Content Paint

The Stack

Interviews, insight, intelligence, and exclusive events for digital leaders.

 |  startups  | Apr 27, 2026
/
STACKUP: The Stack's weekly tech startups and funding wrap
GitHub  | Apr 27, 2026
/
GitHub bug messed up  customer code; COO plays down incident
Cisco  | Apr 25, 2026
/
FIRESTARTER backdoor used for persistence on Cisco boxes in "widespread campaign
 |  Security  | Apr 24, 2026
/
The NCSC is worried about HDMI-based attacks, should you be?
ActiveMQ  | Apr 23, 2026
/
activemq bugs exploited
 |  IBM  | Apr 23, 2026
/
Big Blue says its sleeper AI tool 'Bob' boosted dev productivity 45%

All the latest

All the latest

4213 Posts
New Chinese open models challenge closed Western top tier

DeepSeek V4 and Qwen3.6-27B, both out last week, put pressure on Western models – especially for pricing.

STACKUP: The Stack's weekly tech startups and funding wrap

This week's rounds and milestones.

“The CPU is reinserting itself”, will reach parity with GPUs for AI workloads: Tan

Elon Musk wants Intel's 14a for his planned "Terafab"

France’s shift from US technology starts with 250 "DINUM" machines and NixOS

Sécurix builds on a NixOS configuration layer designed to meet the requirements of ANSSI.

GitHub bug messed up  customer code; COO plays down incident

The company didn’t even notice it happening until customers howled - COO describes it as an "edge case"

FIRESTARTER backdoor used for persistence on Cisco boxes in "widespread campaign

The only real way to spot the malware is memory analysis. Organisations can get a disk image by opening a Cisco Technical Assistance Center (TAC) case. Good luck, y'all.

China now as good as U.S. at offensive cyber: Dutch intelligence

"In 80 years there has never been a threat landscape like the current one"

Disgruntled Claude users get an explanation – and another option with ChatGPT-5.5

ChatGPT-5.5 smashes long-running coding tasks per friendly early reviewers; Anthropic explains Claude issues.

The NCSC is worried about HDMI-based attacks, should you be?

Cybersecurity experts weigh in on "niche" world of monitor and HDMI-based attacks.

Browse by Tags

Search the site

Your link has expired. Please request a new one.
Your link has expired. Please request a new one.
Your link has expired. Please request a new one.
Great! You've successfully signed up.
Great! You've successfully signed up.
Welcome back! You've successfully signed in.
Success! You now have access to additional content.