Rafael and Raytheon Develop Iron Dome Variant for U.S. Requirements
In a significant advancement for air defense capabilities, the US Marine Corps has completed its first live-fire training exercise utilizing an air defense system...
AI-Driven Video Analysis Could Revolutionize Surveillance
Researchers at the University of Virginia’s School of Engineering and Applied Science have made an innovative, AI-driven video analysis system that can help transform...
Study Reveals ChatGPT’s Potential in Terrorism Profiling
A recent study suggests that advanced technologies like ChatGPT could enhance anti-terrorism efforts by profiling potential terrorists and assessing their likelihood of engaging in...
AI Revolutionizes Safety in Coal Mines, Other Fields Could Also Benefit
A new study published in Scientific Reports reveals that artificial intelligence (AI) can forecast methane gas anomalies in coal mines up to 30 minutes...
The Worst is Yet to Come? Experts Warn of a Future...
Countless devices we use every single day completely depend on support from security companies. However, the staffing and software of these companies are usually...
Cyberattack Cuts Heat to 600 Buildings in Winter
A new type of malware called FrostyGoop targeted a district energy company in western Ukraine, causing malfunctions in heating system controllers, turning off the...
NoName Russian Cybergang Retaliates After Members’ Arrest
Pro-Russian hacktivist group NoName attacks in Spain after three members were arrested by Spanish authorities for cyber terror attacks against Spain and other NATO...
INNOFENSE Open Call For Dual-Use Technologies
INNOFENSE Call for startups – Dual-Use Technologies:
Following the immense success of the previous four cycles and their integration into the defense sector, iHLS invites...
Self-Healing Tech Repairs Electric Grid
A new and innovative AI system prevents power outages by automatically rerouting electricity within milliseconds. Created in collaboration between researchers from the University of...
Ukraine Malware Blackouts and The Physical Threats of Cyber Warfare
Back in 2016, Ukraine experienced the first-ever known malware-caused blackout that affected a fifth of Kyiv's citizens. Six years later, during the early stages...
Authorities Call for Action Against Pro-Russian Hacktivist Attacks
Authorities including the CISA, the FBI, the NSA, the EPA, the Department of Energy, and others, are calling operators of critical infrastructure to take...
The Israeli Technology Saving Firefighters Worldwide
The most important thing in dangerous situations is being aware of one’s spatial location, especially when that space is a burning building. Firefighters worldwide...
Hacktivists Hack Israeli Nuclear Facility
The hacktivist group ‘Anonymous’ has claimed a recent breach of Israel’s nuclear facility networks in Dimona as a protest against the war with Gaza....
Underwater Data Cables Cut Following Houthi Threat
It is speculated that Yemen’s Houthi rebels cut three cables under the Red Sea that provide global internet and telecommunications, though it is still...
Protecting Operation Technologies in Production Lines as a Market Accelerator Trigger...
Written by Or Shalom
OT (Operation Technologies) is in charge of physical operational processes for different needs in various sectors. They function as production lines...
Anti-Israeli Iranian Cybergang Attacks US Water Sector
The US accuses Iran’s elite military government of using a nation-state threat group to launch attacks on its water sector as part of its...
Industrial Infrastructure Is Unprepared, Analysis Reveals Deeper Issues
During 2022, we saw a rise in the sophistication and sheer number of attacks targeting industrial infrastructure. At the same time, incident response engagements...
Corporations Against Ransomware – Leads to High-Profile Arrests
Last year marked a turning point in the fight against ransomware as the collaboration among law enforcement agencies led to high-profile arrests, and the...
Top 5 Possible Trends in OT Security Market (emphasis on ICS)...
By: Or Shalom, HLS expert
OT networks are continuing to pose a security risk for cyber security personnel. In addition to routine attacks, ransomware attacks...
Interconnectivity – Even In Security
The Internet of Things, or IoT, is made up of interconnected sensors and devices networked with computers. Alongside consumer devices like smartwatches etc, many...
New Technology will Secure Critical Infrastructure
As protecting critical infrastructure from cyber attacks has become vital and a major mission in a world where cyber attacks have been targeting more...
Defense Algorithm Developed Against Cyber Terror
Researchers at the Indian Institute of Technology Madras have developed an innovative algorithm to mitigate disruptions in critical networks such as air traffic control...