{"id":21454,"date":"2022-02-25T16:02:32","date_gmt":"2022-02-25T16:02:32","guid":{"rendered":"https:\/\/easydmarc.com\/blog\/?p=21454"},"modified":"2026-03-23T10:21:42","modified_gmt":"2026-03-23T10:21:42","slug":"cybersecurity-during-armed-conflicts-cyberwar-hits-harder-than-bombs","status":"publish","type":"post","link":"https:\/\/easydmarc.com\/blog\/cybersecurity-during-armed-conflicts-cyberwar-hits-harder-than-bombs\/","title":{"rendered":"Cybersecurity During Armed Conflicts: Cyberwar Hits Harder than Bombs"},"content":{"rendered":"\n<p><span style=\"font-weight: 400;\">Throughout humanity&#8217;s history, wars have been the showcase of tactics, strategy, and technology. Modern warfare is built on evolving military intelligence, but technological leaps are the culprits of the 21st-century battle<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">War theorists distinguish between <\/span><a href=\"https:\/\/www.proquest.com\/docview\/1731537073\" target=\"_blank\" rel=\"noreferrer noopener nofollow\"><span style=\"font-weight: 400;\">five warfare generations<\/span><\/a><span style=\"font-weight: 400;\">, each building on the previous one but also carrying new elements. Science and innovation are the main driving forces pushing the battlefield into a new dimension.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">We\u2019re living in the age of 5th generation warfare, also called \u201c<\/span><b>hybrid warfare<\/b><span style=\"font-weight: 400;\">.\u201d&nbsp;<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">So <\/span><b>what is a hybrid war<\/b><span style=\"font-weight: 400;\">? It\u2019s a war that uses all the means available to gain an advantage over the adversary. <\/span><b>Hybrid war<\/b><span style=\"font-weight: 400;\"> builds an unrestricted battlefield in the physical world, political arena, and cyberspace. While the latter is only one component of this ruthless struggle, it\u2019s a formidable one nonetheless.<\/span><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-what-is-cyberwar\">What is Cyberwar?<\/h2>\n\n\n\n<p><span style=\"font-weight: 400;\">While bombs terrorize civilians and opposing sides send unmanned missiles to destroy military bases, airports, hospitals, and other strategic objects, <\/span><b>cyberwar<\/b><span style=\"font-weight: 400;\"> rages on\u2014sometimes unnoticed. However, in this digital era, <\/span><b>cyberwar<\/b><span style=\"font-weight: 400;\"> impacts people deeply, leaving devastating consequences.<\/span><\/p>\n\n\n\n<p><b>Cyberwarfare<\/b><span style=\"font-weight: 400;\"> impacts the country\u2019s infrastructure and the people\u2019s psychology, instilling panic and chaos among unsuspecting civilians. Indeed, paranoia comes easily when you don\u2019t understand how to protect yourself. It\u2019s like going into a first-generation battle and not having a shield.<\/span><\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-infrastructure-takeover\">Infrastructure Takeover<\/h3>\n\n\n\n<p><span style=\"font-weight: 400;\">The most common attacks during a <\/span><b>hybrid war<\/b><span style=\"font-weight: 400;\"> happen on the electrical grid, rendering it useless and making the adversary nation sink into darkness. Disrupting the electricity supply can be dire for individuals and the country as a whole. All communication is lost for civilians and dependent infrastructures can no longer function.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">This is a sabotage strategy, where the attacked side must employ counter-measures to recover and restore vital infrastructure. Although an attack on the electricity grid might not last long, it can throw the government into panic mode if proper response protocols aren\u2019t in place.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">Targeting payment systems, banks, and computer networks is yet another common tactic used to spread panic and cause financial loss. Whether it\u2019s a ransomware attack on government-owned infrastructure or hacks on personal accounts, it\u2019s efficient.&nbsp;<\/span><\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-control-over-the-decision-makers\">Control Over the Decision-Makers<\/h3>\n\n\n\n<p><span style=\"font-weight: 400;\">As you can see, during wartime, nations and government-backed hackers aim to influence the other country by any possible means. In addition to sowing chaos, these steps make governing bodies and key decision-makers vulnerable to rush decisions. While electricity supply impairment could be a sabotage act, it can also lead to power play during peace negotiations.