Connect with us

Technology

Iran networks suffer losses amid airstrikes, showing digital evolution of conflicts

Published

on

Iran networks suffer losses amid airstrikes, showing digital evolution of conflicts

NEWYou can now listen to Fox News articles!

When missiles fly, we expect explosions. We expect smoke, sirens and satellite images. What we do not expect is silence. 

On February 28, 2026, as fighter jets and cruise missiles struck Iranian Revolutionary Guard command centers during Operation Roar of the Lion, a parallel assault reportedly unfolded in cyberspace. 

Official news sites and key media platforms went offline, government digital services and local apps failed across major cities, and security communications systems reportedly stopped functioning, plunging Iran into a near-total digital blackout.

According to NetBlocks, a global internet monitoring organization that tracks connectivity disruptions, nationwide internet traffic in Iran plunged to just 4 percent of normal levels. 

Advertisement

That level of collapse suggests either a deliberate state-ordered shutdown or a large-scale cyberattack designed to paralyze critical infrastructure. Western intelligence sources later indicated the digital offensive aimed to disrupt IRGC command and control systems and limit coordination of counterattacks. 

For the United States and its allies, the episode offers a stark reminder that modern conflict now blends airstrikes with digital warfare in ways that can ripple far beyond the battlefield.

In a matter of hours, modern conflict looked less like tanks and more like a blinking cursor.

Sign up for my FREE CyberGuy Report 

Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter    

Advertisement

Iran’s national symbols stand in contrast to reports of a sweeping digital blackout that reportedly disrupted communications and critical systems across the country. (Kurt “CyberGuy” Knutsson)

Iran internet shutdown: A country offline in real time

Reports described widespread outages across Iran. Official news sites stopped functioning. IRNA, Iran’s state-run news agency, went offline. 

Tasnim, a semi-official news outlet closely aligned with the Islamic Revolutionary Guard Corps, reportedly displayed subversive messages targeting Supreme Leader Ali Khamenei. 

THINK YOUR NEW YEAR’S PRIVACY RESET WORKED? THINK AGAIN

The IRGC, Iran’s powerful military and intelligence force, plays a central role in national security and regional operations. At the same time, local apps and government digital services failed in cities like Tehran, Isfahan and Shiraz.

Advertisement

This was not one website defaced for headlines. It appeared systemic. Electronic warfare reportedly disrupted navigation and communications systems. 

Distributed denial of service attacks, often called DDoS attacks, flooded networks with traffic to overwhelm and disable them. 

Deep intrusions targeted energy and aviation systems. Even Iran’s isolated national internet struggled under pressure. 

CHINA VS SPACEX IN RACE FOR SPACE AI DATA CENTERS

For a regime that tightly controls information, losing digital command creates both operational and political risk.

Advertisement

Why cyber warfare matters in the Iran conflict

Cyber operations offer something missiles cannot. They disrupt without always killing. They send a signal without immediately triggering full-scale war. That matters in a region where escalation can spiral fast. 

History shows Iran understands this logic. Between 2012 and 2014, Iranian actors targeted U.S. financial institutions in Operation Ababil. Saudi Aramco also suffered a major cyberattack. 

ARTIFICIAL INTELLIGENCE HELPS FUEL NEW ENERGY SOURCES

After Israeli strikes in 2025, cyberattacks targeting Israel surged dramatically within days.

Cyber retaliation lets leaders respond while limiting direct military confrontation. It buys leverage in negotiations. It creates pressure without necessarily crossing a red line.

Advertisement

But there is a catch. Every cyber strike risks miscalculation. And digital damage can spill into the real world fast if critical infrastructure is hit.

As military strikes targeted IRGC command centers, internet traffic inside Iran reportedly plunged to just 4 percent of normal levels.  (Kurt “CyberGuy” Knutsson)

If the blackout and strikes mark a turning point, Tehran has options. None are simple.

1) Cyberattacks against U.S. or allied infrastructure

Cyber retaliation remains one of Iran’s most flexible tools. It can range from disruptive attacks and influence campaigns to more targeted intrusions that pressure critical services. Recent expert commentary warns that U.S. cyber defenses and the private sector could face sustained testing.

2) Targeting U.S. drones and unmanned systems

Iran has used drones and electronic interference as signals before. Analysts continue to flag jamming, spoofing and harassment of unmanned systems as a way to raise costs without immediately striking large numbers of personnel.

Advertisement

3) Maritime attacks in the Strait of Hormuz

This risk is rising fast. An EU naval mission official reportedly said IRGC radio transmissions warned ships that passage through Hormuz was “not allowed”. Greece has also urged ships to avoid high-risk routes and warned about electronic interference that can disrupt navigation. Insurers are already repricing the danger, with reports of war-risk policies being canceled or sharply increased.

