Are you a startup company related to the security sector? Are you looking for recognition, international exposure, access to investors, and the ability to...
Smartphone ambient light sensors are used to automatically adjust screen brightness, but researchers reveal that they can be turned into cameras and used to...
The Australian government revealed its response to managing safe and responsible AI this week, as was announced by federal Minister for Industry and Science,...
Large language models (known as LLMs) are deep learning-based models that are trained to generate, summarize, translate, and process written texts. While such models...
Multiple extortion attempts were conducted by threat actors who posed as legitimate security researchers and promised to hack into the infrastructure of original ransomware...
Internet of Things (IoT) devices nowadays are prominent in almost every area of our lives, industry, and critical infrastructures. These permanently connected smart devices...
Researchers found records containing the private data of hundreds of millions of Brazilian citizens, fully accessible online on Elasticsearch, available to threat actors, and...
Project Mockingbird is computer security company McAfee's latest breakthrough designed to arm consumers against the growing threat of online deepfake scams and was revealed...
A new report by TRM Labs reveals the culprits responsible for nearly 33% of all cryptocurrencies stolen through hacking incidents in 2023 – North Korea.
The report...
A new report by Computer scientists from the National Institute of Standards and Technology presents new kinds of cyberattacks that can “poison” AI systems.
AI...
As threat actors use artificial intelligence to their advantage, it’s essential that organizations evolve along with them to respond to and prevent these threats.
One...
Researchers from Singapore managed to trick three chatbots- ChatGPT, Google Bard, and Microsoft Bing- into breaking the rules, then turned them against each other.
A...
Written by Or Shalom
OT (Operation Technologies) is in charge of physical operational processes for different needs in various sectors. They function as production lines...
The operator of Europe's largest parking app EasyPark Group was recently a victim of a major data breach that compromised the personal information of...
The ever-evolving cybersecurity landscape promises to bring new cyber threat actors, vulnerabilities, and weaknesses to counter, and as technology evolves, so do cyber threat...
An Iranian cybergang called “Cyber Toufan” has leaked data from 49 Israeli firms according to threat Intelligence platform FalconFeedsio. The cybergang itself claimed responsibility...
According to a new report, some of the most active and dangerous ransomware groups in the world- like Akira, ALPHV/BlackCat, Lockbit, Royal, and Black...
The six-month-long Operation HAECHI IV was an international law enforcement effort targeting online financial crime, and it has resulted in nearly 3,500 arrests and...
Earlier this week, almost 70% percent of Iran’s gas stations were taken down by cybergang “Predatory Sparrow”, who claimed the attack.
When the Iranian Minister...