Breaking cybersecurity news, news analysis, commentary, and other content from around the world, with an initial focus on the Middle East & Africa.
Israeli Company Hires Overseas Attackers in 'Hack-Back' Effort
CEO of CyTaka says offensive actions would create a deterrent against cyberattacks.
A CEO at an Israeli company has hired a network of offensive cyber hackers from around the world to counter anti-Israel online activity.
Doron Amir, CEO of CyTaka, a cybersecurity awareness and training firm, said he recruited the hackers to target the distribution of disinformation and offensive cyber operations that fund terrorist organizations.
In an interview with the Jerusalem Post, Amir said while Israeli law restricts private cyber companies from attacking international cyber systems, he is leveraging attackers from other nations who are "operating within legal frameworks."
Amir said permitting people to engage in offensive cyber operations, alongside proper supervision and accountability, would deter cyberattacks. He noted that he is receiving support and assistance from senior cybersecurity industry figures for this effort, even from countries that forbid any association with Israel.
Amir believes offensive cyber operations are justified for private companies and individuals, as they "would create a deterrent against cyberattacks."
The concept of hacking back has often caused skepticism among professionals and researchers, with experts from companies like Rapid7 characterizing it as "extremely troubling" as it is not possible "to provide sufficient oversight or accountability to make private-sector hack back viable without negative consequences."
CyTaka had not responded to a request for further comments at time of this posting.
Read more about:
DR Global Middle East & AfricaAbout the Author(s)
You May Also Like
Why Effective Asset Management is Critical to Enterprise Cybersecurity
May 21, 2024Finding Your Way on the Path to Zero Trust
May 22, 2024Extending Access Management: Securing Access for all Identities, Devices, and Applications
June 4, 2024Assessing Software Supply Chain Risk
June 6, 2024Preventing Attackers From Wandering Through Your Enterprise Infrastructure
June 19, 2024
Black Hat USA - August 3-8 - Learn More
August 3, 2024Cybersecurity's Hottest New Technologies: What You Need To Know
March 21, 2024