Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Biohacking Implants: When Human Optimization Becomes Too Risky

    NTT Data deepens Middle East cloud push with acquisition of UAE-based Zero&One

    UAE’s TII challenges big tech dominance with open source Falcon AI models

    Facebook X (Twitter) Instagram
    • Artificial Intelligence
    • Business Technology
    • Cryptocurrency
    • Gadgets
    • Gaming
    • Health
    • Software and Apps
    • Technology
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Tech AI Verse
    • Home
    • Artificial Intelligence

      Read the extended transcript: President Donald Trump interviewed by ‘NBC Nightly News’ anchor Tom Llamas

      February 6, 2026

      Stocks and bitcoin sink as investors dump software company shares

      February 4, 2026

      AI, crypto and Trump super PACs stash millions to spend on the midterms

      February 2, 2026

      To avoid accusations of AI cheating, college students are turning to AI

      January 29, 2026

      ChatGPT can embrace authoritarian ideas after just one prompt, researchers say

      January 24, 2026
    • Business

      New VoidLink malware framework targets Linux cloud servers

      January 14, 2026

      Nvidia Rubin’s rack-scale encryption signals a turning point for enterprise AI security

      January 13, 2026

      How KPMG is redefining the future of SAP consulting on a global scale

      January 10, 2026

      Top 10 cloud computing stories of 2025

      December 22, 2025

      Saudia Arabia’s STC commits to five-year network upgrade programme with Ericsson

      December 18, 2025
    • Crypto

      Bernstein Discusses Bitcoin’s Weakest Bear Market Yet – “Nothing Broke”

      February 9, 2026

      Ethereum Price Hits Breakdown Target — But Is a Bigger Drop to $1,000 Coming?

      February 9, 2026

      Damex Secures MiCA CASP Licence, Establishing Its Position as a Tier-1 Digital Asset Institution in Europe

      February 9, 2026

      Bitget and BlockSec Introduce the UEX Security Standard, Setting a New Benchmark for Universal Exchanges

      February 9, 2026

      3 Meme Coins To Watch In The Second Week Of February 2026

      February 9, 2026
    • Technology

      Biohacking Implants: When Human Optimization Becomes Too Risky

      February 9, 2026

      NTT Data deepens Middle East cloud push with acquisition of UAE-based Zero&One

      February 9, 2026

      UAE’s TII challenges big tech dominance with open source Falcon AI models

      February 9, 2026

      US bid for Dutch ID infrastructure raises sovereignty concerns

      February 9, 2026

      ExpressVPN two-year plans are up to 81 percent off right now

      February 9, 2026
    • Others
      • Gadgets
      • Gaming
      • Health
      • Software and Apps
    Check BMI
    Tech AI Verse
    You are at:Home»Technology»Widening Middle Eastern war increases cyber risk
    Technology

    Widening Middle Eastern war increases cyber risk

    TechAiVerseBy TechAiVerseJune 26, 2025No Comments6 Mins Read3 Views
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    Widening Middle Eastern war increases cyber risk
    Share
    Facebook Twitter LinkedIn Pinterest WhatsApp Email

    Widening Middle Eastern war increases cyber risk

    With the entry of the US into the widening Middle Eastern conflict, cyber risk is likely to increase across the board

    By

    • Alex Scroxton,
      Security Editor

    Published: 23 Jun 2025 17:05

    With the US entering a widening Middle Eastern conflict following a series of airstrikes against nuclear targets in Iran over the weekend, organisations across Europe and North America should be on high alert for the possibility of cyber attacks conducted by threat actors backed by or supportive of Iran.

    Iranian threat actors have been highly engaged in attacking Israeli targets since the 7 October 2023 Hamas attacks, but in a series of warnings over the past 48 hours, government officials and cyber experts said the likelihood of disruptive cyber attacks hitting US and allied targets, including in the UK – where the government has issued statements in support of President Trump’s airstrikes – has increased.

