Innovative Progress in Deepfake Detection
Deepfake technology, the generation of fake images, videos, and sounds that seem completely authentic and can confuse even expert viewers and listeners, has been...
Was Your Data Exposed in a Breach? Here’s What to Do
Data breaches are becoming an increasingly regular occurrence as more and more of our lives are being managed online, and our email addresses, phone...
Open Call for Startups With Dual-Use Technologies
iHLS and the Ministry of Defense invite you to join the fifth cycle of INNOFENSE and receive a remarkable opportunity to showcase your technology...
Russian ‘Social Media Bot Farm’ Spreads Fake News in the US
The FBI seized control of a Russia-owned AI-driven social media bot farm used to spread propaganda and disinformation in many countries, including the US....
Businesses are Harvesting our Biometric Data – Should We Be Worried?
In our highly digital age, biometric data is everywhere- from facial recognition on our phones to fingerprints unlocking our laptops.
Facial recognition is the most...
AI Chatbots Pass Certified Ethical Hacking Exams
Leading GenAI Chatbots were found to be able to pass a cybersecurity exam, as was discovered by researchers from the University of Missouri and...
Open Call for Dual-Technology Startups
iHLS and the Ministry of Defense invite you to join the fifth cycle of INNOFENSE and receive a remarkable opportunity to showcase your technology...
Ransomware Attacks are Increasing Hospital Mortality Rates
Though blaming the deaths of hospital patients on ransomware attacks might seem far-fetched, this claim has more basis in reality than you might think.
A...
Cybercrime Takedown Brings New Violent Cybergangs
Global law enforcement operations have made a major crackdown on cybergangs this past year. however, it seems that those groups are coming back with...
Voice Messages – the New Cybercrime Frontier
With many reports claiming voice messages are gaining popularity, especially among the younger generation, malicious actors are now trying to use this trend to...
INNOFENSE Open Call For Dual-Use Technologies
INNOFENSE Call for startups – Dual-Use Technologies:
Following the immense success of the previous four cycles and their integration into the defense sector, iHLS invites...
The Cybersecurity Threat Lurking in Plain Sight
Research reveals that the internet is filled with millions of clickable links that redirect users to malicious destinations, also nicknamed "hijackable hyperlinks," and they...
INNOFENSE Call for startups – Dual Use Technologies
Following the immense success of the previous four cycles and their integration into the defense sector, iHLS invites you to join the fifth cycle...
Dual-Use Startups Open Call
INNOFENSE Call for startups – Dual-Use Technologies:
Following the immense success of the previous four cycles and their integration into the defense sector, iHLS invites...
Space Cyberthreats – Biggest Risk to Space Operations
Researchers from California Polytechnic State University published a report stating that with governments and other space organizations focusing on the dangers of space debris...
Cybersecurity Experts Use AI to Detect Breaches
With the ever-increasing threat of data breaches and privacy violations and the growing frequency and sophistication of cyber threats, cybersecurity analysts are working around...
How Today’s Hackers Hide Their Malware
In the early days of the internet, sending malicious files to an unsuspecting victim was extremely easy, and many online users did not have...
This Software Blocks AI Phishing Scams
The past few years have seen cybercriminals using more and more AI-based technology to design and execute scams and cyberattacks. AI chatbots (like Bard...
Fake Error Pop-Up Makes Users Infect Themselves with Malware
A new social engineering attack method uses “copy-paste” technique to trick victims – hackers make a forged error message on Chrome with instructions “to...
Dual-Use Startup Open Call
INNOFENSE Call for startups – Dual Use Technologies:
Following the immense success of the previous four cycles and their integration into the defense sector, iHLS...
Can Cyberattacks Be Considered a War Crime?
International Criminal Court (ICC) prosecutors are currently investigating alleged Russian cyberattacks on Ukrainian civilian infrastructure as possible war crimes – the first ever confirmation...
Emojis Replace Code in New Cyberattack
Instead of typing out full commands, the hackers are maximizing their efficiency when communicating with command and control (C2) servers by using emojis like...