Safer City, Less Privacy? Drone Usage for Emergency Response Sparks Criticism
The New York Police Department (NYPD) has ramped up the use of drones for emergency response, introducing a new level of aerial surveillance over...
Chinese-Linked Threat Actor Maintains Years-Long Stealth Access to Telecom Provider’s Network
A long-running cyber espionage campaign targeting a major Asian telecom provider has been uncovered, revealing the sophisticated use of web shells to steal sensitive...
Hackers Prepare for Annual Cyberattacks on Israel
As the anniversary of OpIsrael approaches, cybersecurity experts are warning that this notorious hacktivist campaign may expand its scope to include not only Israel...
Security Flaw Found in Unitree Go1 Robot Dogs
A recent discovery by security researchers at Berlin-based startup thinkAwesome GmbH has revealed a significant security flaw in the popular Unitree Go1 robot dogs....
Is Your Genetic Information at Risk? 23andMe Files for Bankruptcy
23andMe, the popular at-home genetic testing company, has filed for bankruptcy in a move to facilitate the sale of its business. The company, which...
The AT-6 Wolverine is the Only Light Attack and Interception Aircraft...
As part of the lessons learned by the Israeli Air Force from October 7th, the IAF has identified the need to change the approach...
Phishing Attack Targets Meta Advertisers with Fake Account Suspension Notices
A new phishing campaign, identified by cybersecurity company Cofense, is preying on businesses that advertise on Meta's platforms, including Facebook and Instagram. The attackers...
UK Urges Organizations to Prepare for Quantum Cyber Threats by 2035
As quantum computing advances, the United Kingdom’s National Cyber Security Centre (NCSC) is warning organizations to bolster their cybersecurity against potential quantum-powered cyberattacks. While...
Malicious Android Apps Hide in Plain Sight, Target Millions of Devices
A new report has uncovered a widespread malicious Android app campaign known as "Vapor," which aims to deceive users into sharing sensitive information through...
This is How AI Technology Amplifies Organized Crime Threats
In a recent report, Europol has raised alarm over the growing use of artificial intelligence (AI) by organized criminal groups, warning that technology is...
Iran Unveils New Missile Systems on Strategic Gulf Islands
Iran’s Revolutionary Guards recently announced the deployment of advanced missile systems on three strategically located islands in the Gulf: Greater Tunb, Lesser Tunb, and...
Critical Vulnerability in Microsoft Windows Exposed: State-Sponsored Hackers Exploit Link Files...
A newly discovered flaw in Microsoft Windows has raised alarms as state-sponsored hackers from North Korea, Russia, Iran, and China exploit a critical weakness...
The Dark Side of AI: How AI Agents Can Be Weaponized...
The rise of AI agents, like OpenAI’s recently introduced Operator, is revolutionizing productivity by automating tasks such as booking trips or filling out forms....
Ransomware Threatens Organizations Across Multiple Sectors
The FBI and the U.S. Cybersecurity and Infrastructure Security Agency (CISA) have issued a warning about an emerging ransomware threat, Medusa, which has been...
Chinese Cyberespionage Group Targets Defense and Technology Organizations’ Routers
A Chinese-based cyberespionage group, identified as UNC3886, has been targeting Juniper Networks' widely used Junos OS routers, leveraging custom backdoors designed for outdated hardware....
It’s Starting: This Country Moves to Curb AI Misuse with Strict...
Spain has introduced a new bill aimed at regulating the use of artificial intelligence (AI) generated content, particularly focusing on the growing concern of...
Cybersecurity Alert: This Trojan Steals Login Data via Fake Google Play...
A new trojan named PlayPraetor is making waves in the cybersecurity world, targeting Android users through deceptive Google Play-like pages. This malware is spread...
Join the Innovation Competition at the Global Defense Tech Summit 2025...
Calling all defense-tech startups! Don’t miss out on the exciting opportunity to participate in the Defense-Tech Startup Competition at the Global Defense Tech Summit...
Pro-Palestinian Hacktivists Take Down X
On Monday, X (formerly known as Twitter) was hit by widespread outages, with users around the world experiencing difficulties accessing the platform. The hacktivist...
DOD Denies Claims of Halt of CyberOps Against Russia
Recent reports have raised concerns within the cybersecurity community about the U.S. potentially halting its offensive cyber operations against Russia. Now, the Pentagon has...
New Machine Learning Model Detects Harmful Social Media Comments
A new machine-learning model developed by a team of researchers from Australia and Bangladesh is making waves in the fight against toxic social media...
Your Lost Luggage May Have Put You at Risk of Identity...
A recent cybersecurity discovery has revealed a major data leak that could have serious consequences for travelers worldwide. Fourteen publicly exposed databases containing over...