This post is also available in:
עברית (Hebrew)
Latest Articles
Compact Foldable Drone Demonstrates Fast Deployment and Instant Stability
A research team of students at Texas A&M University has developed a compact micro air vehicle (MAV) that can be launched by hand and...
Malicious Apps Masquerade as WhatsApp and Chrome Through Google Search Manipulation
A new cyberattack technique is using Google Search to distribute malware disguised as widely used applications such as WhatsApp, Telegram, Chrome, and others. Security...
AI Tools Are Reshaping the Way the Military Prepares for Conflict
At Johns Hopkins University Applied Physics Laboratory (APL), researchers are refining a pair of artificial intelligence tools that could significantly change how the U.S....
Switchblade 600 Successfully Launched from MQ-9A Reaper in Long-Range Strike Test
A recent demonstration in Arizona marked a significant advancement in integrating loitering munitions with unmanned aerial platforms. The test involved launching a Switchblade 600...
Top Topics
Open-Source AI Platform Automates Full-Scale Cyber Attacks
A new open-source AI framework is rapidly transforming how cyberattacks are carried out—by automating them. HexStrike AI, a publicly available multi-agent platform, enables attackers...
Passkeys Are Not Immune: New Research Highlights Critical Vulnerability
A recent investigation by Proofpoint security researchers has revealed a serious vulnerability in passkey-based authentication systems, raising concerns over their current level of protection...
Security Testing Reveals Major Vulnerabilities in GPT-5’s Default Configuration
Recent evaluations of OpenAI’s latest large language model, GPT-5, have revealed serious security shortcomings in its unmodified state, raising concerns about its readiness for...
Study Warns of Hidden Risks in AI Training as Models Inherit...
A new study highlights a growing concern in artificial intelligence development: models trained on AI-generated data may quietly absorb undesirable or dangerous behaviors—without developers...
Video News
Liquid360 – Transforming Surveillance with Augmented Reality
In a country frequently targeted by terror attacks, public safety is a top concern, and effective surveillance plays a crucial role. For this reason,...
New Bipedal Humanoid Robot is Capable of Interacting with Humans
Chinese robotics company Pudu Robotics has unveiled its first full-sized bipedal humanoid robot, the PUDU D9, marking an advancement in the field of robotics....
HLS
Malicious Apps Masquerade as WhatsApp and Chrome Through Google Search Manipulation
A new cyberattack technique is using Google Search to distribute malware disguised as widely used applications such as WhatsApp, Telegram, Chrome, and others. Security...
AI-Driven Fire Detection System Promises Faster, More Reliable Alerts
Researchers at NYU Tandon School of Engineering have developed an AI system capable of detecting fires much earlier than traditional smoke detectors, potentially saving...
Unmanned Systems & Robotics
Compact Foldable Drone Demonstrates Fast Deployment and Instant Stability
A research team of students at Texas A&M University has developed a compact micro air vehicle (MAV) that can be launched by hand and...
Switchblade 600 Successfully Launched from MQ-9A Reaper in Long-Range Strike Test
A recent demonstration in Arizona marked a significant advancement in integrating loitering munitions with unmanned aerial platforms. The test involved launching a Switchblade 600...
Smart City
Safer City, Less Privacy? Drone Usage for Emergency Response Sparks Criticism
The New York Police Department (NYPD) has ramped up the use of drones for emergency response, introducing a new level of aerial surveillance over...
AI-Assisted Digital Twin Could Revolutionize Smart Cities and More
A breakthrough in digital twin technology could transform how industries such as logistics, healthcare, and defense operate, with the potential to reshape smart cities....
Cyber
Malicious Apps Masquerade as WhatsApp and Chrome Through Google Search Manipulation
A new cyberattack technique is using Google Search to distribute malware disguised as widely used applications such as WhatsApp, Telegram, Chrome, and others. Security...
Popular AI Apps Expose Sensitive Data
A security lapse involving Vyro AI, the company behind well-known generative AI apps, has exposed sensitive user data from millions of users. The breach,...
New Products
Compact Foldable Drone Demonstrates Fast Deployment and Instant Stability
A research team of students at Texas A&M University has developed a compact micro air vehicle (MAV) that can be launched by hand and...
AI Tools Are Reshaping the Way the Military Prepares for Conflict
At Johns Hopkins University Applied Physics Laboratory (APL), researchers are refining a pair of artificial intelligence tools that could significantly change how the U.S....
INTERNET OF THINGS (IOT)
Class-Action Lawsuit Against Amazon Over Alexa Privacy Concerns Underway
A significant privacy case against Amazon is unfolding, as a Seattle federal judge has granted permission for tens of millions of Alexa users to...
Iran Hacks Security Cameras to Monitor Israeli Movements in Real Time
A recent cybersecurity warning has revealed that Iran is actively exploiting weaknesses in internet-connected home security cameras across Israel, using them to monitor military...
Future Forces
Composite Metal Foam: The Future of Ballistic Armor and Heat Insulation
A revolutionary new material, Composite Metal Foam (CMF), is poised to transform various industries, from aerospace to military and even transportation. After years of...
Synthetic AI-Generated Data Can Be Crucial for the Defense Industry
At the CES 2025 Global Media Meetup held on December 13 in Seoul, GenGen AI, a rising startup specializing in artificial intelligence, unveiled its...