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">Many <\/span><b>cyberwar<\/b><span style=\"font-weight: 400;\"> attack types are used to tip the scales of political power. For example, adversary hackers might hold governmental sites hostage using ransomware or DoS (denial of service) attacks to improve the position of key politicians in negotiations.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">Besides sabotage, hackers strive to get any and every piece of information their country can use against the adversary on other warfronts. Espionage is a common advantage-building strategy for all sides. Hacking government websites using credential stuffing, brute-force, and man-in-the-middle attacks can all be means to conduct espionage during <\/span><b>cyberwarfare<\/b><span style=\"font-weight: 400;\">.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">Sure, no country leaves its digital assets unattended. So, if a country rages into a 5th generation warfare, they should prepare hacker teams and set up a meticulous response plan. Whether it\u2019s an offensive or defensive tactic, skilled hackers have become central to <\/span><b>cyberwarfare<\/b><span style=\"font-weight: 400;\">.<\/span><\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-psychological-pressure-on-citizens\">Psychological Pressure on Citizens<\/h3>\n\n\n\n<p><span style=\"font-weight: 400;\">The human factor in cybersecurity has been the main topic of our various blog posts for a while now. Scared and chaotic residents can do more harm than good, especially in wartime. One photo on social media, one phone call to a loved one on the frontline, and one conversation on a messaging app could be a goldmine for the adversary\u2019s cyberforce.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">In our article titled \u201c<\/span><a href=\"https:\/\/easydmarc.com\/blog\/social-engineering-trends-in-cybersecurity\/\"><span style=\"font-weight: 400;\">Social Engineering Trends in Cybersecurity,<\/span><\/a><span style=\"font-weight: 400;\">\u201d we mention government-backed social engineering and how increasingly dangerous it\u2019s becoming. Phishing still remains one of the most common attack types used to gather information from ordinary citizens. Hackers usually choose top communication methods and target the most vulnerable people.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">Malicious actors from government-adjacent groups often find their victims on social media newsgroups. They contact them via messaging apps (smishing), send voice messages (vishing), or even call unsuspecting citizens, making demands or tricking them into giving up important information.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">Imagine hackers managed to breach a communications service provider. They\u2019d have access to the entire customer base, including personal information.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">Trigger keywords might be used by secret services to listen to conversations, too.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">Misinformation and disinformation just add to this unnatural situation, making ordinary people even more vulnerable. The most experienced and cyberaware citizens can fall into intricately-designed traps, too.<\/span><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-building-infrastructures-to-withstand-cyberwarfare-attacks\">Building Infrastructures to Withstand Cyberwarfare Attacks<\/h2>\n\n\n\n<p><span style=\"font-weight: 400;\">Now that you know what it is, <\/span><b>what would a real cyber war look like<\/b><span style=\"font-weight: 400;\">? Just read the news these days. While bombs explode, leveling buildings, another war is happening online.&nbsp;<\/span><\/p>\n\n\n\n<p><b>Hybrid wars<\/b><span style=\"font-weight: 400;\"> have been around for quite some time, but they definitely evolve year after year.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">Unlike arms-based dealings, <\/span><b>cyberwar <\/b><span style=\"font-weight: 400;\">is closer to the skin for most people. If the bombs don\u2019t roar in your city\u2019s sky, you\u2019re more susceptible to online attacks. You never know how or when the adversary will strike, so cyberhygiene is always important.&nbsp;<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">Every attack and <\/span><b>cyberwarfare<\/b><span style=\"font-weight: 400;\"> tactic must have a counter-balance from the other side. Therefore, all countries should prepare for <\/span><b>hybrid warfare<\/b><span style=\"font-weight: 400;\"> at this point in history.&nbsp;<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">Building infrastructure secure enough to detect and stop any intrusion becomes increasingly important. You can\u2019t ignore buying weapons during the preparation period for the war. Similarly, you can\u2019t ignore cybersecurity and expect to win the fierce battle against government-backed hackers.