Gmail Data Leak: 183 Million Reasons to Rethink Your Password Security
A new trove of stolen login credentials has surfaced online, with 183 million email addresses and passwords added to the “Have I Been Pwned”...
OpenAI Unveils ChatGPT for Government Agencies
OpenAI has launched a new version of its popular AI tool, ChatGPT, tailored specifically to meet the needs of US government agencies. Dubbed ChatGPT...
Russia Ransomware Campaigns Target Microsoft Teams Users
Sophos X-Ops, the threat research division of the British cybersecurity company Sophos, has revealed two active cyberattack campaigns targeting organizations that use Microsoft Office...
Cybercriminals Use Fake Google Ads to Steal User Credentials
Cybercriminals have been running a sophisticated phishing campaign using fake Google Ads to steal user credentials, researchers from Malwarebytes Labs have uncovered. These malicious...
Cyberattack Disrupts University, Shutting Down Campus Services
Eindhoven University of Technology (TU/e) in the Netherlands has been severely impacted by a cyberattack, leading to the shutdown of nearly all its digital...
Incorporating Security Technologies in Critical Infrastructure Structural Systems, Public Buildings and...
Incorporating Security Technologies in Critical Infrastructure Structural Systems, Public Buildings and Real Estate
Written by Or Shalom
In the construction world, security has become a central...
Machine Learning Innovations Improve Financial Fraud Detection
A recent study published in the International Journal of Information and Communication Technology sheds light on the potential of machine learning and deep learning...
3.3 Million Email Servers at Risk: Lack of Encryption Puts User...
A new security report from the Shadowserver Foundation has highlighted a major vulnerability in global email infrastructure, revealing that roughly 3.3 million email servers...
Boost Your Startup with an Article on iHLS – Sale for...
Why should startups advertise on iHLS?
The world of startups in the field of Defense-Tech and innovation is in constant competition for the attention of...
Could a Selfie Be the Key to Stopping Business Fraud?
In an age where cyber fraud continues to evolve, Inkan.link, a deep tech company based in Europe, has unveiled an innovative solution to combat...
Critical Windows Vulnerability Under Active Exploitation
A high-severity Windows vulnerability has been identified and is currently being exploited by threat actors. The flaw, tracked as CVE-2024-35250, lies in the Windows...
The New AI-Based, Open-Source Solution to Combat Evasive Cyberattacks
As cyberattacks continue to rise globally, traditional security systems are struggling to keep up with increasingly sophisticated methods used by attackers. To counteract this,...
New System Ensures Secure IoT Data Transmission
As the Internet of Things (IoT) continues to expand, connecting devices across homes, industries, and urban environments, the need for secure, reliable data transmission...
Critical Vulnerability in Zabbix Puts Thousands of Servers at Risk
Zabbix, a popular open-source IT infrastructure management and monitoring tool, has patched a critical SQL injection (SQLi) vulnerability that poses a serious security risk...
FBI and CISA Urge Encrypted Messaging Amid Growing Cyber Threats
As part of the recent release of iOS 18, Apple introduced Rich Communication Services (RCS), a new messaging system that aimed to challenge apps...
NATO Pushes Forward with Classified Cloud System for Data Sharing
NATO is taking significant steps towards improving its data-sharing capabilities with the development of a classified cloud system designed to facilitate secure information exchange...
Ghost Tap: A New NFC-Based Fraud Tactic Gaining Traction
In recent years, payment using NFC one's phone has become increasingly common, as it is a method both safer and more convenient than carrying...
The Truth Behind the Mask – the Revolutionary Algorithm that Recognizes...
Many industries nowadays want the ability to take the audio of a conversation and know the true feelings and hidden intentions of the speaker,...
Microsoft’s New AI Hacker Tracker
Microsoft set to release Copilot for Security AI tool to help cybersecurity workers produce summaries of suspicious incidents and identify hackers’ methods to conceal...
Monitoring Online Terror with AI
Social media platforms on the internet are constantly flooded with huge amounts of content, and this vast ocean of material needs to be constantly...
AI-Voice Robocalls Declared Illegal in the US
US regulators declared last week that scam "robocalls" made using voices created with artificial intelligence are now illegal.
This phenomenon gained attention last month after...
Can AI be Controlled? Expert Opinion
Some experts claim that there is no current evidence that AI can be controlled safely. And if so, should it even be developed?
AI Safety...

















