4) Support for allied or informal armed groups

Iran has long worked with allied forces and militias in the region, and some of those groups could step up attacks on U.S. interests or allied partners in retaliation, widening the clash without direct state-to-state engagement.

5) Limited ballistic missile strikes

Missile strikes remain a high-impact option, but they raise the odds of rapid escalation. Recent expert analysis continues to frame them as a tool Iran may use for signaling, especially if leadership feels cornered.

Tehran’s skyline, including the Azadi Tower, became the backdrop to a crisis shaped as much by cyber disruption as by missiles in the sky.  (Kurt “CyberGuy” Knutsson)

The escalation risk between the U.S. and Iran

Here is the uncomfortable truth. Neither Washington nor Tehran likely wants a full-scale regional war. In moments like this, military strikes rarely stand alone. 

Advertisement

They often move alongside diplomacy. Leaders send signals. They apply pressure. At the same time, they try to leave room for talks.

But escalation has momentum. Each missile changes the equation. Each casualty raises the stakes. The more damage done, the harder it becomes to step back. 

5 SIMPLE TECH TIPS TO IMPROVE DIGITAL PRIVACY

Fear plays a role. So does pride. Domestic audiences demand strength. Leaders feel pressure to respond in kind. That is how limited strikes can spiral into something much larger.

What the Iran cyberattack blackout means for global cybersecurity

This episode highlights something bigger than regional tension. Nation-states now pair kinetic strikes with digital offensives. 

Advertisement

Cyberattacks can blind communications, freeze infrastructure and disrupt financial systems before the world even processes the first explosion.

TRUMP TELLS IRANIANS THE ‘HOUR OF YOUR FREEDOM IS AT HAND’ AS US-ISRAEL LAUNCH STRIKES AGAINST IRAN

For businesses and individuals, that reality matters. Modern conflict no longer stays confined to battlefields. 

Supply chains, energy grids and online platforms can feel the ripple effects. The blackout in Iran serves as a reminder that digital resilience is now a national security issue. 

How to stay safe during rising cyber tensions

When a country’s internet can plunge to just 4 percent of normal traffic in hours, it is a reminder that cyber conflict can escalate quickly. 

Advertisement

Even if the disruption happens overseas, global networks are interconnected. Financial systems, supply chains and online platforms can feel the ripple effects.

You cannot control geopolitics. You can control your digital hygiene. Here are practical steps to reduce your personal risk during periods of heightened cyber activity:

Install strong antivirus software to guard against state-linked phishing and malware campaigns that often spike during geopolitical conflicts. 

Nation-state actors frequently exploit breaking news and global instability to spread malicious links and ransomware. Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com

Keep devices updated so security patches close vulnerabilities that attackers often exploit during global cyber spikes.

Advertisement

WORLD LEADERS SPLIT OVER MILITARY ACTION AS US-ISRAEL STRIKE IRAN IN COORDINATED OPERATION

Use strong, unique passwords stored in a reputable password manager to protect your accounts if cyber retaliation campaigns expand beyond government targets. Check out the best expert-reviewed password managers of 2026 at Cyberguy.com

Enable two-factor authentication (2FA) on financial, email and social accounts to safeguard access in case stolen credentials circulate during heightened cyber conflict.

Be cautious with urgent headlines or alerts about international conflict, since attackers frequently mimic breaking news.

Monitor financial accounts for unusual activity in case broader disruptions spill into banking systems.

Advertisement

When tensions rise, phishing campaigns often rise with them. Threat actors exploit fear and confusion. Staying disciplined with basic security habits makes you a harder target if malicious traffic increases.

Take my quiz: How safe is your online security?

Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com        

Kurt’s key takeaways

The reported cyber blackout inside Iran may signal a new chapter in modern conflict. Jets and missiles still matter. But so do servers, satellites and code. Leaders may try to contain the damage while showing strength. 

Still, history shows how quickly careful plans can unravel once pressure builds. War today runs on electricity and bandwidth as much as fuel and ammunition. 

Advertisement

When networks go dark, the impact does not stay on a battlefield. It spills into banking systems, airports, hospitals and the phones in our pockets. That is what makes this moment different.

If an entire nation’s digital systems can be disrupted in hours, how prepared is your community if something similar ever hits closer to home?  Let us know by writing to us at Cyberguy.com

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter 

Copyright 2026 CyberGuy.com.  All rights reserved. 

