Stopping the Domino Effect: Rethinking Cyber Resilience
Modern infrastructure is increasingly dependent on tightly connected digital systems. Power grids, transport networks, hospitals, and communication platforms all rely on data flows that...
Millions of LinkedIn Details Exposed in Latest Scraping Incident
A newly discovered dataset containing millions of scraped LinkedIn profiles has renewed concerns about how easily professional information can be harvested, aggregated, and reused...
A Billion Reasons Investors Are Betting on Israeli Defense Tech
Israel’s security landscape has increasingly depended on rapid technological adaptation, but until recently, defense-focused startups struggled to attract significant investment. The year 2025 marks...
Rising Global Tensions Fuel a Boom in Israeli DefenseTech
In recent years, the global system has experienced growing regional and international tension, driving many countries to seek solutions that ensure intelligence and operational...
Practice Makes Prepared: Wargaming for Modern Threats
Governments today face a growing set of crises that no longer unfold one at a time. Cyberattacks intersect with misinformation campaigns, supply chains respond...
Defending the Algorithm: A Breakthrough in AI Security
Artificial intelligence systems are increasingly valuable, and increasingly targeted. A new study from North Carolina State University presents the first working defense mechanism capable...
What AI Automation Means for High-Tech — and Might Mean for...
Israel’s high-tech sector is currently undergoing one of the deepest transformations in its history – the broad integration of AI-based tools into day-to-day work....
Technology Trend Review from Milipol (Paris 2025) – A High-Level Snapshot...
Written by Or Shalom
Milipol Paris 2025, held in Paris on November 18th-21st, 2025, presented an impressive high-level snapshot of the entire homeland security and...
The Submarine That Hides, Listens, and Strikes from the Deep
A new generation of submarine warfare has emerged with the debut of the A26, which is described as the world’s first fifth-generation submarine. Developed...
AI Agents Introduce New Cybersecurity Risks
The emergence of AI agents - autonomous programs that can perform online tasks like booking flights or managing calendars - has created new cybersecurity...
Microsoft Flags AI Metadata Flaw That Could Expose Private Conversations
A recent study by Microsoft has identified a significant vulnerability in AI chatbots, including models similar to ChatGPT and Google Gemini, that could reveal...
AI Systems Become More Helpful — and More Exposed
OpenAI’s recent discussion on the future of AI has put a spotlight on a challenge that is quickly moving from academic debate to operational...
Google Unveils Secure AI Processing System for the Cloud
Google has introduced Private AI Compute, a new privacy-preserving system designed to process artificial intelligence (AI) queries in the cloud while keeping user data...
$75M For a New Platform Addressing Hidden Risks in Enterprise AI...
Israeli cloud-security startup Sweet Security has secured a $75 million Series B round, and with it introduced a broadened platform designed to surface the...
AI-Driven Malware Shifts Cybercrime into High Gear
Cyber threats are evolving rapidly as attackers increasingly harness generative AI to automate and enhance their operations. A recent report from Google’s Threat Intelligence...
Miniature EW System Packs Tactical Punch
A new electronic warfare (EW) system capable of disrupting enemy communications and sensors was recently demonstrated in the United States, highlighting advances in small,...
A Rising Tide of Acquisitions: Israeli Technologies Fuel the Next Phase...
Israel’s defense-technology sector has entered a period of accelerated consolidation, with eight companies acquired over the past three months by major international defense and...
European Commission Moves to Strengthen Joint Intelligence Capabilities
The European Commission is planning to establish a new intelligence unit that intends to improve the use of information collected by national spy agencies...
AI System Transforms Cyber Threat Intelligence into Actionable Insights
A new artificial intelligence tool is changing how cybersecurity teams understand and respond to threats. U.S.-based startup Tidal Cyber has introduced NARC (Natural Attack...
The Hidden Trail Behind 3D-Printed Weapons
3D printing is often celebrated for its ability to produce toys, tools, and prototypes quickly, but the technology can also be exploited for illegal...
Your Body as the Key: The Rise of Biometric Authentication
As digital threats grow more sophisticated, traditional passwords are increasingly viewed as insufficient for protecting personal and professional information. In response, biometric authentication, using...
Echo-Based Exploits Allow Tracking in Zoom and Teams Calls
A recent study highlights a surprising vulnerability in video conferencing platforms such as Zoom and Microsoft Teams: even with cameras off, microphones muted, or...

















































