Image by Wikimedia (Creative Commons)

How Cyberattacks Were Used to Open the Door for Military Strikes:...

0
Cyber operations are increasingly seen as a way to shape the battlefield before the first aircraft or ground unit moves. Power grids, communications networks,...

New AI Protector Helps Vehicles Ignore Fake Signals

0
As vehicles grow more connected, their internal systems depend on a constant flow of data from sensors monitoring everything from temperature and tire pressure...

Vulnerability Intelligence: The New Operational Weapon in Cyber Defense

0
In an era where cyber threats evolve at an alarming pace and operational quietude can be disrupted at any moment, the traditional approach to...
AI generated image

This Robot Attack Didn’t Need the Internet in Order to Spread

0
As humanoid and quadruped robots move from research labs into public spaces, factories, and homes, their growing autonomy is creating a new class of...

This Scam Used Real Cloud Infrastructure to Fool Everyone

0
Email security teams have long relied on domain reputation and sender verification as their first line of defense against phishing. Messages originating from well-known...
AI generated image

New SIGINT Prototype Aims to Keep Units Connected When Signals Disappear

0
Modern military operations depend on uninterrupted communication and rapid data sharing, yet many battlefields are anything but cooperative. Urban density, electronic warfare, and natural...
AI generated image

2025 Startups Wrapped: Israeli Tech Draws Bigger Bets as AI Reshapes...

0
As 2025 draws to a close, Israel’s technology sector is finishing the year with results that look stronger than many expected. This is notable...
AI generated image

Phones Can Now Disappear From Cellular Tracking — Here’s How

0
For decades, mobile phones have relied on a fixed network identifier that quietly follows users wherever they go. Known as the International Mobile Subscriber...
image provided by pixabay

Stopping the Domino Effect: Rethinking Cyber Resilience

0
Modern infrastructure is increasingly dependent on tightly connected digital systems. Power grids, transport networks, hospitals, and communication platforms all rely on data flows that...

Millions of LinkedIn Details Exposed in Latest Scraping Incident

0
A newly discovered dataset containing millions of scraped LinkedIn profiles has renewed concerns about how easily professional information can be harvested, aggregated, and reused...
AI generated image

A Billion Reasons Investors Are Betting on Israeli Defense Tech

0
Israel’s security landscape has increasingly depended on rapid technological adaptation, but until recently, defense-focused startups struggled to attract significant investment. The year 2025 marks...

Rising Global Tensions Fuel a Boom in Israeli DefenseTech

0
In recent years, the global system has experienced growing regional and international tension, driving many countries to seek solutions that ensure intelligence and operational...
AI generated image

Practice Makes Prepared: Wargaming for Modern Threats

0
Governments today face a growing set of crises that no longer unfold one at a time. Cyberattacks intersect with misinformation campaigns, supply chains respond...

Defending the Algorithm: A Breakthrough in AI Security

0
Artificial intelligence systems are increasingly valuable, and increasingly targeted. A new study from North Carolina State University presents the first working defense mechanism capable...
AI generated image

What AI Automation Means for High-Tech — and Might Mean for...

0
Israel’s high-tech sector is currently undergoing one of the deepest transformations in its history – the broad integration of AI-based tools into day-to-day work....
AI generated image

Technology Trend Review from Milipol (Paris 2025) – A High-Level Snapshot...

0
Written by Or Shalom Milipol Paris 2025, held in Paris on November 18th-21st, 2025, presented an impressive high-level snapshot of the entire homeland security and...

The Submarine That Hides, Listens, and Strikes from the Deep

0
A new generation of submarine warfare has emerged with the debut of the A26, which is described as the world’s first fifth-generation submarine. Developed...

AI Agents Introduce New Cybersecurity Risks

0
The emergence of AI agents - autonomous programs that can perform online tasks like booking flights or managing calendars - has created new cybersecurity...

Microsoft Flags AI Metadata Flaw That Could Expose Private Conversations

0
A recent study by Microsoft has identified a significant vulnerability in AI chatbots, including models similar to ChatGPT and Google Gemini, that could reveal...

AI Systems Become More Helpful — and More Exposed

0
OpenAI’s recent discussion on the future of AI has put a spotlight on a challenge that is quickly moving from academic debate to operational...

Google Unveils Secure AI Processing System for the Cloud

0
Google has introduced Private AI Compute, a new privacy-preserving system designed to process artificial intelligence (AI) queries in the cloud while keeping user data...

$75M For a New Platform Addressing Hidden Risks in Enterprise AI...

0
Israeli cloud-security startup Sweet Security has secured a $75 million Series B round, and with it introduced a broadened platform designed to surface the...

Latest

The Cybersecurity Playbook Built for Grid Disruption and Geopolitical Crises

0
Energy infrastructure is becoming a prime target in modern cyber conflict. Power generation, transmission, and distribution systems are increasingly digital, interconnected, and exposed, while...