{
  "$type": "site.standard.document",
  "bskyPostRef": {
    "cid": "bafyreigrifppwma5nxuermc7ywe5gnymifum5y6ndhugontb4pst3en5u4",
    "uri": "at://did:plc:naqptdjsmmrfcjddxoz4om5v/app.bsky.feed.post/3mg274lh2m2d2"
  },
  "coverImage": {
    "$type": "blob",
    "ref": {
      "$link": "bafkreicxg26555qgy4eqiygcqxlvbef4w3pnimrjjm72bherskwctntndu"
    },
    "mimeType": "image/jpeg",
    "size": 1080856
  },
  "path": "/2026/03/heres-how-cyber-could-have-been-used-to-target-iran-in-operation-epic-fury/",
  "publishedAt": "2026-03-01T20:19:57.000Z",
  "site": "https://breakingdefense.com",
  "tags": [
    "Networks & Digital Warfare",
    "cyber security",
    "Iran",
    "Middle East",
    "networks",
    "Operation Epic Fury",
    "technology"
  ],
  "textContent": "\n\nCyber operations were almost certainly used against Iran in the early hours of Operation Epic Fury. Here’s how it may have played out.",
  "title": "Here’s how cyber could have been used to target Iran in Operation Epic Fury"
}