Advertisement

Related Article

149 million passwords exposed in massive credential leak

Technology

Aether OS is a computer in a browser built for the AT Protocol

Published

on

Aether OS is a computer in a browser built for the AT Protocol

Aether OS puts a full-fledged desktop in your browser that ties directly into the AT Protocol. That means it connects to your Bluesky account and other public records. It offers a pretty full suite of apps, 42 in total, covering text editing, task management, and social media. There’s even a rudimentary tracker for making chiptunes, a DAW, and a video editor.

Of course, part of the appeal is also the cyberpunk good looks that draw obvious inspiration from The Matrix.

Right now, the project is in alpha, and there are a lot of rough edges. Documentation is also basically non-existent. So, if you get stuck trying to use an app, you’re kind of SOL. Oh, and nothing is encrypted or permissioned, so be careful what you store — it’s all publicly visible.

Continue Reading

Technology

CarGurus breach linked to ShinyHunters exposes 12.4M records

Published

on

CarGurus breach linked to ShinyHunters exposes 12.4M records

NEWYou can now listen to Fox News articles!

If you’ve ever searched for a car on CarGurus, your personal information could now be circulating online. A hacking group known as ShinyHunters has published what it claims are 12.4 million records taken from CarGurus, a popular auto shopping platform used by millions of people each month.

The leaked data includes names, phone numbers, email addresses, physical addresses and even finance pre-qualification details. While most of the records were already exposed in past incidents, about 3.7 million are newly added to the pile. That means fresh data is now freely available for criminals to download.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

149 MILLION PASSWORDS EXPOSED IN MASSIVE CREDENTIAL LEAK

Advertisement

A hacker group known as ShinyHunters claims it leaked 12.4 million records linked to the car shopping platform CarGurus. (Wei Leng Tay/Bloomberg via Getty Images)

What you need to know about the CarGurus breach

The group behind the leak, ShinyHunters, published a 6.1GB file on Feb. 21, claiming it came from CarGurus. The file allegedly contains 12.4 million user records tied to the U.S.-based auto research and shopping platform CarGurus.

CarGurus operates in the U.S., Canada and the U.K., and its website attracts an estimated 40 million monthly visitors. It allows you to compare vehicles, contact sellers, and, in some cases, apply for financing.

According to Have I Been Pwned, which later added the dataset to its breach database, the exposed information includes email addresses, IP addresses, full names, phone numbers, physical addresses, account IDs, dealer details, subscription information and finance pre-qualification application data, along with outcomes.

Have I Been Pwned reports that about 70% of the data had already appeared in previous breaches. Roughly 3.7 million records are new. CarGurus has not released an official statement confirming the incident and did not respond to media requests for comment. ShinyHunters is known for leaking company data when ransom negotiations fail. The group has recently claimed attacks on major brands across telecom, retail, finance, and tech.

Advertisement

How it works and why it matters to you

ShinyHunters typically gains access by tricking employees, not by smashing through firewalls. In past cases, the group used phone calls or fake login pages to convince staff to hand over credentials. Once inside, attackers can quietly access cloud systems that store customer data.

In some campaigns, they also convinced employees to install malicious apps that granted access to customer databases. That means attackers could read stored information without triggering obvious alarms. If this dataset is legitimate, criminals now have detailed personal profiles tied to car shopping and financing activity, which is valuable.

Finance pre-qualification data is especially sensitive. Even if it does not include full Social Security numbers, it signals that you were actively sharing financial details. That makes you a prime target for follow-up scams, identity theft attempts and fake loan offers. Because the data is publicly available for download, it does not take much skill for criminals to start using it.

“We recently experienced a cybersecurity incident,” a CarGurus spokesperson told CyberGuy. “We promptly responded by securing the affected environment, and we are currently working with a leading cybersecurity firm to investigate. Based on the investigation to date, we believe the activity has been contained and limited in scope. Also, at this time, there are no indications that dealer data feeds, APIs, or core systems or products used by our consumers or dealer partners have been compromised. We remain fully operational, and our services continue without interruption. We will notify any affected individuals in accordance with applicable laws.”

DATA BREACH EXPOSES 400,000 BANK CUSTOMERS’ INFO

Advertisement

7 ways you can protect yourself from the CarGurus breach

Here’s what you can do right now to reduce your risk and stay ahead of potential scams tied to this leak.

1) Check if your email and passwords are compromised

To see if your email was affected, visit Have I Been Pwned at haveibeenpwned.com. Enter your email address to find out if your information appears in the CarGurus leak. When done, come back here for Step 2.

The exposed dataset reportedly includes names, emails, phone numbers, addresses and finance pre-qualification details. (Felix Zahn/Photothek via Getty Images)

2) Change your passwords immediately

Start with your most important accounts, such as email, medical and banking. Use strong, unique passwords with letters, numbers and symbols. Avoid predictable choices like names or birthdays. Never reuse passwords. One stolen password can unlock multiple accounts.  A password manager makes this simple. It stores complex passwords securely and helps you create new ones. Many managers also scan for breaches to see if your current passwords have been exposed. Use a password manager to generate strong, unique passwords for every account and store them securely. That way, if one account is exposed, criminals can’t use the same password to access the rest of your accounts. Check out the best expert-reviewed password managers of 2026 at Cyberguy.com.

