Featured

Cyber Agency to Hold Town Halls On Data Breach Reporting Changes

The Cybersecurity and Infrastructure Security Agency is asking for additional feedback on how to refine the scope and burdens of a Biden-era cyber incident...

Minnesota Sends $1.2M to Aid St. Paul Cyber Attack Recovery

(TNS) — Gov. Tim Walz has authorized $1.2 million in state emergency disaster assistance to address a cybersecurity incident that disrupted digital services in...

Kyndryl Launches Intelligent Recovery Service to Enhance Cyber Resilience and Compliance

New service provides faster recovery, real-time visibility and proactive monitoring to enhance customer business continuity and regulatory compliance NEW YORK, Feb. 12, 2026 /PRNewswire/ --...

New Kyndryl tool targets faster recovery from cyber outages, stricter rules

New service provides faster recovery, real-time visibility and proactive monitoring to enhance customer business continuity and regulatory compliance NEW YORK, Feb. 12, 2026 /PRNewswire/ --...

Google Reports State-Backed Hackers Using Gemini AI for Recon and Attack Support

Google on Thursday said it observed the North Korea-linked threat actor known as UNC2970 using its generative artificial intelligence (AI) model Gemini to conduct...

Lazarus Campaign Plants Malicious Packages in npm and PyPI Ecosystems

Cybersecurity researchers have discovered a fresh set of malicious packages across npm and the Python Package Index (PyPI) repository linked to a fake recruitment-themed...

Poland Energy Sector Cyber Incident Highlights OT and ICS Security Gaps

CISA offered an alert to highlight key lessons learned from the attack. 

Cydome Embedded brings advanced maritime and energy cybersecurity to resource-constrained edge devices

Cydome, a vendor of maritime and critical infrastructure cybersecurity, has introduced Cydome Embedded for Remote Energy Facilities. This new deployment option delivers comprehensive cyber...

CISA Offers Guidance on Addressing Cyber Risks from Legacy Protocols

The guidance addresses known issues with insecure-by-design legacy industrial protocols. 

Latest articles