Cybersecurity

Europol intercepts tens-of-thousands of incidents tied to IRGC-related terrorist content

The IRGC, designated a terrorist group by the EU in February, had created an online presence to spread propaganda, recruit supporters, and raise funds.

This general view shows the exterior of the European Union (EU) police agency Europol headquarters in The Hague on March 28, 2026.
Ashdod Port

Ashdod Port Company announces investment of $650,000 transforming CCTV cameras into smart eyes

 Spotify

Pro-Iran hackers claim cyberattack on Spotify, cite ‘revenge’ for Khamenei's killing - report

(ILLUSTRATIVE) A logo of Meta AI sits outside the Meta House on the opening day of the 55th annual meeting of the World Economic Forum in Davos, Switzerland, January 20, 2025.

Meta employees launch protest against mouse-tracking tech at US offices


Cyber proxy wars escalate as hackers shift to infrastructure targets

Future hacktivist attacks may target critical infrastructure, such as power grids, water treatment facilities, and manufacturing sites, according to indications highlighted in the report.

Hacker attack

Israel's new threat map is a system, not a front

The new reality is not sequential threats, but simultaneous pressure across physical and digital domains

Alon Lifshitz, Founding Partner of Aurelius Capital

What Anthropic’s Mythos means for cybersecurity and what it takes to prevail now - opinion

In a world where AI can autonomously discover and exploit weaknesses, defense must become autonomous as well.

AI and computing, illustrative image.

Iran’s new internet litmus test ensures only pro-regime voices will be heard online, experts warn

While Iran’s rollback on restrictions may seem like a sign that the regime is ending the internet blackout, experts warned that it is a new tool for the regime to feed the Western audience propaganda

An online teacher, Nazafarin, works on her laptop at home, after a nationwide internet shutdown since January 8, 2026, following Iran's protests, in Tehran, Iran, January 24, 2026.

The new cyber threat: Fake CEOs and real consequences - opinion

The world has changed, and dealing with deepfake requires preparedness, not just sophistication.

An illustrative image of a distorted figure meant to symbolize deepfakes.

Beyond a ceasefire, top IDF officer compromised- opinion

These operations blur the line between cyber and traditional warfare. While no physical damage may be immediately visible, the groundwork is being laid for potential future actions

Former IDF Chief of Staff Lt.-Gen (ret.) Hertzi Halevi

The invisible risk: Can you really trust your ‘private’ AI assistant to keep your secrets?

TECH AFFAIRS: Research by Israeli cybersecurity company Check Point found a weakness in ChatGPT’s system that could allow someone to extract data without triggering any alarms.

The ChatGPT app icon on a smartphone in this illustration taken October 27, 2025

Iran-linked hackers claim breach of FBI director's personal email, DOJ official confirms break-in

A Justice Department official confirmed to Reuters that Patel's emails were compromised but did not go into detail.

FBI Director Kash Patel testifies before the Senate Appropriations Committee hearing on President Trump's proposed budget request for the Federal Bureau of Investigation, on Capitol Hill in Washington, DC, US, May 8, 2025.

Israel cyber chief: Iran war has delayed cyber law, bill could be passed in 2027 post-elections

In February, before the Iran war began, the INCD chief said that the latest version of the cyber law, which he proposed on January 25, would be a priority for him in terms of securing passage.

ON THE front line of the cyber war, Israel has become one of the world’s most targeted countries for cyberattacks, with state-backed hackers increasingly using AI to probe government networks, companies, and critical infrastructure.

Israel major target for cyberattacks on critical infrastructure, study finds

The study found that most attacks exploit communication protocols to gain remote control of industrial processes but don’t require advanced skills or technical knowledge.

 Illustrative image of a cyberattack with Israeli and Iranian flags.