Organizations

Organizations

image provided by pixabay

AI investigative tools will be used to help find missing children and combat the advanced technology used by abusers and traffickers. Human traffickers and sexual...
image provided by pixabay

Chinese state-backed experts found a way to identify people who use Apple's encrypted AirDrop messaging service. Apple’s AirDrop service lets users send content to other...
image provided by pixabay

World Economic Forum (WEF) declares that the biggest short-term threat to the global economy is the current wave of AI-led misinformation and disinformation. Misinformation is...
Cyber intelligence. image by pixabay

As threat actors use artificial intelligence to their advantage, it’s essential that organizations evolve along with them to respond to and prevent these threats. One...
image provided by pixabay

Written by Or Shalom OT (Operation Technologies) is in charge of physical operational processes for different needs in various sectors. They function as production lines...
image provided by pixabay

ChatGPT has recently become one year old, and after changing our digital landscape forever, OpenAI is facing backlash after reports indicate that the bot...
quantum encryption

New Tool Deters Quantum-Powered Cyberattacks The Hong Kong and Shanghai Banking Corporation (HSBC) reportedly turned to quantum protection methods to protect a foreign exchange transaction...
images provided by pixabay

Microsoft Outlook was reportedly targeted over 10,000 times this summer by a single threat actor, which is believed to be aligned with Russia. Cybersecurity company...
image provided by pixabay

Meta, IBM and dozens of startups and researchers formed an alliance meant to defend a more open and collaborative artificial intelligence development, while leaving...
image provided by pixabay

Using OpenAI's products? Turns out your personal data is not as safe as you believed- Google researchers recently released a study in which they...
Hackers Target Israel in a New Cyberattack Operation

The US accuses Iran’s elite military government of using a nation-state threat group to launch attacks on its water sector as part of its...
image provided by pixabay

Japan's space agency was reportedly penetrated by a cyberattack by unknown entities, but according to officials, no sensitive information about rockets or satellites was...
image provided by pixabay

Lockheed Martin’s Precision Strike Missile (PrSM) has completed its minimum short-range qualification fire testing, passing a critical milestone. The PrSM is Lockheed Martin's offering for the company's...
image provided by pixabay

Meta, owner of Facebook, is barring political campaigns and advertisers in other regulated industries from using its new generative AI advertising products and denying...
image provided by pixabay

Due to the current security situation, the Technology Innovation Centre is pushing to find investors to support startups participating in its programs. The participating startups...
image provided by pixabay

The world's biggest chip company Nvidia and the iPhone maker Foxconn are reportedly joining forces to build what they call "AI factories". The companies...
image provided by pixabay

Meta has removed (or labeled as disturbing) over 795,000 pieces of content in Hebrew or Arabic that were related to the Hamas attack on...
image provided by pixabay

Tens of millions of dollars in crypto have been moved to Palestinian militants, with financial transactions linking them to Hezbollah and a sanctioned Russian...
images provided by pixabay

As can be seen reported across many news medias, Microsoft does not seem to be in a good spot at the moment, when it...
קרדיט לתמונה: אגף דוברות וקשרי ציבור במשרד הביטחון

A delegation of dozens of defense industries led by the Israeli Ministry of Defense attended one of the main security exhibitions in the world,...
image provided by pixabay

Written by Or Shalom Cyber crisis exercises have many benefits for the organization. The exercise allows experiencing scenarios (sometimes under conditions of uncertainty) and affects...
image provided by pixabay

Ukraine’s security agency claims that the Russian military intelligence service GRU can access compromised Android devices with a new malware called Infamous Chisel, which...