Featured

Students Support Cyber Employee After Suspension

By Bianca Dinkha   After beloved Cyber Café employee Tiana Pagan was suspended, students quickly came to her defense; now she’s back and ready to tell...

CISA announces town halls to gather public input on proposed cyber incident reporting requirements

The Cybersecurity and Infrastructure Security Agency announced Feb. 13 that it will host a series of virtual town hall meetings...

Frenos debuts Adversary Intelligence Engine to power transparent AI-driven defense

Frenos, a vendor of AI native operational technology (OT) security posture management, announced on Wednesday the launch of Adversary Intelligence Engine, an IT/OT cybersecurity...

Cyber threats to watch in 2026 – and other cybersecurity news

Top cybersecurity news: Collaboration critical to tackle 2026 cyber risks, says Forum report; US presses telecoms to boost ransomware defences, and more. 

HSB Launches Cyber Insurance for Connected Commercial Vehicles

This is a paid press release. Contact the press release distributor directly with any inquiries. Business Wire 3 min read HSB Commercial Cyber for Auto covers...

Critical Flaws Found in Four VS Code Extensions with Over 125 Million Installs

Cybersecurity researchers have disclosed multiple security vulnerabilities in four popular Microsoft Visual Studio Code (VS Code) extensions that, if successfully exploited, could allow threat...

Cybersecurity Tech Predictions for 2026: Operating in a World of Permanent Instability

In 2025, navigating the digital seas still felt like a matter of direction. Organizations charted routes, watched the horizon, and adjusted course to reach...

Cyber attackers hide their tracks by exploiting firewalls

Barracuda research shows that nine out of ten ransomware incidents in 2025 exploited firewalls. In the fastest case, there were three hours between the...

Threat groups using AI to speed up and scale cyberattacks

A report from Palo Alto Networks finds hackers are increasingly using stolen identities and exploiting critical vulnerabilities within minutes of disclosure. Published Feb. 18, 2026 ...

Latest articles