Content Paint
Edward Targett

Edward Targett

Ed is co-founder of The Stack, He previously edited the late Computer Business Review, and earlier, Roubini Global Economics. He left school at 15 and has made a living asking "but why/how?" since.

NVIDIAScape: Critical NVIDIA bug CVE-2025-23266

Too exotic for cybercriminals? Unlikely. Kubernetes malware spotted escaping Windows containers in 2021 and LangFlow seen exploited this year.

NCSC looks to tap fresh blood for Vulnerability Research Initiative, explore AI use

The UK’s National Cyber Security Centre (NCSC) is keen to bring in fresh blood to its Vulnerability Research Initiative, including across AI.  Contrary to a flurry of press releases from excited cybersecurity vendors hitting The Stack’s inbox this week, the VRI is not new and has been running

Nutanix CEO Rajiv Ramaswami on taking on Red Hat, "Cloud Native AOS" and more.

"Your key databases are still running on VMs, your SAP systems, your enterprise ERP systems, your security products..."

Wall Street diverges on Stablecoins, as regulators mouth mounting concerns

Jamie Dimon: "I don't know why you'd want a stablecoin as opposed to just a payment"

Not the CIO’s job? Getting your organisation AI agent ready – “the promise and the peril”

"Massive questions that we are grappling with, from the balcony all the way down to the dance floor"

CIA’s first CTO calls it quits after three years

“Technology is starting to hungrily consume the world of intelligence and national security”

Patch Tuesday: A wormable bug in a security mechanism and other delights

The bug is in the SPNEGO Extended Negotiation Security Mechanism – which essentially allows a client and server to negotiate the choice of security mechanism that they use.

Post Office’s Fujitsu software: Still faulty, after 13 suicides?

981 test scripts to fix bugs in 2021, blogs deleted, judge has concerns.

Ransomware attack on major IT reseller leaves MSPs dangling

In earlier SafePay attacks the group has actively gone after backups and deleted Volume Shadow Copies (VSC) in an effort to inhibit recovery activities.

Search the site

Your link has expired. Please request a new one.
Your link has expired. Please request a new one.
Your link has expired. Please request a new one.
Great! You've successfully signed up.
Great! You've successfully signed up.
Welcome back! You've successfully signed in.
Success! You now have access to additional content.