Category: EN

What Rural Internet Providers Offer Remote Communities

Loss of internet access in rural areas is considerably more serious, as it disrupts education, work, and communication. Despite such hurdles, it is rural internet providers serving such remote communities and getting them connected. By understanding what these providers can…

A Walk in the Park

In August of 2024 I stopped in my local book shop (shoutout to The Raven Bookstore) as I often do to browse the shelves and see if there was anything I couldn’t live without. A very colorful book jacket caught…

Iran Attacks Israeli Cybersecurity Infrastructure

The National Cyber Directorate found a series of cyberattacks that targeted Israeli organisations that offer IT services to companies in the country, and might be linked to Iran. Earlier this month, the failed cyberattack against Shamir Medical Center on Yom…

How to Make Zoom Meetings More Secure and Protect Your Privacy

  Zoom calls remain an essential part of remote work and digital communication, but despite their convenience, they are not entirely private. Cybercriminals can exploit vulnerabilities to steal sensitive information, intercept conversations, or access meeting data. However, several practical measures…

Proxy Servers: How They Work and What They Actually Do

When browsing online, your device usually connects directly to a website’s server. However, in certain cases, especially for privacy, security, or access control — a proxy server acts as a go-between. It stands between your device and the internet, forwarding…

The Growing Role of Cybersecurity in Protecting Nations

  It is becoming increasingly complex and volatile for nations to cope with the threat landscape facing them in an age when the boundaries between the digital and physical worlds are rapidly dissolving. Cyberattacks have evolved from isolated incidents of…

Agent Session Smuggling: How Malicious AI Hijacks Victim Agents

Security researchers have uncovered a sophisticated attack technique that exploits the trust relationships built into AI agent communication systems. The attack, termed agent session smuggling, allows a malicious AI agent to inject covert instructions into established cross-agent communication sessions, effectively…

Hackers Hide SSH–Tor Backdoor Inside Weaponized Military Documents

In October 2025, cybersecurity researchers at Cyble Research and Intelligence Labs (CRIL) uncovered a sophisticated malware campaign distributing weaponized ZIP archives disguised as military documents. The attack specifically targeted Belarusian military personnel through a lure document titled “ТЛГ на убытие…

CISA Alerts on Linux Kernel Vulnerability Exploited in Ransomware Attacks

The U.S. Cybersecurity and Infrastructure Security Agency has added a critical Linux kernel vulnerability to its Known Exploited Vulnerabilities catalog, warning that threat actors are actively leveraging the security vulnerability in ransomware campaigns targeting organizations worldwide. The vulnerability, tracked as…