Counter Terror

Counter Terror

USB. image provided by pixabay

An explosive USB was used to target several journalists in Ecuador. When one of the journalists plugged in an unknown USB that he received device...
Image provided by pixabay

The FBI reported that it was "able to confirm" that Lazarus Group, also known as APT38, was behind the theft of around 100$ million...
Image provided by pixabay

Pentagon leaders have made it clear that, as they see it, the digital battlefield is the battlefield of the future. In spite of this...
Image provided by pixabay

The UK National Cyber Security Centre has issued a fresh alert about increasing attempts to steal information from specific groups and individuals, according to...
Image provided by pixabay

Recent data has showed an undeniable rise in DDoS (distributed denial of service) attacks. According to new NETSCOUT research, there is a significant link...
Image provided by pixabay

To succeed as a cybersecurity analyst, you need to understand the traits, values, and thought processes of hackers, along with the tools they use...
Image provided by pixabay

By: Or Shalom, HLS expert A decade has gone by since the Boston marathon bombing, and there is much insight that can be learnt by...
Image provided by pixabay

According to an interview conducted with the VMware Head of Cybersecurity Strategy Tom Kellerman, the rise in increasingly aggressive attacks is directly linked to...
Image provided by pixabay

As terrorism runs rampant and natural disasters call for innovative emergency responses, experts in the field reflect on what's next to come and this...
cyber security. image provided by pixabay

The US Attorney General has announced on that the FBI has dismantled a network of prolific ransomware actors, saving close to 130 million dollars...

Google threat analysis group terminated thousands of accounts which were linked to a pro-Chinese group that spread disinformation across social media. According to Google, the...
IoT. Image by pixabay

Experts say 2022 may have marked an inflection point due to the rapid proliferation of IoT (Internet of Things) devices. Cyber-attacks are evolving from those...
Image provided by pixabay

Cybercrime has grown to become the world’s third-largest economy after the US and China, according to the World Economic Forum (WEF). Based on data...
Image provided by pixabay

The UK National Cyber Security Centre (NCSC) published a warming this Thursday of phishing attacks led by Russian and Iranian state sponsored actors of...
security. image by pixabay

Many advancments and developments have happened over the course of 2022, many now asking what will happen in 2023? What will be the top...

One of the most infamous ransomware groups has recently issued a formal apology after it carried out an attack against Toronto’s Hospital for Sick...
Iranian civillians. image by pixabay

Iran has been using civilian airlines to transport military weapons such as attack UAVs and ballistic missiles to Syria for years, through the Iraqi...
Busy street. image by pixabay

The Federal Bureau of Investigation (FBI) has run over 390,000 facial recognition searches since 2011. The Department of Homeland Security has also said it...
Image sourced by pixabay

The fight against terrorism continues, and this time india is leading the charge. A master database of 21 databases will provide real-time information against terror...
Gun violence. image by pixabay

DAs gun violence in the U.S. continues to steadily increase, organizations and institutions such as educational campuses are seeking new ways to protect their...
weapons. image by pixabay

A new scanning solution uses advanced sensors and artificial intelligence to detect a wide range of concealed weapons and threats, such as firearms, metallic...
police officers. image by pixabay

Just like the rest of the world, the Law Enforcement field must invest in keeping up with modern technologies. To carry out efficient, smart...

Latest

image provided by pixabay