image provided by pixabay

Self-Healing Tech Repairs Electric Grid

0
A new and innovative AI system prevents power outages by automatically rerouting electricity within milliseconds. Created in collaboration between researchers from the University of...
image provided by pixabay

Ukraine Malware Blackouts and The Physical Threats of Cyber Warfare

0
Back in 2016, Ukraine experienced the first-ever known malware-caused blackout that affected a fifth of Kyiv's citizens. Six years later, during the early stages...
image provided by pixabay

The New ULTRA Glider Drone Deployed in The Middle East

0
The Unmanned Long-Endurance Tactical Reconnaissance Aircraft (ULTRA) drone was recently deployed in the Middle East for the first time ever by the US Air...
images provided by pixabay

The 2024 Olympics are Preparing for the Coming Cyberthreats

0
The Paris 2024 Olympics is preparing to face an unprecedented challenge in terms of cybersecurity, the main threats being organized crime, activists, and states. Paris...
image provided by pixabay

Authorities Call for Action Against Pro-Russian Hacktivist Attacks

0
Authorities including the CISA, the FBI, the NSA, the EPA, the Department of Energy, and others, are calling operators of critical infrastructure to take...

Airstrikes In Iran Raise Concerns of Change in Nuclear Tactics

0
Following Iran’s attack on Israel, experts are worried of possible escalation and Iranian intentions for its nuclear enrichment facilities, as Iranian officials warned the...
image provided by pixabay

Europe’s Largest Nuclear Power Plant Attacked by Drones

0
Russian nuclear power corporation Rosatom accuses Ukraine’s army of attacking the Zaporizhzhia nuclear power plant (ZNPP) with drones. The International Atomic Energy Agency (IAEA) confirms...
image provided by pixabay

The Israeli Technology Saving Firefighters Worldwide

0
The most important thing in dangerous situations is being aware of one’s spatial location, especially when that space is a burning building. Firefighters worldwide...
image provided by pixabay

Intensive Drone Military Testing Yields Promising Results

0
The US recently concluded a series of experiments on new tech during Project Convergence Capstone 4 (PC-C4), involving the Army, Navy, Air Force, Marines,...
images provided by pixabay

Hacktivists Hack Israeli Nuclear Facility

0
The hacktivist group ‘Anonymous’ has claimed a recent breach of Israel’s nuclear facility networks in Dimona as a protest against the war with Gaza....
image provided by pixabay

AI Technology as a Proactive Security Accelerator

0
Written by Or Shalom The implementation of active security has many benefits. This kind of security is active and proactive by nature and is meant...
image provided by pixabay

False GPS Signals Pose Great Danger to Pilots

0
False GPS signals are surging near conflict zones, deceiving onboard plane systems, and complicating the work of airline pilots. Disruptive issues on planes (like a...
image provided by pixabay

Underwater Data Cables Cut Following Houthi Threat

0
It is speculated that Yemen’s Houthi rebels cut three cables under the Red Sea that provide global internet and telecommunications, though it is still...
image provided by pixabay

Can Hackers Hijack Flights?

0
Flysmart+ is an iOS app for pilots to calculate aircraft takeoff performance, weight, and balance, developed by the Airbus subsidiary Navblue. It was recently...
image provided by pixabay

The Houthis Threaten to Sever Undersea Cables, Cause Worldwide Internet Shortage

0
Yemen’s Iran-backed Houthis have been continuously attacking ships off the coast of Yemen since the beginning of Israel’s war with Hamas, claiming they will...
image provided by pixabay

Hybrid Energy Harvester Charges Using Heat and Vibrations

0
Scientists from the Korea Institute of Science and Technology (KIST) developed a revolutionary hybrid energy harvester that combines heat and vibration to produce over 50 percent...
image provided by pixabay

BAE Systems’ Drone-Killing Vehicle

0
BAE Systems successfully tested its anti-drone AMPV C-UAS system: an Armored Multi-Purpose Vehicle Counter-Unmanned Aircraft System prototype. The test assessed the detection, tracking, identification,...
image provided by pixabay

iHLS Innovation Centre Calls for Dual-Use Security Startups

0
Are you a startup company related to the security sector? Are you looking for recognition, international exposure, access to investors, and the ability to...
image provided by pixabay

China’s New AI Model Predicts Movements on the Battlefield

0
Scientists from the PLA (People's Liberation Army) Strategic Support Force in China are reportedly training a military AI system to predict what potential enemy...
images provided by pixabay

Drones Navigating and Avoiding Obstacles in Real-Time

0
Researchers from CMI have tested a new technology for drones that lets them smartly maneuver and travel while avoiding obstructions during flight. The team...
image provided by pixabay

Protecting Operation Technologies in Production Lines as a Market Accelerator Trigger...

0
Written by Or Shalom OT (Operation Technologies) is in charge of physical operational processes for different needs in various sectors. They function as production lines...
Hackers Target Israel in a New Cyberattack Operation

Anti-Israeli Iranian Cybergang Attacks US Water Sector

0
The US accuses Iran’s elite military government of using a nation-state threat group to launch attacks on its water sector as part of its...

Latest

Image provided by pixabay

Data Breaches Are Connected to Mass Layoffs, Research

0
A research team from Binghamton University and the State University of New York explains the connection between mass layoffs and data breaches, theorizing that...