{
"$type": "site.standard.document",
"bskyPostRef": {
"cid": "bafyreigrifppwma5nxuermc7ywe5gnymifum5y6ndhugontb4pst3en5u4",
"uri": "at://did:plc:naqptdjsmmrfcjddxoz4om5v/app.bsky.feed.post/3mg274lh2m2d2"
},
"coverImage": {
"$type": "blob",
"ref": {
"$link": "bafkreicxg26555qgy4eqiygcqxlvbef4w3pnimrjjm72bherskwctntndu"
},
"mimeType": "image/jpeg",
"size": 1080856
},
"path": "/2026/03/heres-how-cyber-could-have-been-used-to-target-iran-in-operation-epic-fury/",
"publishedAt": "2026-03-01T20:19:57.000Z",
"site": "https://breakingdefense.com",
"tags": [
"Networks & Digital Warfare",
"cyber security",
"Iran",
"Middle East",
"networks",
"Operation Epic Fury",
"technology"
],
"textContent": "\n\nCyber operations were almost certainly used against Iran in the early hours of Operation Epic Fury. Here’s how it may have played out.",
"title": "Here’s how cyber could have been used to target Iran in Operation Epic Fury"
}