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">Sure, taking appropriate protective measures is important, but countries should also implement response tactics to neutralize any attacks in progress.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">We\u2019re living in a strange, increasingly digital era, where each of us can influence opinions and people with just one click. That\u2019s why it\u2019s vital for everyone to become cyberaware and more responsible in the online world, especially during armed conflicts.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Throughout humanity&#8217;s history, wars have been the showcase &#8230;<\/p>\n","protected":false},"author":5,"featured_media":28855,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[204,201],"tags":[],"class_list":["post-21454","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-thought-leadership"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cybersecurity in Armed Conflicts: Rising Threats | EasyDMARC<\/title>\n<meta name=\"description\" content=\"Cyberwar impacts the infrastructure, psychology, creates panic and chaos. Let&#039;s discuss cybersecurity in the 5th generation warfare.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/easydmarc.com\/blog\/cybersecurity-during-armed-conflicts-cyberwar-hits-harder-than-bombs\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity During Armed Conflicts: Cyberwar Hits Harder than Bombs\" \/>\n<meta property=\"og:description\" content=\"Cyberwar impacts the infrastructure, psychology, creates panic and chaos. Let&#039;s discuss cybersecurity in the 5th generation warfare.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/easydmarc.com\/blog\/cybersecurity-during-armed-conflicts-cyberwar-hits-harder-than-bombs\/\" \/>\n<meta property=\"og:site_name\" content=\"EasyDMARC\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/EasyDMARC\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-02-25T16:02:32+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-23T10:21:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/02\/Cybersecurity-During-Armed-Conflicts_-Cyberwar-Hits-Harder-than-Bombs.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1440\" \/>\n\t<meta property=\"og:image:height\" content=\"910\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Hasmik Khachunts\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@easydmarc\" \/>\n<meta name=\"twitter:site\" content=\"@easydmarc\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Hasmik Khachunts\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/cybersecurity-during-armed-conflicts-cyberwar-hits-harder-than-bombs\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/cybersecurity-during-armed-conflicts-cyberwar-hits-harder-than-bombs\\\/\"},\"author\":{\"name\":\"Hasmik Khachunts\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#\\\/schema\\\/person\\\/1ee4f162a98bccc5ff8b6fefdfaf245c\"},\"headline\":\"Cybersecurity During Armed Conflicts: Cyberwar Hits Harder than Bombs\",\"datePublished\":\"2022-02-25T16:02:32+00:00\",\"dateModified\":\"2026-03-23T10:21:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/cybersecurity-during-armed-conflicts-cyberwar-hits-harder-than-bombs\\\/\"},\"wordCount\":1008,\"publisher\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/cybersecurity-during-armed-conflicts-cyberwar-hits-harder-than-bombs\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/Cybersecurity-During-Armed-Conflicts_-Cyberwar-Hits-Harder-than-Bombs.jpg\",\"articleSection\":[\"Blog\",\"Thought Leadership\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/easydmarc.com\\\/blog\\\/cybersecurity-during-armed-conflicts-cyberwar-hits-harder-than-bombs\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/cybersecurity-during-armed-conflicts-cyberwar-hits-harder-than-bombs\\\/\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/cybersecurity-during-armed-conflicts-cyberwar-hits-harder-than-bombs\\\/\",\"name\":\"Cybersecurity in Armed Conflicts: Rising Threats | EasyDMARC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/cybersecurity-during-armed-conflicts-cyberwar-hits-harder-than-bombs\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/cybersecurity-during-armed-conflicts-cyberwar-hits-harder-than-bombs\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/Cybersecurity-During-Armed-Conflicts_-Cyberwar-Hits-Harder-than-Bombs.jpg\",\"datePublished\":\"2022-02-25T16:02:32+00:00\",\"dateModified\":\"2026-03-23T10:21:42+00:00\",\"description\":\"Cyberwar impacts the infrastructure, psychology, creates panic and chaos. Let's discuss cybersecurity in the 5th generation warfare.