The impact of AI on cybersecurity is transforming the methods we use to secure digital platforms. It is both providing attackers with sophisticated new...
Are you a startup company related to the security sector? Are you looking for recognition, international exposure, access to investors, and the ability to...
Offshore wind farms require robust cyberinfrastructure to operate and communicate with, which unfortunately means they are vulnerable to cyber threats.
A new study by researchers...
Account takeover attacks consist of a hacker gaining unauthorized access to online accounts. Computer science researchers developed a new way to identify security weaknesses...
Microsoft was attacked by the Russian hacking group Midnight Blizzard, which reportedly broke into its corporate networks on January 12 and stole some sensitive...
Are you a startup company related to the security sector? Are you looking for recognition, international exposure, access to investors, and the ability to...
Smartphone ambient light sensors are used to automatically adjust screen brightness, but researchers reveal that they can be turned into cameras and used to...
The Australian government revealed its response to managing safe and responsible AI this week, as was announced by federal Minister for Industry and Science,...
Large language models (known as LLMs) are deep learning-based models that are trained to generate, summarize, translate, and process written texts. While such models...
Multiple extortion attempts were conducted by threat actors who posed as legitimate security researchers and promised to hack into the infrastructure of original ransomware...
Internet of Things (IoT) devices nowadays are prominent in almost every area of our lives, industry, and critical infrastructures. These permanently connected smart devices...
Researchers found records containing the private data of hundreds of millions of Brazilian citizens, fully accessible online on Elasticsearch, available to threat actors, and...
Project Mockingbird is computer security company McAfee's latest breakthrough designed to arm consumers against the growing threat of online deepfake scams and was revealed...
A new report by TRM Labs reveals the culprits responsible for nearly 33% of all cryptocurrencies stolen through hacking incidents in 2023 – North Korea.
The report...
A new report by Computer scientists from the National Institute of Standards and Technology presents new kinds of cyberattacks that can “poison” AI systems.
AI...
As threat actors use artificial intelligence to their advantage, it’s essential that organizations evolve along with them to respond to and prevent these threats.
One...
Researchers from Singapore managed to trick three chatbots- ChatGPT, Google Bard, and Microsoft Bing- into breaking the rules, then turned them against each other.
A...
Written by Or Shalom
OT (Operation Technologies) is in charge of physical operational processes for different needs in various sectors. They function as production lines...
17-year-old Kai Zhuang, a Chinese exchange student, was reportedly found freezing in a tent in Utah after being reported missing by his high school....
The operator of Europe's largest parking app EasyPark Group was recently a victim of a major data breach that compromised the personal information of...