Cyber Security

Cyber Security

photo illus. cybersecurity by Pixabay

The French company Ubisoft, which specializes in computer and video games, experienced a cyber attack in March that temporarily disrupted the company's systems, servers,...
Photo illus. cybersecurity by Pixabay

Deep Instinct, the first company to apply end-to-end Deep Learning to cybersecurity, recently released its biennial Threat Landscape Report. The team of researchers responsible for...
photo illus. cyber attack by Pixabay

Recently, a cyberattack was launched against a Toyota supplier, showing how small companies can be a threat to large corporations. In light of this,...
Telegram by Pixabay

Users of Telegram's instant messaging system can communicate and exchange messages (including photos, videos and files of any kind), store correspondence in the cloud...
Cybersecurity photo illus. by Pixabay

As more cyber-physical systems become connected, accessibility to these networks from the internet and the cloud requires defenders to have timely, useful vulnerability information...
Photo illus. Anonymous by Pixabay

Homomorphic encryption is considered a next-generation data security technology, but researchers have identified a vulnerability that allows them to steal data even as it...
Silverfort, photo illus. network cyber by Pixabay

Israel and the US have been expanding ties on the cyber front. The two countries have finalized a series of cybersecurity collaboration agreements aimed...
Photo illus. gps geospatial by PIXABAY

Global Positioning Systems (GPS) and other satellite tracking systems (GNSS) are significant and important tools that support military goals and missions, and they are...
Silverfort, photo illus. network cyber by Pixabay

A zero-trust approach is an approach in the field of IT and cyber security defining access to the design and deployment of IT networks....
Photo illus. cyber security by Pixabay

Cyberattacks against industrial players, providers of critical infrastructure and facilities, and energy corporations - whether oil, natural gas, or renewable energy - are frequently...
Photo illus. cyber security by Pixabay

As of last week, Darktrace announced its intention to acquire Cybersprint, a Dutch provider of advanced cyber security services and a manufacturer of special...
electromagnetic spectrum, Photo illus. soldiers by US National Archives

In the weeks following Senate approval, the new U.S. military procurement official examined U.S. military procurement methods, recruitment strategies, and service plans closely. The new...
first responders, Photo: illustration, US DHS

Homeland Security is regarded as the lead federal agency that addresses Russian influences on the U.S. Last week, an official statement from US Homeland Security...
Photo illus. Pxfuel

It appears that supply chains crucial to the US economy and national security are vulnerable to cyber threats.  US President Biden’s executive order on America’s...
photo illus. cyber by Pixabay

Ransomware and malware, as well as cyberattacks, are a real threat to the systems of governments and local authorities, and the number of warnings...
Photo illus. cyber security by Pixabay

Internal personnel are the largest security threat to a firm, according to a recent research, with IoT devices being the most vulnerable. Even during...
photo illus. cybersecurity by Pixabay

Iranian-linked hackers are behind cyber espionage aimed at a number of sectors, including defense, local government, oil and gas, as well as worldwide communications...

According to a recent report by cyber security company CrowdStrike, ransomware-related information leaks have increased by over 82% between 2020 and 2021. The Global...
Photo illus. by Pixabay cyber-security

Against the backdrop of the latest developments, the EU is activating a newly-formed Cyber Rapid-Response Team (CRRT) to Ukraine to help the country combat...
wearable tech

Internet-of-things (IoT) devices are vulnerable to various cyber threats. One of them is the side-channel attack. This tactic seeks to gather secret information by...
photo illus. cybersecurity by Pixabay

State-actors and cybercriminals alike concentrate efforts in bypassing strong encryption. It has never been more important to focus on updated, resilient HTTPS configurations, according...
Ukraine flag by Maxpixel

A cyberattack hit the websites of Ukraine's defense ministry and armed forces, and the websites of two Ukrainian banks on Feb. 15, Ukrainian government...