Organizations

Organizations

image provided by pixabay

Armies worldwide are beginning to use more and more AI-based modules, which raises the risk of adversaries poisoning those modules and sabotaging the algorithms,...
image provided by pixabay

New report by cybersecurity company Check Point reveals that the first quarter of 2024 showed a significant increase in cyberattacks, with the most heavily...
images provided by pixabay

Google has filed a lawsuit against a group of crypto scammers for defrauding over 100,000 people worldwide by uploading fraudulent investment and crypto exchange...
images provided by pixabay

The healthcare industry needs to wake up and focus on securing its infrastructure. We have reported on many cyberattacks on various health infrastructures, hospitals, and...
image provided by pixabay

This news was initially reported by the Russian state-run RIA Novosti news agency, just weeks after Houthi rebels hinted at the “surprises” they have for the...
image provided by pixabay

Microsoft set to release Copilot for Security AI tool to help cybersecurity workers produce summaries of suspicious incidents and identify hackers’ methods to conceal...
image provided by Alumor

Alumor is a graduate of the INNOFENSE Innovation Center operated by iHLS in collaboration with IMoD. For life to occur, it needs safe drinking water,...
image provided by pixabay

It is speculated that Yemen’s Houthi rebels cut three cables under the Red Sea that provide global internet and telecommunications, though it is still...
images provided by pixabay

China is planning to develop a Moon surveillance system to protect its Lunar assets, which will reportedly have millions of sensors and cameras for...
image provided by pixabay

This historic mission to inspect and monitor a large piece of space junk was launched by Rocket Lab and Astroscale Japan atop an Electron...
Hardware. image by pixabay

A major new report calls for the regulation of the hardware that underpins all AI ("compute") to help prevent artificial intelligence misuse and disasters. Several...
image provided by pixabay

Social media platforms on the internet are constantly flooded with huge amounts of content, and this vast ocean of material needs to be constantly...
image provided by pixabay

Yemen’s Iran-backed Houthis have been continuously attacking ships off the coast of Yemen since the beginning of Israel’s war with Hamas, claiming they will...
image provided by pixabay

Charles Harry is a former National Security Agency cyberwarfare expert and director of the University of Maryland's Center for Governance of Technology and Systems,...
image provided by pixabay

Australia's EOS Space and Japan's EX-Fusion combat space debris with a laser system, which could be a crucial fix for the increasingly crowded Earth...
image provided by pixabay

The impact of AI on cybersecurity is transforming the methods we use to secure digital platforms. It is both providing attackers with sophisticated new...
images provided by pixabay

Are you a startup company related to the security sector? Are you looking for recognition, international exposure, access to investors, and the ability to...
image provided by pixabay

The EU has proposed a law to regulate AI, but human rights activists warn that it won’t be enough to protect the public from...
image provided by pixabay

Microsoft was attacked by the Russian hacking group Midnight Blizzard, which reportedly broke into its corporate networks on January 12 and stole some sensitive...
image provided by pixabay

The UK Armed Forces are closer than ever to having a powerful laser weapon that can hit targets with both high accuracy and low cost- the...
image provided by pixabay

Are you a startup company related to the security sector? Are you looking for recognition, international exposure, access to investors, and the ability to...
IoT. Image by pixabay

IoT (Internet of Things) networks connect user devices with everyday household and professional devices, but the challenge is reaching a balance between functionality and...