Cyber Crime

Cyber Crime

Photo illus. cyber security by Pixabay

While cyber criminals are constantly changing their tactics, legislation and standardization often take years, leaving law enforcement efforts without substantial countermeasures. Now, Europe is...
Photo illus. hacker by Pixabay

Hackers helped the US Administration detect cyber vulnerabilities. More than 400 vulnerabilities were found in US Department of Defense contractor’s networks thanks to the...
Cyber Warefare, Photo illust. by Pixabay

On Tuesday, Locked Shields kicked off the largest and most complex cyber defense exercise in the world, which is held every year to train...
Power station illus. by Pixabay

Cyberspace's complex nature continues to make cyber threats a real and growing problem. The cyber threat is real for many countries, both from state-sponsored...
Photo illus. cyber security by Pixabay

In the 21st century, technology has become an integral part of our lives. We are constantly exposed to it on a daily basis, and...
photo illus. cyber by Pixabay

Several government websites were shut down by a Denial of Service (DDoS) attack on an Israeli communications provider on Monday evening, March 14, the...
Photo illus. cybersecurity by Pixabay

Deep Instinct, the first company to apply end-to-end Deep Learning to cybersecurity, recently released its biennial Threat Landscape Report. The team of researchers responsible for...
photo illus. cyber attack by Pixabay

Recently, a cyberattack was launched against a Toyota supplier, showing how small companies can be a threat to large corporations. In light of this,...
Silverfort, photo illus. network cyber by Pixabay

Israel and the US have been expanding ties on the cyber front. The two countries have finalized a series of cybersecurity collaboration agreements aimed...
photo illus. cyber by Pixabay

Ransomware and malware, as well as cyberattacks, are a real threat to the systems of governments and local authorities, and the number of warnings...
Photo illus. cyber security by Pixabay

Internal personnel are the largest security threat to a firm, according to a recent research, with IoT devices being the most vulnerable. Even during...

According to a recent report by cyber security company CrowdStrike, ransomware-related information leaks have increased by over 82% between 2020 and 2021. The Global...
photo illus. cybersecurity by Pixabay

State-actors and cybercriminals alike concentrate efforts in bypassing strong encryption. It has never been more important to focus on updated, resilient HTTPS configurations, according...
VR simulation

Voice command features on virtual reality headsets could lead to major privacy leakages, known as “eavesdropping attacks.” Built-in motion sensors within common VR headsets...
airport security - photo illus. airport by Pixabay

A ransomware attack on a Swiss airport could be part of a larger campaign. Airport ground services and air cargo operator Swissport has been...

Protecting healthcare organizations from cyber-attacks can be a matter of life and death. Healthcare organizations are vulnerable to various cybersecurity threats demanding from them...
cyber attack

“A continuous learning culture is critical to staying ahead of the increasingly sophisticated cyber threats we face in today’s complex technology landscape,” says CISA...

By Or Shalom Cyberattacks targeting the health sector have intensified following the COVID-19 crisis. The US Department of Health and Human Services and the Office...
Photo illus. by Pixabay cyber-security

In a move aimed at reducing the risk of cyberattacks against US government infrastructure, the White House instructed federal agencies to beef up cybersecurity....

Experts expect that the ransomware attacks industry that flourished during 2021 will consolidate around the most sophisticated groups, to automate more of its attacks,...
trends

Major cybersecurity trends expected in 2022 will be influenced to a large extent by digital shifts accelerated by COVID-19 events. These include working from...

Heightened concern over a critical vulnerability in widely used software. The flaw lets internet-based attackers easily seize control of everything from industrial control systems...