Machine Learning Innovations Improve Financial Fraud Detection
A recent study published in the International Journal of Information and Communication Technology sheds light on the potential of machine learning and deep learning...
3.3 Million Email Servers at Risk: Lack of Encryption Puts User...
A new security report from the Shadowserver Foundation has highlighted a major vulnerability in global email infrastructure, revealing that roughly 3.3 million email servers...
Boost Your Startup with an Article on iHLS – Sale for...
Why should startups advertise on iHLS?
The world of startups in the field of Defense-Tech and innovation is in constant competition for the attention of...
Could a Selfie Be the Key to Stopping Business Fraud?
In an age where cyber fraud continues to evolve, Inkan.link, a deep tech company based in Europe, has unveiled an innovative solution to combat...
Critical Windows Vulnerability Under Active Exploitation
A high-severity Windows vulnerability has been identified and is currently being exploited by threat actors. The flaw, tracked as CVE-2024-35250, lies in the Windows...
The New AI-Based, Open-Source Solution to Combat Evasive Cyberattacks
As cyberattacks continue to rise globally, traditional security systems are struggling to keep up with increasingly sophisticated methods used by attackers. To counteract this,...
New System Ensures Secure IoT Data Transmission
As the Internet of Things (IoT) continues to expand, connecting devices across homes, industries, and urban environments, the need for secure, reliable data transmission...
Critical Vulnerability in Zabbix Puts Thousands of Servers at Risk
Zabbix, a popular open-source IT infrastructure management and monitoring tool, has patched a critical SQL injection (SQLi) vulnerability that poses a serious security risk...
FBI and CISA Urge Encrypted Messaging Amid Growing Cyber Threats
As part of the recent release of iOS 18, Apple introduced Rich Communication Services (RCS), a new messaging system that aimed to challenge apps...
NATO Pushes Forward with Classified Cloud System for Data Sharing
NATO is taking significant steps towards improving its data-sharing capabilities with the development of a classified cloud system designed to facilitate secure information exchange...
Ghost Tap: A New NFC-Based Fraud Tactic Gaining Traction
In recent years, payment using NFC one's phone has become increasingly common, as it is a method both safer and more convenient than carrying...
The Truth Behind the Mask – the Revolutionary Algorithm that Recognizes...
Many industries nowadays want the ability to take the audio of a conversation and know the true feelings and hidden intentions of the speaker,...
Microsoft’s New AI Hacker Tracker
Microsoft set to release Copilot for Security AI tool to help cybersecurity workers produce summaries of suspicious incidents and identify hackers’ methods to conceal...
Monitoring Online Terror with AI
Social media platforms on the internet are constantly flooded with huge amounts of content, and this vast ocean of material needs to be constantly...
AI-Voice Robocalls Declared Illegal in the US
US regulators declared last week that scam "robocalls" made using voices created with artificial intelligence are now illegal.
This phenomenon gained attention last month after...
Can AI be Controlled? Expert Opinion
Some experts claim that there is no current evidence that AI can be controlled safely. And if so, should it even be developed?
AI Safety...
Cybersecurity in the Workplace
Charles Harry is a former National Security Agency cyberwarfare expert and director of the University of Maryland's Center for Governance of Technology and Systems,...
Deep Fakes and Identity Decentralization
The growing trend of AI-generated content and deep fakes is making us lose our trust in the internet. Can identity decentralization be the solution?...
New Dangerous Cyberattacks Target AI Systems
A new report by Computer scientists from the National Institute of Standards and Technology presents new kinds of cyberattacks that can “poison” AI systems.
AI...
Protecting Operation Technologies in Production Lines as a Market Accelerator Trigger...
Written by Or Shalom
OT (Operation Technologies) is in charge of physical operational processes for different needs in various sectors. They function as production lines...
Call for Investors
Due to the current security situation, the Technology Innovation Centre is pushing to find investors to support startups participating in its programs.
The participating startups...
Worldcoin Faces Criticism for Dubious Privacy Practices
Worldcoin is a new cryptocurrency company co-founded by OpenAI CEO Sam Altman that requires users to give their iris scans in exchange for a...

















































