Counter Terror

Counter Terror

image provided by pixabay

The US Space Force may set up a direct line of communications with China’s space agency in order to deal with potential interplanetary emergencies,...
images provided by pixabay

Written by Or Shalom Preparations for the Olympics in France are at their peak, and so are the preparations in matters of security. The security...
image provided by pixabay

Over a hundred people were exposed by the Ukrainian police for being suspected of running online propaganda and misinformation campaigns. Computer equipment, mobile phones,...
Image provided by pixabay

Despite the rise in cyber attacks as a response to western involvement in the Ukraine-Russia war, Israel is still the most targeted nation by...
Image provided by pixabay

According to a recent Microsoft Treat Intelligence report, multiple Iranian state groups have turned to cyber-enabled influence operations more regularly since June 2022 to...
Image provided by pixabay

The Times of Israel reported that the Anonymous Sudan group claimed responsibility for hacking the website of the Israeli intelligence agency, Mossad. The group said...
Image provided by pixabay

According to recent updates by Elon Musk, Twitter will soon remove verification for those who refuse to pay. For those of you unfamiliar with Twitter's...
USB. image provided by pixabay

An explosive USB was used to target several journalists in Ecuador. When one of the journalists plugged in an unknown USB that he received device...
Image provided by pixabay

The FBI reported that it was "able to confirm" that Lazarus Group, also known as APT38, was behind the theft of around 100$ million...
Image provided by pixabay

Pentagon leaders have made it clear that, as they see it, the digital battlefield is the battlefield of the future. In spite of this...
Image provided by pixabay

The UK National Cyber Security Centre has issued a fresh alert about increasing attempts to steal information from specific groups and individuals, according to...
Image provided by pixabay

Recent data has showed an undeniable rise in DDoS (distributed denial of service) attacks. According to new NETSCOUT research, there is a significant link...
Image provided by pixabay

To succeed as a cybersecurity analyst, you need to understand the traits, values, and thought processes of hackers, along with the tools they use...
Image provided by pixabay

By: Or Shalom, HLS expert A decade has gone by since the Boston marathon bombing, and there is much insight that can be learnt by...
Image provided by pixabay

According to an interview conducted with the VMware Head of Cybersecurity Strategy Tom Kellerman, the rise in increasingly aggressive attacks is directly linked to...
Image provided by pixabay

As terrorism runs rampant and natural disasters call for innovative emergency responses, experts in the field reflect on what's next to come and this...
cyber security. image provided by pixabay

The US Attorney General has announced on that the FBI has dismantled a network of prolific ransomware actors, saving close to 130 million dollars...

Google threat analysis group terminated thousands of accounts which were linked to a pro-Chinese group that spread disinformation across social media. According to Google, the...
IoT. Image by pixabay

Experts say 2022 may have marked an inflection point due to the rapid proliferation of IoT (Internet of Things) devices. Cyber-attacks are evolving from those...
Image provided by pixabay

Cybercrime has grown to become the world’s third-largest economy after the US and China, according to the World Economic Forum (WEF). Based on data...
Image provided by pixabay

The UK National Cyber Security Centre (NCSC) published a warming this Thursday of phishing attacks led by Russian and Iranian state sponsored actors of...
security. image by pixabay

Many advancments and developments have happened over the course of 2022, many now asking what will happen in 2023? What will be the top...

Latest