Critical Vulnerability in Zabbix Puts Thousands of Servers at Risk
                Zabbix, a popular open-source IT infrastructure management and monitoring tool, has patched a critical SQL injection (SQLi) vulnerability that poses a serious security risk...            
            
        Elbit acquires NICE Systems Cyber and Intelligence division
                Elbit Systems Ltd. announced today that it has signed an agreement to acquire  NICE Systems Cyber and Intelligence division for a total amount of...            
            
        Situational Awareness for Business Firms in War Zones
                 
A new security system which brings together up-to-the-minute information on key security developments in Iraq and the implications for companies operating in the region...            
            
        Public Sector Trying to Defend Itself in Cyber Environment
                Distributed Denial of Service (DDoS) cyber attacks are a serious problem threatening companies and organizations across the globe. While weaponized data attacks on the...            
            
        iHLS TV Future Forces For HLS
                Future Forces For HLS
Future Forces 4 HLS  
The upcoming conference for the HLS Future Forces is to be held on July 21st, bringing with...            
            
        INTERPOL 2015 – Israeli innovation, unique solutions and operational experience
                
 
Gil Reider, Director of Life Science, Aerospace Defense & HLS Department in the Israel Export and International Cooperation Institute:
"The Israel Export and International Cooperation...            
            
        FBI Warns of Security Breaches in IoT
                Amidst all the excitement about the possible benefits of the Internet of Things, a slew of warnings have been sounded by IT pros, vendors...            
            
        Monitoring Online Terror with AI
                Social media platforms on the internet are constantly flooded with huge amounts of content, and this vast ocean of material needs to be constantly...            
            
        Worldcoin Faces Criticism for Dubious Privacy Practices
                Worldcoin is a new cryptocurrency company co-founded by OpenAI CEO Sam Altman that requires users to give their iris scans in exchange for a...            
            
        Critical Windows Vulnerability Under Active Exploitation
                A high-severity Windows vulnerability has been identified and is currently being exploited by threat actors. The flaw, tracked as CVE-2024-35250, lies in the Windows...            
            
        DHS to rely on big data to protect critical infrastructure, networks
                
DHS officials responsible for protecting federal civilian networks and critical industries from cyberattacks have recently referred to this issue. They said they are going...            
            
        Interested in Fighting COVID-19 Pandemic Effectively and in Real-Time?
                The coronavirus pandemic is a global emergency scenario that requires readiness as part of the national preparedness strategy for emergency and crisis situations. 
The suitable...            
            
        Gmail Data Leak: 183 Million Reasons to Rethink Your Password Security
                A new trove of stolen login credentials has surfaced online, with 183 million email addresses and passwords added to the “Have I Been Pwned”...            
            
        Ransomware Rises – The Growing Threat To International Security
                Over the last few years a new menace has emerged: ransomware. Hackers now routinely take control and hold hostage the computer systems of businesses,...            
            
        Can ISIS Attack Our Infrastructure?
                ISIS hackers have proven in the past their ability to break into different websites or the accounts of military and government personel. The US...            
            
        Selfies to Provide Strictest Level Authentication
                Cybercrime will become one of the greatest threats of our time, and this is particularly true for banks and insurers, who will increasingly look...            
            
        The Earthquake Has Passed – How Do You Prepare For The...
                Natural disasters may cause loss of information existing in the computer systems, leading to businesses and infrastructure collapsing. Proper planning for recovery after natural...            
            
        Microsoft Admits: Windows 10 Spying Cannot Be Stopped
                 Windows 10 constantly calls home - a lot. Back in August, Ars Technica reported on a list of features in Microsoft Windows 10 that...            
            
        Falling Behind in the Cyber War
                By Rachel Ehrenfeld
Shutting down the background check system of the Office of Personnel Management employees will do little to prevent the abuse of millions...            
            
        U.S. Considers Sanctions On Russia And China
                The United States has had to deal with a series of embarassing cyber attack in the past few months, chief among them is the...            
            
        The private and public dangers of identity theft
                Let us do a little experiment: Try to close your eyes and think of the number of people you know that don’t have an...            
            
        OT, SCADA – What Does it All Mean?
                Industrial machines and devices connected to the network have been gaining momentum and demonstrating effectiveness, however, they are vulnerable to cyberattacks that have far-reaching...            
            
        
 
            
