Home Blog Page 38
Images provided by Pixabay

Russian Hackers Exploit Zero-Day Vulnerability in Firefox, Thunderbird, and Tor Browser

0
A critical zero-day vulnerability affecting Mozilla’s Firefox, Thunderbird, and Tor Browser has been exploited by Russian hackers in a widespread attack campaign. Discovered by...
image provided by pixabay

The Launch of the World’s First Autonomous Navigation Satellites

0
China has made a leap in space technology with the launch of the world’s first satellites capable of autonomous navigation. The two satellites, Siwei...
Image by Unsplash

Robots Can Now Train Each Other—Here’s How It’s Changing Everything

0
UC Berkeley engineers have introduced a revolutionary framework called RoVi-Aug, designed to enable robots to autonomously transfer skills across different models without human intervention....
Image by Pixabay

From Research Labs to the Stock Market – Cyber in the...

0
Written by Or Shalom As part of the US Department of Defense’s efforts to implement secure AI deployment strategies, an advanced tool called Panoptic Junction...
Image by Pixabay

Laptop Webcam Vulnerability Allows Hackers to Open Camera without Triggering LED

0
A recent discovery by security engineer Andrey Konovalov reveals that certain laptop webcams, including the Lenovo ThinkPad X230, could be controlled by malware in...
Image by Wikimedia (public domain)

F-35C Lightning II Used in Successful Strikes in Yemen

0
On November 9 and 10, the US Marine Corps achieved a historic milestone, launching the Marines' first combat air strikes using the F-35C Lightning...
Image by Pixabay

The Advanced “Hacker-Proof” Microcomputer for Enhanced Security

0
China’s Purple Mountain Laboratories has revealed an innovative microcomputer designed to significantly bolster cybersecurity. The new device, called ESC0830, is a highly advanced microcontroller...
Image by Pixabay

Google in Another Antitrust Lawsuit, Now Over Online Ad Monopoly

0
In a high-stakes antitrust case, Google and the US government delivered closing arguments on Monday in a Virginia federal court, as the tech giant...
Image by Pixabay

New Radar-Defeating Coating can Revolutionize Stealth Technology

0
The Chinese military has announced the development of a new radar-defeating coating that could significantly enhance stealth technology by hiding targets from anti-stealth radar....
Image by Pixabay

Cybercriminals Target Netflix Users with Phishing SMS Campaigns

0
Cybercriminals are launching a widespread phishing campaign aimed at stealing Netflix credentials and credit card information, security firm Bitdefender has warned. The ongoing scam,...
Image by Unsplash

New Record Set for Perovskite Solar Cell Efficiency

0
An achievement in solar technology has been made by the Korea Research Institute of Chemical Technology (KRICT) in collaboration with UniTest Co. Their new...
Image by Unsplash

Microsoft Develops New Language for Faster LLM-to-LLM Communication

0
A team of engineers and AI specialists at Microsoft, in collaboration with researchers from the University of Chicago, has created a new language designed...
Image by Unsplash

Russian Hackers Use WiFi Networks to Bypass MFA in Sophisticated “Nearest...

0
A new, attack method has emerged from Russian state-backed hackers, leveraging nearby WiFi networks to infiltrate organizations. The cyberattack, attributed to the notorious APT28...
Image by Pixabay

Machine Learning Algorithm Could Help Prevent Drowsy Driving

0
A new study from Sharjah University has unveiled an innovative machine learning (ML) and deep learning (DL) algorithm designed to detect driver drowsiness, potentially...
image provided by pixabay

Breakthrough Ultra-Fast Charging Lithium-Sulfur Battery for EVs and Drones

0
Engineers at Monash University have made a significant breakthrough in battery technology with the development of an ultra-fast charging lithium-sulfur (Li-S) battery. This innovative...
image provided by pixabay

Vulnerability found in Widely Used File Compression App

0
A high-severity vulnerability has been discovered in the popular file compression program 7-Zip, potentially allowing attackers to execute code on affected machines. Disclosed by...
Image by Wikimedia (public domain)

Puma UAS Enhanced with Software Upgrades for Battlefield Resilience

0
AeroVironment (AV) is introducing a suite of software updates, known as Project GOLD, to enhance the battlefield effectiveness of its Puma 3 AE and...
Image by Unsplash

Chinese Company Challenges Starlink’s Dominance

0
A new competitor is emerging in the satellite internet race, as Shanghai-based SpaceSail takes aim at disrupting Elon Musk’s Starlink in Latin America. SpaceSail...
Image by Unsplash

Ghost Tap: A New NFC-Based Fraud Tactic Gaining Traction

0
In recent years, payment using NFC one's phone has become increasingly common, as it is a method both safer and more convenient than carrying...
Image by Pixabay

Introducing the Startups Selected for the Fifth Cycle of the INNOFENSE...

0
We are pleased to announce the launch of the fifth cycle of the INNOFENSE Innovation Center. The six selected projects were selected among hundreds...
PHoto illust US Air FOrce

The Future of Military Logistics: New Drone Delivers 225 Kg of...

0
UAS manufacturer Silent Arrow has been awarded a $1.8 million Small Business Innovation Research (SBIR) contract by the U.S. Air Force Research Laboratory (AFRL)....
image provided by pixabay

New Coating Boosts Efficiency and Durability of Perovskite Solar Cells

0
A breakthrough in solar technology has been made by researchers at Northwestern University, where they developed a new protective coating that significantly enhances both...

Latest

Image by Wikimedia (public domain)

Switchblade 600 Successfully Launched from MQ-9A Reaper in Long-Range Strike Test

0
A recent demonstration in Arizona marked a significant advancement in integrating loitering munitions with unmanned aerial platforms. The test involved launching a Switchblade 600...