    In a bulletin issued on Sunday 22 June via its National Terrorism Advisory System, the US Department for Homeland Security said the ongoing Iran conflict was likely to cause an uptick in “low-level” cyber attacks against US networks by pro-Iranian hacktivists, while state-backed operators may also become increasingly active.

    “Both hacktivists and Iranian government-affiliated actors routinely target poorly secured US networks and internet-connected devices for disruptive cyber attacks,” the alert said.

    It also acknowledged that targets perceived to be Jewish, pro-Israel, or linked to the US government or military could be particularly at risk of cyber actions. The alert further warned of the possibility of attacks on critics of the Iranian regime.

    “Iran already targets the US with cyber espionage which they use to directly and indirectly gather geopolitical insight and surveil persons of interest,” said John Hultquist, chief analyst at the Google Threat Intelligence Group.

    “Persons and individuals associated with Iran policy are frequently targeted through organisational and personal accounts and should be on the lookout for social engineering schemes,” he said. “Individuals are also targeted indirectly by Iranian cyber espionage against telecoms, airlines, hospitality, and other organisations who have data that can be used to identify and track persons of interest.”

    Hultquist added: “Iran has had mixed results with disruptive cyber attacks, and they frequently fabricate and exaggerate their effects in an effort to boost their psychological impact.

    “We should be careful not to overestimate these incidents and inadvertently assist the actors,” he said. “The impacts may still be very serious for individual enterprises, which can prepare by taking many of the same steps they would to prevent ransomware.”

    James Turgal, vice-president of global cyber risk and board relations at Optiv – who also spent over 20 years in law enforcement at the FBI – said the possibility of spillover from the conflict into civilian infrastructure was a definite concern.

    “You can’t always control the third party or unintended consequences when malware and destructive code, such as wipers or ransomware, are used in offensive operations,” he said.

    “Because of the global interconnectedness of our software supply chain, these destructive attacks may propagate beyond intended targets, affecting global networks or multinational subsidiaries,” said Turgal. “For example, a cyber attack on a logistics company in Israel could unintentionally impact global shipping operations or foreign suppliers.

    “As both sides leverage state-aligned hacker groups, non-state actors may adopt similar tools or feel emboldened to launch their own campaigns globally,” he said. “This can increase attacks on soft targets like schools, hospitals or small businesses.”

    Based on the use of cyber-focused and kinetic military operations seen during the Ukraine war, Turgal said a similar scenario may now be in play in the Middle East, “with unimaginable unintended consequences” including attacks on Western critical infrastructure targets.

    Cyber a ‘reliable tool of retaliation’ for Iran

    Ariel Parnes, co-founder and chief operating officer of Mitiga, and a former colonel in Israel’s renowned cyber unit, told Computer Weekly that Iran knows full well the value of offensive cyber operations as a tool of warfare.

    “Over the past few years, Iran has used cyber as a reliable tool of retaliation, targeting hospitals, utilities and government systems across the US, Europe and the Middle East,” he said. “These operations aren’t random. They’re calculated, low-cost moves designed to create disruption, project power and signal intent.

    “Actors like APT34 and APT42, along with affiliated hacktivist fronts, go after both specific industries and the technologies they depend on,” said Parnes. “That includes energy, finance and healthcare sectors, and platforms like Microsoft 365, Google Workspace and cloud-native infrastructure. Their methods centre on credential theft, phishing and abusing misconfigurations – not flashy exploits, but persistent access.

    “In the wake of Operation Midnight Hammer, cyber retaliation should be expected,” he continued. “It is important to emphasise that in some cases, it may already be in motion: pre-positioned access waiting to be triggered, the so-called ‘red button’ play.

    “Organisations should act now,” said Parnes. “Raise awareness, tighten posture, improve detection, proactively hunt and exercise your response plans.”

    Iran’s ties to Russia

    Of additional concern to defenders should be the content of a January 2025 agreement signed between Moscow and Tehran, in which the Iranian government received commitments from the Russian regime to collaborate on cyber security matters.