3) Reduce your online exposure with a data removal service

You can also consider a personal data removal service. While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

Advertisement

Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

4) Turn on two-factor authentication

If CarGurus or your email provider offers two-factor authentication (2FA), enable it. This adds a second step, like a code sent to your phone, making it much harder for someone to access your account even if they have your password.

5) Watch for finance-related phishing scams

Be extra cautious with emails or texts about car loans, financing approvals, or dealership follow-ups. Do not click links in unsolicited messages. Instead, contact the company directly using the official contact details you find on their website. Also, use strong antivirus software to block malicious links and downloads that often follow phishing campaigns. If attackers use this leaked data to target you with infected attachments, antivirus protection adds another layer of defense.

Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

Advertisement

6) Monitor your credit reports

If you applied for financing, check your credit reports for unfamiliar inquiries or new accounts. Early detection can help you stop identity theft before it spirals. Consider placing a credit freeze if you see suspicious activity.

7) Consider identity theft protection

Identity theft protection services can monitor for unusual activity tied to your name, Social Security number, or financial accounts. They can alert you quickly if someone tries to open a new credit card in your name.

See my tips and best picks on Best Identity Theft Protection at Cyberguy.com.

Security experts warn the leaked information could be used for phishing scams, fake loan offers and identity theft. (iStock)

Kurt’s key takeaway

This incident highlights a bigger issue than just one company. When platforms collect detailed financial and personal data, they become high-value targets. If the leaked dataset is authentic, millions of people who were simply shopping for a car now face increased risk of scams. CarGurus has not publicly confirmed a breach. Customers deserve clarity when sensitive financial application data may be involved. Silence only increases uncertainty.

Advertisement

Should companies that collect financing data be required to publicly confirm or deny breaches within a set timeframe?  Let us know by writing to us at Cyberguy.com.

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Sign up for my FREE CyberGuy Report 
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

Copyright 2026 CyberGuy.com. All rights reserved. 

Advertisement
Continue Reading

Technology

Sotomayor’s Wabi Sabi is the funnest record of 2026

Published

on

Sotomayor’s Wabi Sabi is the funnest record of 2026

Shout out to subscriber N_Gorski for today’s pick. They popped into the comments on last week’s recommendation to ask what I thought of the new Sotomayor record. Well, I hadn’t actually heard it yet, but now I’m obsessed.

The group consists of siblings Raul and Paulina Sotomayor from Mexico City. Wabi Sabi is their first record since 2020’s Origenes, and it is pure joy. You can look back through everything I’ve recommended over the last several months, and “fun” is not how you’d describe most of it. But that’s what Wabi Sabi is — it’s fun, chaotic, and dancey as hell.

I was only familiar with Sotomayor before this because of a short documentary about Raul’s various projects made by Ableton. In that video, he discusses how his approach to making music has changed over the years. How he used to try to make things sound “proper” and “clean,” but now it’s about “how much can we distort it” or “how much can we stretch it.”

You can certainly hear that in the music. The first track, “Me dejo llevar,” opens with a synth arpeggio that has clearly been timestretched to within an inch of its life. It’s loaded with digital artifacts. The whole track has a light crust, as if everything is clipping just ever so slightly. “Who’s there” similarly bristles as the edges, sounding like a dance floor constantly on the verge of erupting into a riot.

The vintage electronic drum hits, droning bass, and reverb-drenched noise stabs never reach full catharsis, but simmer beautifully into album highlight “Vida.” Here, Paulina finds a sultry gear as she croons over a UK garage-inflected track that eventually erupts into an afrohouse club banger.

Advertisement

Wabi Sabi ricochets between genres with infectious abandon. Afrobeat, cumbia, electro pop, R&B, and more all collide in what is easily the most fun album of 2026 so far. What makes it all the more impressive is that, for all its unconventional sounds (a donkey jaw?) and stylistic excursions, Sotomayor still has a distinct vision that holds the record together.

At no point does the chaos threaten to overwhelm. Never does it feel like the duo are simply throwing things at the wall to see what sticks; everything is a carefully made decision in service of the party. The gently meandering guitar of “Yo se todo de ti,” the classic house of “Todo se derrumba,” and the dancehall of “Prende la palma” all feel unified by Paulina’s undeniable charisma on the mic and Raul’s uninhibited sonic curiosity.

Continue Reading

Trending