Cybersecurity

The invisible risk: Can you really trust your ‘private’ AI assistant to keep your secrets?

TECH AFFAIRS: Research by Israeli cybersecurity company Check Point found a weakness in ChatGPT’s system that could allow someone to extract data without triggering any alarms.

The ChatGPT app icon on a smartphone in this illustration taken October 27, 2025
FBI Director Kash Patel testifies before the Senate Appropriations Committee hearing on President Trump's proposed budget request for the Federal Bureau of Investigation, on Capitol Hill in Washington, DC, US, May 8, 2025.

Iran-linked hackers claim breach of FBI director's personal email, DOJ official confirms break-in

ON THE front line of the cyber war, Israel has become one of the world’s most targeted countries for cyberattacks, with state-backed hackers increasingly using AI to probe government networks, companies, and critical infrastructure.

Israel cyber chief: Iran war has delayed cyber law, bill could be passed in 2027 post-elections

 Illustrative image of a cyberattack with Israeli and Iranian flags.

Israel major target for cyberattacks on critical infrastructure, study finds


Vulnerabilities exposed: Israeli company reveals how users can hack ChatGPT accounts remotely

The Israeli cybersecurity company Zenity revealed how one could take control of a ChatGPT account and extract sensitive information without the user clicking any link.

ChatGPT ilustrative image.

Israel's gold rush: Inside Palo Alto Networks’ $25b. acquisition of CyberArk

TECH AFFAIRS: When it comes to the cybersecurity market, mergers and acquisitions are shaping the industry and changing it from end to end.

PALO ALTO Networks will pay $25 billion for CyberArk, the vast bulk of which will be paid in shares.

The largest acquisition in its history: Palo Alto acquires cyber company from Petah Tikva

Cyber firm from Petah Tikva offers key identity and access tools - now central to cybersecurity. The U.S. buyer, via the deal, becomes the world’s most comprehensive cyber platform.

Cyber Systems Management

Inside the minds of the cyber attackers - opinion

To cyber attackers, a successful breach in Israel isn’t just a technical victory but a symbol of resistance.

AN AIR DEFENSE SYSTEM is employed to intercept an Iranian missile attack, as seen from Jerusalem last month. As Israel fended off physical attacks from the air, it also grappled with a surge in silent, sophisticated cyber warfare, says the writer.

A-G denounces govt. emergency vote approving cyber regulations following legislative failure

Government Secretary Yossi Fuchs claims the haredi draft bill created "political restraints" which made it impossible to pass the vote in the Knesset, requiring an emergency cabinet phone vote.

Attorney-General Gali Baharav-Miara attending a committee meeting in the Knesset, April 27, 2025; illustrative.

Should Israel risk security to share its cyber technology with the rest of the world? - opinion

The world needs Israeli cyber technologies - the challenge is to find the right balance between realizing economic potential and maintaining national security.

 An illustrative image of an Israeli using security programs on a computer.

Israeli cybersecurity funding doubles in 2024, outperforms global markets, non-profit finds

Startup Nation Central's 2025 Cybersecurity Spotlight examined why Israeli cybersecurity firms are performing so well, highlighting various strengths that differentiate them from global competitors.

 Israeli cyber security; illustration.

Israel’s EV charging chaos needs a credit card, not another app - opinion

The digital bureaucracy of Israel’s electric vehicle (EV) charging market reflects a fundamental market failure, but there are simple technological solutions.

 Electric vehicles now as reliable and durable as petrol and diesel cars, study finds.

New cybersecurity partnership aims to improve incident response readiness

The collaboration will combine Redpoint's response services with Cytactic's AI-powered management platform, with the goal of improving preparedness and coordination before, during, and after attacks.

Cyber Attack

ICC says new cybersecurity incident has been contained

The incident was the second of its type against the ICC in recent years, it said in a statement.

A man holds a laptop computer as cyber code is projected on him in this illustration picture