A Rising Tide of Acquisitions: Israeli Technologies Fuel the Next Phase...
Israel’s defense-technology sector has entered a period of accelerated consolidation, with eight companies acquired over the past three months by major international defense and...
European Commission Moves to Strengthen Joint Intelligence Capabilities
The European Commission is planning to establish a new intelligence unit that intends to improve the use of information collected by national spy agencies...
AI System Transforms Cyber Threat Intelligence into Actionable Insights
A new artificial intelligence tool is changing how cybersecurity teams understand and respond to threats. U.S.-based startup Tidal Cyber has introduced NARC (Natural Attack...
The Hidden Trail Behind 3D-Printed Weapons
3D printing is often celebrated for its ability to produce toys, tools, and prototypes quickly, but the technology can also be exploited for illegal...
Your Body as the Key: The Rise of Biometric Authentication
As digital threats grow more sophisticated, traditional passwords are increasingly viewed as insufficient for protecting personal and professional information. In response, biometric authentication, using...
Echo-Based Exploits Allow Tracking in Zoom and Teams Calls
A recent study highlights a surprising vulnerability in video conferencing platforms such as Zoom and Microsoft Teams: even with cameras off, microphones muted, or...
Researchers Find New Vulnerabilities in LTE Networks
Researchers at the Korea Advanced Institute of Science and Technology (KAIST) have identified previously unknown security flaws in LTE mobile networks that could put...
Corporate Messaging Platform Became Gateway for Hackers
Nikkei Inc., Japan’s largest financial news organization and owner of the Financial Times, revealed that hackers gained access to its networks through an employee’s...
Nintendo Levels Up in Court After Switch Piracy Showdown
Nintendo has secured another victory in its ongoing campaign against game piracy, following a U.S. court ruling in its favor against a streamer accused...
RADIANT Shines a Light on Invisible Industrial Threats
A new intrusion detection system is offering a more efficient way to identify and defend against advanced cyber threats targeting critical infrastructure like power...
Gmail Data Leak: 183 Million Reasons to Rethink Your Password Security
A new trove of stolen login credentials has surfaced online, with 183 million email addresses and passwords added to the “Have I Been Pwned”...
Can’t be Cloned: Hydrogel Gives Products a Unique ID
A new material developed by researchers offers a promising route to secure, tamper-proof authentication for physical objects. At the heart of the innovation is...
Lawsuit Against Roku that Allegedly Collected and Sold Children’s Data Without...
Florida’s Attorney General has filed a lawsuit alleging that a major smart TV and streaming platform (Roku) collected and sold children’s personal data without...
Researchers Uncover First Hardware-Based AI Privacy Leak
Researchers have discovered a previously unknown vulnerability in AI hardware that can be exploited to reveal private information about AI training data—without accessing the...
Attackers Exploit Discord’s Verification Pipeline
A recent cyberattack targeting Discord’s customer support system has exposed personal data from approximately 70,000 users, drawing renewed attention to the security risks of...
Android Exploit Can Extract Anything on Your Screen Without Permissions
A newly published academic study has revealed a high-severity Android vulnerability that allows attackers to extract sensitive on-screen content—including two-factor authentication (2FA) codes and...
Cyberattack on Power Cooperatives Raises Concerns Over Critical Infrastructure Security
Two electric cooperatives in Texas have reportedly been targeted in a ransomware campaign, with cybercriminal group Qilin claiming responsibility. The group, known for its...
North Korean Crypto Theft Tops $2 Billion in 2025, Marking Record...
The year isn’t even over yet, but cyber groups linked to North Korea have already made 2025 their most profitable year to date, stealing...
Researchers Develop Tool to Improve AI Text Classifiers
A research team from MIT’s Laboratory for Information and Decision Systems (LIDS) has developed a new method to assess and improve the accuracy of...
Study Shows LLMs Can Be Backdoored with Minimal Data Poisoning
A new study has revealed a critical vulnerability in the training process of large language models (LLMs), showing that even the largest models can...
Wi-Fi Networks Can Now Identify You—Even Without a Device
New research has revealed that standard Wi-Fi networks can be used to identify individuals—even if they are not carrying a phone or any connected...
Poland Faces Sharp Rise in Cyberattacks from Russia Targeting Critical Infrastructure
Poland has recorded a significant increase in cyberattacks targeting its critical infrastructure, with activity linked to Russian state actors accounting for a growing portion...

















































