The Worst is Yet to Come? Experts Warn of a Future...
Countless devices we use every single day completely depend on support from security companies. However, the staffing and software of these companies are usually...
Cyberattack Cuts Heat to 600 Buildings in Winter
A new type of malware called FrostyGoop targeted a district energy company in western Ukraine, causing malfunctions in heating system controllers, turning off the...
NoName Russian Cybergang Retaliates After Members’ Arrest
Pro-Russian hacktivist group NoName attacks in Spain after three members were arrested by Spanish authorities for cyber terror attacks against Spain and other NATO...
INNOFENSE Open Call For Dual-Use Technologies
INNOFENSE Call for startups – Dual-Use Technologies:
Following the immense success of the previous four cycles and their integration into the defense sector, iHLS invites...
Self-Healing Tech Repairs Electric Grid
A new and innovative AI system prevents power outages by automatically rerouting electricity within milliseconds. Created in collaboration between researchers from the University of...
Ukraine Malware Blackouts and The Physical Threats of Cyber Warfare
Back in 2016, Ukraine experienced the first-ever known malware-caused blackout that affected a fifth of Kyiv's citizens. Six years later, during the early stages...
Authorities Call for Action Against Pro-Russian Hacktivist Attacks
Authorities including the CISA, the FBI, the NSA, the EPA, the Department of Energy, and others, are calling operators of critical infrastructure to take...
The Israeli Technology Saving Firefighters Worldwide
The most important thing in dangerous situations is being aware of one’s spatial location, especially when that space is a burning building. Firefighters worldwide...
Hacktivists Hack Israeli Nuclear Facility
The hacktivist group ‘Anonymous’ has claimed a recent breach of Israel’s nuclear facility networks in Dimona as a protest against the war with Gaza....
Underwater Data Cables Cut Following Houthi Threat
It is speculated that Yemen’s Houthi rebels cut three cables under the Red Sea that provide global internet and telecommunications, though it is still...
Protecting Operation Technologies in Production Lines as a Market Accelerator Trigger...
Written by Or Shalom
OT (Operation Technologies) is in charge of physical operational processes for different needs in various sectors. They function as production lines...
Anti-Israeli Iranian Cybergang Attacks US Water Sector
The US accuses Iran’s elite military government of using a nation-state threat group to launch attacks on its water sector as part of its...
Industrial Infrastructure Is Unprepared, Analysis Reveals Deeper Issues
During 2022, we saw a rise in the sophistication and sheer number of attacks targeting industrial infrastructure. At the same time, incident response engagements...
Corporations Against Ransomware – Leads to High-Profile Arrests
Last year marked a turning point in the fight against ransomware as the collaboration among law enforcement agencies led to high-profile arrests, and the...
Top 5 Possible Trends in OT Security Market (emphasis on ICS)...
By: Or Shalom, HLS expert
OT networks are continuing to pose a security risk for cyber security personnel. In addition to routine attacks, ransomware attacks...
Interconnectivity – Even In Security
The Internet of Things, or IoT, is made up of interconnected sensors and devices networked with computers. Alongside consumer devices like smartwatches etc, many...
New Technology will Secure Critical Infrastructure
As protecting critical infrastructure from cyber attacks has become vital and a major mission in a world where cyber attacks have been targeting more...
Defense Algorithm Developed Against Cyber Terror
Researchers at the Indian Institute of Technology Madras have developed an innovative algorithm to mitigate disruptions in critical networks such as air traffic control...
Critical Infrastructure Secured Via Artificial Intelligence
A new project launched in Japan aims at improving the security of critical infrastructure using artificial intelligence solutions. The non-profit organisation IOTA Foundation, developing...
The UK Combats New Threats Via Offensive Cyber
At least 60 serious cyber attack attempts target the armed forces and other parts of UK defense every day. In order to confront this...
These Companies Are Vulnerable To Phishing Attacks
A report by the Public Utilities Regulatory Authority found that phishing attacks remained the largest source of successful cyberattacks and pose a significant risk...
Utilizing Airports as New Testing Arena
Drones continue to concern law enforcement and security authorities charged with protecting critical infrastructure and large public events. Drones have become a genuine threat...