Skip to main content

Content with the tag dual-use technologies

From April 24 to 26, 2025, COcyber’s AI Cybersecurity Deephack brought together cyber enthusiasts from academia, research and the start-up scene for an intense 48-hour challenge to answer one critical question: can artificial intelligence stop the next big phishing attack?
The Hungarian case study shows how cybersecurity technology and information transfer are shaped by a system where state coordination, legal frameworks, and defence priorities play a central role.
Lithuania’s case study shows how stronger coordination, clearer transfer pathways, and greater trust in information sharing can help turn cybersecurity innovation into practical national resilience.