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/cybersecurity-during-armed-conflicts-cyberwar-hits-harder-than-bombs\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/easydmarc.com\\\/blog\\\/cybersecurity-during-armed-conflicts-cyberwar-hits-harder-than-bombs\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/cybersecurity-during-armed-conflicts-cyberwar-hits-harder-than-bombs\\\/#primaryimage\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/Cybersecurity-During-Armed-Conflicts_-Cyberwar-Hits-Harder-than-Bombs.jpg\",\"contentUrl\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/Cybersecurity-During-Armed-Conflicts_-Cyberwar-Hits-Harder-than-Bombs.jpg\",\"width\":1440,\"height\":910,\"caption\":\"Cybersecurity During Armed Conflicts Cyberwar Hits Harder than Bombs\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/cybersecurity-during-armed-conflicts-cyberwar-hits-harder-than-bombs\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Thought Leadership\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/thought-leadership\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Cybersecurity During Armed Conflicts: Cyberwar Hits Harder than Bombs\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/\",\"name\":\"EasyDMARC\",\"description\":\"Blog\",\"publisher\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/#organization\",\"name\":\"EasyDMARC\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/img\\\/logo.png\"},\"image\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/EasyDMARC\\\/\",\"https:\\\/\\\/x.com\\\/easydmarc\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/easydmarc\\\/mycompany\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#\\\/schema\\\/person\\\/1ee4f162a98bccc5ff8b6fefdfaf245c\",\"name\":\"Hasmik Khachunts\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/556e30ecef3fde7f1400ab37fa210642b14cd1a6cf57ae3d669996eb5324fc9e?s=96&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/556e30ecef3fde7f1400ab37fa210642b14cd1a6cf57ae3d669996eb5324fc9e?s=96&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/556e30ecef3fde7f1400ab37fa210642b14cd1a6cf57ae3d669996eb5324fc9e?s=96&r=g\",\"caption\":\"Hasmik Khachunts\"},\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/author\\\/hasmik\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cybersecurity in Armed Conflicts: Rising Threats | EasyDMARC","description":"Cyberwar impacts the infrastructure, psychology, creates panic and chaos. Let's discuss cybersecurity in the 5th generation warfare.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/easydmarc.com\/blog\/cybersecurity-during-armed-conflicts-cyberwar-hits-harder-than-bombs\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity During Armed Conflicts: Cyberwar Hits Harder than Bombs","og_description":"Cyberwar impacts the infrastructure, psychology, creates panic and chaos. Let's discuss cybersecurity in the 5th generation warfare.","og_url":"https:\/\/easydmarc.com\/blog\/cybersecurity-during-armed-conflicts-cyberwar-hits-harder-than-bombs\/","og_site_name":"EasyDMARC","article_publisher":"https:\/\/www.facebook.com\/EasyDMARC\/","article_published_time":"2022-02-25T16:02:32+00:00","article_modified_time":"2026-03-23T10:21:42+00:00","og_image":[{"width":1440,"height":910,"url":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/02\/Cybersecurity-During-Armed-Conflicts_-Cyberwar-Hits-Harder-than-Bombs.jpg","type":"image\/jpeg"}],"author":"Hasmik Khachunts","twitter_card":"summary_large_image","twitter_creator":"@easydmarc","twitter_site":"@easydmarc","twitter_misc":{"Written by":"Hasmik Khachunts","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/easydmarc.com\/blog\/cybersecurity-during-armed-conflicts-cyberwar-hits-harder-than-bombs\/#article","isPartOf":{"@id":"https:\/\/easydmarc.com\/blog\/cybersecurity-during-armed-conflicts-cyberwar-hits-harder-than-bombs\/"},"author":{"name":"Hasmik Khachunts","@id":"https:\/\/easydmarc.com\/blog\/#\/schema\/person\/1ee4f162a98bccc5ff8b6fefdfaf245c"},"headline":"Cybersecurity During Armed Conflicts: Cyberwar Hits Harder than Bombs","datePublished":"2022-02-25T16:02:32+00:00","dateModified":"2026-03-23T10:21:42+00:00","mainEntityOfPage":{"@id":"https:\/\/easydmarc.com\/blog\/cybersecurity-during-armed-conflicts-cyberwar-hits-harder-than-bombs\/"},"wordCount":1008,"publisher":{"@id":"https:\/\/easydmarc.com\/blog\/#organization"},"image":{"@id":"https:\/\/easydmarc.com\/blog\/cybersecurity-during-armed-conflicts-cyberwar-hits-harder-than-bombs\/#primaryimage"},"thumbnailUrl":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/02\/Cybersecurity-During-Armed-Conflicts_-Cyberwar-Hits-Harder-than-Bombs.jpg","articleSection":["Blog","Thought Leadership"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/easydmarc.com\/blog\/cybersecurity-during-armed-conflicts-cyberwar-hits-harder-than-bombs\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/easydmarc.com\/blog\/cybersecurity-during-armed-conflicts-cyberwar-hits-harder-than-bombs\/","url":"https:\/\/easydmarc.com\/blog\/cybersecurity-during-armed-conflicts-cyberwar-hits-harder-than-bombs\/","name":"Cybersecurity in Armed Conflicts: Rising Threats | EasyDMARC","isPartOf":{"@id":"https:\/\/easydmarc.