High-Speed Combat Ship Joins Fleet for Coastal Missions

0
A new 3,000-ton littoral combat ship (LCS) capable of advanced anti-submarine and surface warfare operations has officially entered service with the U.S. Navy. Named...
AI generated image

Technology Trend Review from Milipol (Paris 2025) – A High-Level Snapshot...

0
Written by Or Shalom Milipol Paris 2025, held in Paris on November 18th-21st, 2025, presented an impressive high-level snapshot of the entire homeland security and...
Image from Lockheed Martin on YouTube

Military Helicopter Flown Remotely via Touchscreen

0
Flying helicopters in contested environments is becoming increasingly hazardous, particularly as modern air defenses and electronic warfare systems grow more advanced. Traditional crewed operations...

TAK Turns Smartphones into Battlefield Coordination Tools

0
Over the past decade, the Tactical Assault Kit (TAK) has grown from a research experiment into one of the most widely used digital tools...
AI generated image

Israel Tests Operational Use of Drones in Civilian and Security Services

0
Israel’s National Drone Initiative has entered a new stage aimed at testing the continuous operation of drone systems in real-world environments — moving beyond...

GPS-Free Navigation: How Robots Are Learning from Insects, Birds, and Rodents

0
Autonomous robots face a persistent challenge - navigating complex, unpredictable environments without human intervention. Standard navigation systems typically rely on GPS to locate a...

Counter-Drone Technology Market Nears $2 Billion Amid Rising Demand

0
DroneShield was originally founded around a small scientific initiative - a laser system for detecting and neutralizing mosquitoes - but operational realities in recent...

AI Systems Become More Helpful — and More Exposed

0
OpenAI’s recent discussion on the future of AI has put a spotlight on a challenge that is quickly moving from academic debate to operational...
Image by Wikipedia's Creative Commons

Improved Missile Sensors Boost Counter-Drone Defenses

0
Small, low-flying drones present a growing challenge for air defenses worldwide. These one-way attack UAVs, such as Iran’s Shahed-136, are difficult to detect and...

$75M For a New Platform Addressing Hidden Risks in Enterprise AI...

0
Israeli cloud-security startup Sweet Security has secured a $75 million Series B round, and with it introduced a broadened platform designed to surface the...

A Rising Tide of Acquisitions: Israeli Technologies Fuel the Next Phase...

0
Israel’s defense-technology sector has entered a period of accelerated consolidation, with eight companies acquired over the past three months by major international defense and...

AI System Transforms Cyber Threat Intelligence into Actionable Insights

0
A new artificial intelligence tool is changing how cybersecurity teams understand and respond to threats. U.S.-based startup Tidal Cyber has introduced NARC (Natural Attack...

The Hidden Trail Behind 3D-Printed Weapons

0
3D printing is often celebrated for its ability to produce toys, tools, and prototypes quickly, but the technology can also be exploited for illegal...

99% Accuracy: How Never Mine is Shaping the Future of Demining

0
Never Mine is a graduate of the INNOFENSE Innovation Center operated by iHLS in collaboration with IMoD. This unique acceleration program removes entrance barriers to the...

Security Screening Moves Forward—Literally—with Walkthrough Tech

0
A next-generation security screening system using advanced microwave imaging is being deployed at airports across the United States, offering a faster and more discreet...

The Growing Trend of Defense Innovation Through Startup Collaboration

0
Defense ministries in Israel, the United States, and the United Kingdom are reshaping how new technologies enter military service, placing startups and agile innovation...

Android Exploit Can Extract Anything on Your Screen Without Permissions

0
A newly published academic study has revealed a high-severity Android vulnerability that allows attackers to extract sensitive on-screen content—including two-factor authentication (2FA) codes and...

Cyberattack on Power Cooperatives Raises Concerns Over Critical Infrastructure Security

0
Two electric cooperatives in Texas have reportedly been targeted in a ransomware campaign, with cybercriminal group Qilin claiming responsibility. The group, known for its...

Satellite Communications Found Wide Open to Interception with Basic Equipment

0
A recent academic study has uncovered a major vulnerability in satellite communications: vast amounts of sensitive data—including military and industrial information—are being broadcast unencrypted...
image provided by pixabay

North Korean Crypto Theft Tops $2 Billion in 2025, Marking Record...

0
The year isn’t even over yet, but cyber groups linked to North Korea have already made 2025 their most profitable year to date, stealing...
image provided by pixabay

Wi-Fi Networks Can Now Identify You—Even Without a Device

0
New research has revealed that standard Wi-Fi networks can be used to identify individuals—even if they are not carrying a phone or any connected...
Image by Unsplash

The Rise of AI-Driven Ransomware Groups

0
New analysis by blockchain intelligence firm TRM Labs has revealed the emergence of at least nine previously unknown ransomware groups over the past year,...

Latest

Turning Earthquake Detectors into Aircraft Trackers

0
Technology designed to detect earthquakes is now showing unexpected potential in airspace monitoring. Researchers at the University of Alaska Fairbanks have demonstrated that seismic...