    Although ostensibly this agreement stipulated that this collaboration would help counter cyber criminal activity, the Russian government has long permitted financially motivated cyber gangs to operate from its territory with impunity, and its use of aggressive cyber tactics against key infrastructure targets in Ukraine over the past three years should leave defenders in no doubt that this collaboration could extend to tactical support for Iranian-fronted attacks.

    At the same time, the security community is also concerned over the impact of cuts to America’s cyber security budget, especially at the keystone Cybersecurity and Infrastructure Security Agency (CISA), which has been threatened with cuts of $495m and may have to lay off up to 1,000 people.

    The prevailing belief is that in slimming down CISA, the US leaves itself and its allies at greater risk of being less effective in mounting a coordinated response to a major, multinational nation-state cyber attack.

    Read more on Hackers and cybercrime prevention


    • UK on high alert over Iranian spear phishing attacks, says NCSC

      By: Alex Scroxton


    • Iranian APT caught acting as access broker for ransomware crews

      By: Alex Scroxton


    • Iranian APT Peach Sandstorm teases new Tickler malware

      By: Alex Scroxton


    • U.S. agencies attribute Trump campaign hack to Iran

      By: Alexander Culafi

    Share. Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Telegram Email
    Previous ArticleIndustrial strategy: Takeaways for UK tech innovations
    Next Article Digital ID: cool or contentious?
    TechAiVerse
    • Website

    Jonathan is a tech enthusiast and the mind behind Tech AI Verse. With a passion for artificial intelligence, consumer tech, and emerging innovations, he deliver clear, insightful content to keep readers informed. From cutting-edge gadgets to AI advancements and cryptocurrency trends, Jonathan breaks down complex topics to make technology accessible to all.

    Related Posts

    Biohacking Implants: When Human Optimization Becomes Too Risky

    February 9, 2026

    NTT Data deepens Middle East cloud push with acquisition of UAE-based Zero&One

    February 9, 2026

    UAE’s TII challenges big tech dominance with open source Falcon AI models

    February 9, 2026
    Leave A Reply Cancel Reply

    Top Posts

    Ping, You’ve Got Whale: AI detection system alerts ships of whales in their path

    April 22, 2025660 Views

    Lumo vs. Duck AI: Which AI is Better for Your Privacy?

    July 31, 2025249 Views

    6.7 Cummins Lifter Failure: What Years Are Affected (And Possible Fixes)

    April 14, 2025148 Views

    6 Best MagSafe Phone Grips (2025), Tested and Reviewed

    April 6, 2025111 Views
    Don't Miss
    Technology February 9, 2026

    Biohacking Implants: When Human Optimization Becomes Too Risky

    Biohacking Implants: When Human Optimization Becomes Too Risky Image source: recovery.com Key takeaways: Biohacking has…

    NTT Data deepens Middle East cloud push with acquisition of UAE-based Zero&One

    UAE’s TII challenges big tech dominance with open source Falcon AI models

    US bid for Dutch ID infrastructure raises sovereignty concerns

    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    About Us
    About Us

    Welcome to Tech AI Verse, your go-to destination for everything technology! We bring you the latest news, trends, and insights from the ever-evolving world of tech. Our coverage spans across global technology industry updates, artificial intelligence advancements, machine learning ethics, and automation innovations. Stay connected with us as we explore the limitless possibilities of technology!

    Facebook X (Twitter) Pinterest YouTube WhatsApp
    Our Picks

    Biohacking Implants: When Human Optimization Becomes Too Risky

    February 9, 20264 Views

    NTT Data deepens Middle East cloud push with acquisition of UAE-based Zero&One

    February 9, 20264 Views

    UAE’s TII challenges big tech dominance with open source Falcon AI models

    February 9, 20263 Views
    Most Popular

    7 Best Kids Bikes (2025): Mountain, Balance, Pedal, Coaster

    March 13, 20250 Views

    VTOMAN FlashSpeed 1500: Plenty Of Power For All Your Gear

    March 13, 20250 Views

    This new Roomba finally solves the big problem I have with robot vacuums

    March 13, 20250 Views
    © 2026 TechAiVerse. Designed by Divya Tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms & Conditions

    Type above and press Enter to search. Press Esc to cancel.