proactive & pre-emptive action to mitigate an attack is the need of the hour. Most companies believe that they have the highest grade of security systems in place, which assures them the safety & security at best. But please don’t be under such an impression/notion.

Now let’s delve little deeper to understand the Hamas attack on Israel and the tactics followed by Hamas in this entire saga. And believe me the same can be applied or being applied by hackers as a reference attack model. First question comes today in everyone’s mind, how Israel couldn’t evaluate Hamas’s planning or strategy, though Hamas is identified as one of Israel’s biggest frontline enemies. The diversionary tactics Hamas adopted here fooled Israel by all measurements. Hamas didn’t make any mistake to alert Israel in last two years. Small scale activities/incidents organized intentionally by Hamas in last two years fell well short in front of Israel’s massive technologically advanced defence & security systems. So, Israel started to be bit relaxed and couldn’t guess the massive planning behind this diversionary tactics. Hamas prepared themselves within this period and gathered all possible level of intelligence, which could be used against Israel. Ultimately on 7th October Hamas showed the World & Israel their actual intention and didn’t give a single opportunity to Israel to defend before the massacre took place. And this same model of attack is used by hackers today at various cyber attacks reported globally.

Let’s discuss the second most prominent question. How Israel’s most effective anti missile system ‘Iron Dome’ couldn’t resist the massive level of rocket attacks by Hamas? International arms & ammunition experts and many security experts claim that ‘Iron Dome’ is not capable of resisting rocket/missile attacks 100% but strong enough to execute the function 70% to 80% by & large. But very surprisingly in the initial hours of rocket attacks from Hamas, ‘Iron Dome’ radar couldn’t detect the attacks. There are multiple opinions floating to justify this inactivity. But is there any possibility that for first few hours Hamas hackers blocked the function of ‘Iron Dome’? I am not sure about that but cannot rule out also the possibility at the age of smart hacking. In nutshell, the security landscape is very dynamic and hackers are becoming smarter & smarter. You need to equip yourself with right security product/solution/service to mitigate advanced level attacks proactively.

Conclusion

Hamas decided to execute by exploiting one final crack in the Israeli fort. Hamas had clearly concluded Israel security system, which is designed to detect small groups of terrorists but not a military scale assault by land, sea and air. And that thousands terrorists and thousands of rockets took entire Israel into a standstill. Hamas appeared to be literally overwhelmed, even played with Israeli defence, stretching them beyond their limit and rendering them virtually ineffective for crucial four hours. But still a piece is missing. How could all these happen so easily even when such advanced defence & security system in place? Two things we know for sure at this stage, one, Israel’s hard earned reputation for being an intelligence power will never be the same again and second, probably this could be the end of Gaza, Hamas and Hamas supporters. I have just shared my personal views and opinions based on the Hamas’s attack model and these are purely my own understanding relating to today’s smart world of hacking. This same approach, industry is witnessing today in Cyber attacks being reported globally. You finally may come out of this attack using your best possible resources but the damage is already done. That impact may last for a long time. Better get prepared to face the worst but at the same time strengthen your defence at best possible level.

Tags: CyberattacksDefenceIsraelStrategyTechnology
Share35Tweet22
DigitalCIO Bureau

DigitalCIO Bureau

Recommended For You

Freshworks Appoints Ian Tickle as Chief of Global Field Operations

by DigitalCIO Bureau
June 20, 2025
0
Freshworks Appoints Ian Tickle as Chief of Global Field Operations

Freshworks has announced the appointment of Ian Tickle as Chief of Global Field Operations (CGFO). Tickle, who has served in this capacity on an interim basis since April, while maintaining...

Read moreDetails

C-Suite misalignment over GenAI adoption

by DigitalCIO Bureau
June 20, 2025
0

NTT DATA has launched its new report, “The AI Security Balancing Act: From Risk to Innovation,” highlighting the opportunities and risks AI presents in cybersecurity. The findings show...

Read moreDetails

HCLSoftware Unveils XDO Framework In Dubai

by DigitalCIO Bureau
June 19, 2025
0
HCLSoftware Unveils XDO Framework In Dubai

HCLSoftware, the enterprise software division of HCLTech, kicked off its high-octane Executive Summit at Madinat Jumeirah on June 3. The invitation-only event blended Formula 1 energy with enterprise...

Read moreDetails

GerriScary: Hacking the Supply Chain Of Popular Google Products

by DigitalCIO Bureau
June 19, 2025
0
Tenable Reveals Vulnerability dubbed ConfusedFunction in Google Cloud Platform

Tenable has identified a vulnerability in Google's open-source code review system, Gerrit, dubbed GerriScary. The vulnerability allowed unauthorised code submission to at least 18 major Google projects, including...

Read moreDetails

Proofpoint And Wiz Integrate Security Solutions

by DigitalCIO Bureau
June 18, 2025
0
Proofpoint And Wiz Integrate Security Solutions

Proofpoint has announced the general availability of an integration between its Data Security Posture Management (DSPM) solution and Wiz, a leader in cloud security. As part of the Wiz...

Read moreDetails
Next Post
Hitachi Vantara Unveils Hitachi Virtual Storage Platform One

Hitachi Vantara Unveils Hitachi Virtual Storage Platform One

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Related News

IBM's Introduces AI-Powered Interactive Ads

October 10, 2018
CrowdStrike Named A Leader In Cloud Workload Security By Forrester

CrowdStrike Named A Leader In Cloud Workload Security By Forrester

January 31, 2024
Huawei Releases Data Center 2030 Report

Asia-Pacific Data Centre Association Launches as Voice of Data Centre Operators in the Region

January 8, 2024

Browse by Category

  • Acquisition
  • Appointment
  • Archive
  • Artificial Intelligence
  • CIO Interviews
  • Cloud
  • Datacenter
  • Events and Conferences
  • Market Insights
  • News
  • Opinion and Analysis
  • Products
  • Resources
  • Security
  • Storage
  • Tech News
  • Telecom
Digitalcio

Welcome to DigitalCIO, your ultimate source for staying ahead in the ever-evolving world of technology and business.

BROWSE BY TAG

Acquisition AI Appointment artificial intelligence Artificial Intelligence and Machine Learning AWS Big Data and Analytics Blockchain CISCO Cloud Computing Cloudflare Commvault CrowdStrike Cybersecurity Dell Technologies Digital Transformation Dynatrace E-books Fortinet Gartner GenAI Generative AI Google Cloud HCLTech Honeywell IBM Infographics Internet of Things (IoT) Kaspersky Microsoft Netskope NTT DATA Palo Alto Networks Panel Discussion Qlik Salesforce ServiceNow Sophos Tenable Veeam Veeam Software Vertiv Webinars Whitepaper Zscaler

CATEGORIES

  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
  • Archive

NAVIGATION

  • Home
  • About Us
  • Advertise with Us
  • Contact Us

© 2024 digitalcio.in - All rights reserved.

No Result
View All Result
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources

© 2024 digitalcio.in - All rights reserved.

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?