البث المباشر
الملك يتلقى اتصالا هاتفيا من رئيس الوزراء الهولندي رئيس الوزراء : الأردن لن يكون ساحة حرب لأي طرف وأمن وأمان هذا البلد وشعبه فوق كل اعتبار مجلس النواب يُقر مشروع قانون "عقود التأمين" ارتفاع صادرات صناعة عمان بنسبة 3.1 % خلال شهرين الفيصلي يتصدر دوري المحترفين بعد ختام المرحلة 18 التعليم العالي تحدد سقوف بدلات أجور مكاتب خدمات الطلبة وتحذر من تجاوزها المنتخب الوطني للشابات يخسر أمام نظيره الروسي وديا بورصة عمان تغلق تداولاتها على ارتفاع قطاع المركبات بالسوق المحلية يشهد إقبالا على الشراء اتحاد الغرف العربية يدين الاعتدات الايرانية على المملكة نمو صادرات الأردن الصناعية بنسبة 10.2 % خلال العام الماضي الدكتوره نسرين القضماني .. مبارك الدكتوراه "الأمانة" تطلق تجريبيا مشروع فرز النفايات العضوية من المصدر الأردن بين معادلة السيادة وضبط الإيقاع الإقليمي المشرق العربي والتوازن النووي حماية الصحفيين: تجنب نشر الأخبار المضللة يحمي السلم المجتمعي اعتماد عمان الأهلية المحاضرات وجاهياً لطلبتها في الأردن وعلى منصة " مايكروسوفت تيمز" لمن هم بالخارج إيران… الجار اللدود بين البراغماتية وحافة المواجهة الضمان الاجتماعي بين الاستدامة وحماية الحقوق: أي إصلاح نريد؟ العيسوي يلتقي وفدا أكاديميا من كلية الشريعة بجامعة جرش

Digital Shadow War: Tehran and Tel Aviv's Cyber Conflict

Digital Shadow War Tehran and Tel Avivs Cyber Conflict
الأنباط -

The digital realm has become a crucial battleground in the ongoing conflict between Tehran and Tel Aviv, marking a shift towards comprehensive hybrid warfare.

Cyberattacks have merged with traditional military operations, turning bits and bytes into weapons as potent as missiles and drones.

Analysts at Radware and Mandiant highlight 2025 as a particularly destructive year, especially during the military confrontation in June.

The year began with the "Predatory Sparrow" group launching a wipeout attack against Iran's Bank Sepah, employing wiper malware to irreversibly erase data, crippling financial transactions linked to the Iranian armed forces.

A 2026 Radware report revealed that Israel was the target of 12.2% of politically motivated cyberattacks worldwide in 2025, facing over 1,800 unique DDoS attacks aimed at disrupting government and medical services during periods of heightened security tensions.

In early 2024, Iranian-aligned groups focused on destabilizing daily life in Israel through Internet of Things (IoT) breaches.

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) documented CyberAv3ngers' breach of Unitronics PLCs, disrupting water pumping systems by exploiting default password vulnerabilities.

Microsoft Threat Intelligence reported Cotton Sandstorm's activity in hacking smart billboards to broadcast threatening messages, breaching content management systems (CMS) to undermine Israeli morale.

As 2026 began, the conflict evolved into a phase of cyber-surgical intelligence, coinciding with major military operations.

The Chertoff Group reported that "Epic Fury," preceding air strikes in February, unleashed a wave of preemptive cyberattacks that crippled Iranian air defense radars, demonstrating the effectiveness of cyber-priming in modern warfare.

SentinelOne revealed in February that the Iranian group MuddyWater used generative AI to develop highly accurate spear-phishing campaigns, targeting personal accounts of Israeli officials and academics to gather sensitive intelligence.

NetBlocks documented that internet connectivity in Iran reached only 1% in March, due to attacks targeting international access gateways, reinforcing Tehran's digital isolation.

The period between 2024 and 2026 signifies the dawn of integrated cyber warfare.

National sovereignty in the 21st century is now defended behind complex software firewalls, not just tanks and planes.

Iran sought to overwhelm its adversary through digital quantity and AI-driven psychological warfare, while Israel responded with surgical strikes targeting vital functions of the Iranian state.

This escalating conflict highlights that digital borders are more penetrable and dangerous than geographical ones.

As cyberspace becomes an open arena for strategic power projection, the question remains whether digital deterrence can curb a comprehensive military confrontation, or if the next explosion will be triggered by a malicious line of code that ends the traditional rules of the game forever.

© جميع الحقوق محفوظة صحيفة الأنباط 2024
تصميم و تطوير