image provided by pixabay

Space Cyberthreats – Biggest Risk to Space Operations

0
Researchers from California Polytechnic State University published a report stating that with governments and other space organizations focusing on the dangers of space debris...

Three Charged with One of the Largest Reported Data Breaches in...

0
Earlier this month, two indictments were brought against two Vietnamese citizens residing in the Netherlands, for their respective roles in hacking email service providers...

NATO to Apply Armed Conflict Law to Cyber Warfare

0
The NATO alliance is pushing for a more robust cyber defense strategy ahead of its September summit in Wales. The allies are likely to...

Hackers ‘Swooped’ on biological and nuclear warfare studies

0
Security researchers have uncovered a group of hackers who broke into 300 banks, corporations and governments for 12 years without being caught. The hacker collective...
image provided by pixabay

Can AI Help Fight Cybercrime?

0
Experts claim artificial intelligence could become a crucial asset in fighting the growing global risk of cybercrime, as published in a new study led...

How to Manage a Cybersecurity Emergency Event?

0
A mission form the Israeli Public Security Ministry recently visited  an emergency center in the US in order to learn more about methods to...
cyber attack illust.

Will Organizational Change Yield More Offensive Cybersecurity?

0
The US is enhancing its stance towards cybersecurity. A new cybersecurity directorate is being established as the National Security Agency’s (NSA) foreign intelligence and...
Censorship

New App Successfully Fights Censorship

0
A new app has been recently launched by Google, aimed at protecting users from state-sponsored censorship and limitations on freedom of information. The app,...

The Rise of Robotics – Time to rethink Security

0
The rise of robotics is bringing with it many apprehensions regarding security. A book that has come out recently “Future Crimes: Everything Is Connected,...
united states capitol. image by pixabay

Companies Prefer NOT to Work with The Pentagon – Why Is...

0
According to reports, only 1% of defense firms in the US utilize Department of Defense's security services. Why is that? Although US companies must adhere...
image provided by pixabay

NCSC Warns of Chatbot ‘Prompt Injection’ Attacks

0
The National Cyber Security Centre (NCSC) said there are growing cybersecurity risks of malicious actors manipulating bots through “prompt injection” attacks, in which a...

China Spied on Foreign Diplomats During G-20 Summit

0
European diplomats and ministries of foreign affairs have been targeted during recent G20 meetings by Chinese-speaking hackers conducting espionage campaigns using malware to siphon...
Blockchain System

Seven Things You Didn’t Know About Blockchain

0
You may have heard the term "blockchain" used when people talk about cryptocurrencies like bitcoin. If you're unsure of what it means, think of...

Zero-Trust Cybersecurity as a Priority

0
The US government has been prioritizing zero-trust cybersecurity. Zero trust security asserts that devices should not be trusted by default, even if they are...
Photo illust US Marine Corps

Application Now Open – Join Israel MoD’s Startup Program!

0
If your startup is developing a groundbreaking technology we invite you to apply to INNOFENSE Innovation Center. Applications are open to the second cycle of...

Cyber Risks at the Sochi Olympics

0
People interested in attending the 2014 Winter Olympic Games in Sochi are advised to take extra precautions to protect themselves from cyber attacks during...
Image provided by pixabay

Linus Malware Rates Reach Record Highs

0
New Linux malware hit record highs at the end of 2022, showing a growth of 117% over previously reports levels. Malware attacks targeting Linux are...
border & offshore security

Attend Leading Conference, Exhibition on Border, Perimeter & Offshore Security

0
Attend Border, Perimeter & Offshore Security Conference and Exhibition on May 7, 2019 at the Lago Conference Center, Rishion LeZion West. Israel is a global leader...

DARPA Cyber Grand Challenge’s Final Stage

0
Seven teams from around the country have earned the right to play in the final competition of DARPA’s Cyber Grand Challenge (CGC), a first-of-its-kind tournament...

Virtualized security solution ensures safe ultra-broadband customer experience

0
With the number of malware attacks rising sharply in 2013, and an estimated 15 million mobile devices worldwide infected at any one time, the...
AUS&R

Drone Delivery Revolution is Here to Stay and Israel Plays a...

0
The drone revolution has been expanding to every field, including commercial package delivery, medical supply in an emergency, and plays a logistical role on...

British combined effort against Cyber attacks

0
 Nine leading British defense companies are collaborating with the government in a partnering scheme to prevent cyber attackers from stealing the industry’s secrets. This...

Latest

Image from video https://www.youtube.com/watch?v=M1Z5fCmJ1mE&t=1s&ab_channel=%D0%A1%D0%BB%D1%83%D0%B6%D0%B1%D0%B0%D0%B1%D0%B5%D0%B7%D0%BF%D0%B5%D0%BA%D0%B8%D0%A3%D0%BA%D1%80%D0%B0%D1%97%D0%BD%D0%B8

Ukraine’s Sea Baby Drones Just Got Deadlier

0
Ukraine improves its autonomous maritime capability by upgrading its “Sea Baby” multi-purpose unmanned surface vehicle (USV), which is now primarily focused on providing security...