Cyber Security in the Context of the Israel – Hamas Conflict


The situation in the Middle East is troubling to say the least, with a developing conflict since the Hamas attacks on Israel in early October.

Since the attack occurred, and the subsequent response by the Israeli government, the world media has mainly covered the developments on the ground. But apart from the physical attack, which the world's attention has focused on, there have been cyber attacks on Israel too. Although intensified, they have remained in the background somewhat. The cyber attacks range from low level attacks to allegedly hostile government - backed hacker groups.

There have been reports of attacks on human right groups and attack – alert systems for civilians. Attempts against the government and military are up by more than 50% compared to before the Hamas attack.

It is clear that modern day warfare takes place on multiple fronts. Not just on the battlefield, but more and more in the cyber world as well. In the context of this war, the importance of cyber security has been highlighted, as we have seen in the Ukraine - Russia conflict also. Cyber is clearly one of the main battlefields. That is likely to force companies and governments to increase their spending in this area going forward, even if there is peace for the time being.

Israel itself has a heavy presence in the cyber security and the security software sector. Due to its young and educated population, it has been a huge source of talent and development in this area. Many would have thought the war in the Middle East would clearly be a negative for these Israel- based companies, given their close proximity to the conflict. It is understandable, given that much of the workforce would be affected by the war, in a way preventing them from attending their jobs.

Contrary to those expectations, companies however, have shown relative strength. Let's look at some specific examples in the cyber security space. These are some of the leading exchanged – listed companies in this sector:

Check Point Software ( - an IT security film headquartered in Tel Aviv. Their stock has seen little change since the attack. CHKP develops a range of products and services for IT security worldwide. The company offers a multilevel security architecture, cloud, network, mobile devices, endpoints information, and IOT solutions. It provides a cyber security architecture that protects against fifth generation cyber-attacks across various networks, endpoint, cloud, workloads, Internet of Things, and mobile.

CyberArk Software ( - an Identity management company, headquartered in Tel Aviv, The stock is also remained unchanged since the attack. Together with its subsidiaries, develops and sales software-based security solutions and services in the United States, Israel, Europe, the Middle East, Africa, the United Kingdom, and internationally. Its solutions include Privileged Access Manager that offers risk-based credential security and session management to protect against attacks involving privileged access;

Palo Alto Networks ( - made acquisitions in the region and close to acquiring more Israeli start ups. The company offers firewall appliances and software; and Panorama, a security management solution for the global control of network security platform as a virtual or a physical appliance.

Rapid7 ( offers a cloud-native insight platform that enables customers to create and manage analytics-driven cybersecurity risk management programs. Its platform includes InsightIDR, an incident detection and response solution;

Crowd strike ( - CrowdStrike Holdings, Inc. is an American cybersecurity technology company based in Austin, Texas. It provides cloud workload and endpoint security, threat intelligence, and cyberattack response services. The company has been involved in investigations of several high-profile cyberattacks

These companies have been moving upwards, in comparison to QQQS, the broader tech ETF, which is in relative decline.

Most Israeli firms in this space, although based in Tel Aviv, are listed on US exchanges. They also appear as key components in ETFs based on software security. Some of the most popular include:

  • Global X Cybersecurity ETF (
  • First Trust Nasdaq Cybersecurity ETF (
  • iShares Cybersecurity & Tech ETF (IHAK)

Cyber-attacks clearly have the potential to disrupt or damage government systems and businesses. This, therefore remains a key sector to watch, as cyberattacks only seem to be intensifying. Now more than ever, with one of the powerhouses of security software has come under attack.

Kalin Tsenov

Product Specialist

Kalin Tsenov has a strong research background in economics with specific interests in Geopolitics and its impact on the Financial Markets.

He joined FXCM in 2018 after obtaining a Bachelor's Degree from Leeds Metropolitan University. Initially starting as a Business Analyst in the Payment Solutions department, he is currently a Product Specialist in the Firms Product & Strategy department.

${} / ${getInstrumentData.ticker} /

Exchange: ${}

${} ${getInstrumentData.divCcy} ${getInstrumentData.priceChange} (${getInstrumentData.percentChange}%) ${getInstrumentData.priceChange} (${getInstrumentData.percentChange}%)

${getInstrumentData.oneYearLow} 52/wk Range ${getInstrumentData.oneYearHigh}

Any opinions, news, research, analyses, prices, other information, or links to third-party sites contained on this website are provided on an "as-is" basis, as general market commentary and do not constitute investment advice. The market commentary has not been prepared in accordance with legal requirements designed to promote the independence of investment research, and it is therefore not subject to any prohibition on dealing ahead of dissemination. Although this commentary is not produced by an independent source, FXCM takes all sufficient steps to eliminate or prevent any conflicts of interests arising out of the production and dissemination of this communication. The employees of FXCM commit to acting in the clients' best interests and represent their views without misleading, deceiving, or otherwise impairing the clients' ability to make informed investment decisions. For more information about the FXCM's internal organizational and administrative arrangements for the prevention of conflicts, please refer to the Firms' Managing Conflicts Policy. Please ensure that you read and understand our Full Disclaimer and Liability provision concerning the foregoing Information, which can be accessed here.

Past Performance: Past Performance is not an indicator of future results.

Spreads Widget: When static spreads are displayed, the figures reflect a time-stamped snapshot as of when the market closes. Spreads are variable and are subject to delay. Single Share prices are subject to a 15 minute delay. The spread figures are for informational purposes only. FXCM is not liable for errors, omissions or delays, or for actions relying on this information.