From hacking to cyber warfare