European Commission Moves to Strengthen Joint Intelligence Capabilities

0
The European Commission is planning to establish a new intelligence unit that intends to improve the use of information collected by national spy agencies...

The Hidden Trail Behind 3D-Printed Weapons

0
3D printing is often celebrated for its ability to produce toys, tools, and prototypes quickly, but the technology can also be exploited for illegal...

FireAnt Swarms Take a Bite Out of Heavy Armor

0
A new class of small, ground robots is being pitched for frontline missions: low-cost, networked unmanned ground vehicles (UGVs) that operate in coordinated swarms...

Echo-Based Exploits Allow Tracking in Zoom and Teams Calls

0
A recent study highlights a surprising vulnerability in video conferencing platforms such as Zoom and Microsoft Teams: even with cameras off, microphones muted, or...

Researchers Find New Vulnerabilities in LTE Networks

0
Researchers at the Korea Advanced Institute of Science and Technology (KAIST) have identified previously unknown security flaws in LTE mobile networks that could put...

Morphing Hypersonic Technology Could Redefine High-Speed Flight

0
Chinese aerospace researchers have announced a new development in hypersonic flight: a prototype vehicle able to alter its aerodynamic shape while travelling at speeds...

Smart, Stealthy, and Squishy: An Underwater Jellyfish Robot

0
Chinese researchers have unveiled a new biomimetic underwater robot designed to operate almost invisibly beneath the surface. Modelled after a jellyfish, the transparent robot...

When Every Second Counts: Vigor Medical Transforms Ultrasound into a Smart,...

0
Vigor Medical is a graduate of the INNOFENSE Innovation Center operated by iHLS in collaboration with IMoD. This unique acceleration program removes entrance barriers to the...

Major Israeli Exit Set to Transform the World of Emergency Call...

0
Israeli company Carbyne, which developed an advanced real-time emergency call management system, has been acquired by U.S.-based Axon in an all-cash deal valued at...

Corporate Messaging Platform Became Gateway for Hackers

0
Nikkei Inc., Japan’s largest financial news organization and owner of the Financial Times, revealed that hackers gained access to its networks through an employee’s...

Breaking Down the Unbreakable: Teflon Gets Recycled

0
A new chemical recycling method could finally offer a sustainable solution to one of the toughest plastics ever made. Researchers from the University of...

Fighter Jet Without a Runway? X-BAT Makes It Real

0
A new unmanned vertical take-off and landing (VTOL) fighter platform has been revealed, designed to operate from ships, islands, and austere locations while carrying...

Gmail Data Leak: 183 Million Reasons to Rethink Your Password Security

0
A new trove of stolen login credentials has surfaced online, with 183 million email addresses and passwords added to the “Have I Been Pwned”...

99% Accuracy: How Never Mine is Shaping the Future of Demining

0
Never Mine is a graduate of the INNOFENSE Innovation Center operated by iHLS in collaboration with IMoD. This unique acceleration program removes entrance barriers to the...

Batteries, Not Flux Capacitors: The Real Future of Urban Flight

0
Electric air taxis may be the future of city transport, but before they take off, critical gaps in infrastructure, regulation, and airspace management need...

Bridging the Global Talent Gap with AI: How Iverse Is Redefining...

0
The global workforce is undergoing a seismic shift. Driven by the rise of AI and the normalization of remote work, the job landscape has...
image provided by pixabay

North Korean Crypto Theft Tops $2 Billion in 2025, Marking Record...

0
The year isn’t even over yet, but cyber groups linked to North Korea have already made 2025 their most profitable year to date, stealing...
Image by Unsplash

OpenAI Blocks Accounts Linked to Foreign Surveillance and Cyber Activity

0
OpenAI has recently taken action against several user accounts it says were attempting to misuse its ChatGPT platform for surveillance and cyber operations. The...

Alleged Cyberattack Targets Israeli Satellite Infrastructure, but Claims Raise Doubts

0
An emerging cyber incident involving Spacecom—the operator of Israel’s AMOS satellite fleet—has drawn attention after a pro-Palestinian hacker group claimed it had gained access...

DSEI London 2025 – The Future of International Security: Technology, Collaboration,...

0
By: Or Shalom The DSEI London 2025 exhibition, which took place on September 9–12 at the ExCeL Centre in London, is the flagship event for...
Image by Pexels

New Research Reveals Deceptive Behavior in Leading AI Models

0
Recent findings from a joint study by OpenAI and Apollo Research indicate that large language models (LLMs) are capable of engaging in deceptive behavior,...

Implementing Technology in VIP Protection in Complex Environments and Mass Events

0
Written by Or Shalom In the past decade, we have witnessed a sharp increase in assassination attempts and attacks targeting senior officials and public figures,...

Latest

New Wheeled Howitzer Marks Artillery Milestone

0
A new Turkish self-propelled howitzer has entered operational service, marking a step toward greater independence in artillery production. The system, designated T-155 TTA, integrates...