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/easydmarc.com\/blog\/cybersecurity-during-armed-conflicts-cyberwar-hits-harder-than-bombs\/#primaryimage"},"image":{"@id":"https:\/\/easydmarc.com\/blog\/cybersecurity-during-armed-conflicts-cyberwar-hits-harder-than-bombs\/#primaryimage"},"thumbnailUrl":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/02\/Cybersecurity-During-Armed-Conflicts_-Cyberwar-Hits-Harder-than-Bombs.jpg","datePublished":"2022-02-25T16:02:32+00:00","dateModified":"2026-03-23T10:21:42+00:00","description":"Cyberwar impacts the infrastructure, psychology, creates panic and chaos. Let's discuss cybersecurity in the 5th generation warfare.","breadcrumb":{"@id":"https:\/\/easydmarc.com\/blog\/cybersecurity-during-armed-conflicts-cyberwar-hits-harder-than-bombs\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/easydmarc.com\/blog\/cybersecurity-during-armed-conflicts-cyberwar-hits-harder-than-bombs\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/easydmarc.com\/blog\/cybersecurity-during-armed-conflicts-cyberwar-hits-harder-than-bombs\/#primaryimage","url":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/02\/Cybersecurity-During-Armed-Conflicts_-Cyberwar-Hits-Harder-than-Bombs.jpg","contentUrl":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/02\/Cybersecurity-During-Armed-Conflicts_-Cyberwar-Hits-Harder-than-Bombs.jpg","width":1440,"height":910,"caption":"Cybersecurity During Armed Conflicts Cyberwar Hits Harder than Bombs"},{"@type":"BreadcrumbList","@id":"https:\/\/easydmarc.com\/blog\/cybersecurity-during-armed-conflicts-cyberwar-hits-harder-than-bombs\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/easydmarc.com\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/"},{"@type":"ListItem","position":3,"name":"Thought Leadership","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/thought-leadership\/"},{"@type":"ListItem","position":4,"name":"Cybersecurity During Armed Conflicts: Cyberwar Hits Harder than Bombs"}]},{"@type":"WebSite","@id":"https:\/\/easydmarc.com\/blog\/#website","url":"https:\/\/easydmarc.com\/blog\/","name":"EasyDMARC","description":"Blog","publisher":{"@id":"https:\/\/easydmarc.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/easydmarc.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/easydmarc.com\/#organization","name":"EasyDMARC","url":"https:\/\/easydmarc.com\/","logo":{"@type":"ImageObject","url":"https:\/\/easydmarc.com\/img\/logo.png"},"image":{"@id":"https:\/\/easydmarc.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/EasyDMARC\/","https:\/\/x.com\/easydmarc","https:\/\/www.linkedin.com\/company\/easydmarc\/mycompany\/"]},{"@type":"Person","@id":"https:\/\/easydmarc.com\/blog\/#\/schema\/person\/1ee4f162a98bccc5ff8b6fefdfaf245c","name":"Hasmik Khachunts","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/556e30ecef3fde7f1400ab37fa210642b14cd1a6cf57ae3d669996eb5324fc9e?s=96&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/556e30ecef3fde7f1400ab37fa210642b14cd1a6cf57ae3d669996eb5324fc9e?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/556e30ecef3fde7f1400ab37fa210642b14cd1a6cf57ae3d669996eb5324fc9e?s=96&r=g","caption":"Hasmik Khachunts"},"url":"https:\/\/easydmarc.com\/blog\/author\/hasmik\/"}]}},"jetpack_featured_media_url":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/02\/Cybersecurity-During-Armed-Conflicts_-Cyberwar-Hits-Harder-than-Bombs.jpg","_links":{"self":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts\/21454","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/comments?post=21454"}],"version-history":[{"count":3,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts\/21454\/revisions"}],"predecessor-version":[{"id":60177,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts\/21454\/revisions\/60177"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/media\/28855"}],"wp:attachment":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/media?parent=21454"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/categories?post=21454"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/tags?post=21454"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}