Content Paint

The Stack

Interviews, insight, intelligence, and exclusive events for digital leaders.

 |  agentic ai  | Jan 30, 2026
/
A person taps a Visa credit card on a payments terminal. Visa is working on agentic commerce with Google
 |  Government  | Jan 30, 2026
/
UK Technology Minister Liz Kendall stands in front of a Union Jack flag
 |  Microsoft  | Jan 29, 2026
/
5 main takeaways from Microsoft's earnings call
Security  | Jan 29, 2026
/
A backdoor was the "most downloaded" skill for viral Clawdbot/Moltbot - and why that matters
 |  AI  | Jan 28, 2026
/
Cloudflare backpedals on Matrix server blog post with 'AI-assisted' code
Fortinet  | Jan 28, 2026
/
Fortinet customers exploited after SSO howler

All the latest

All the latest

3941 Posts
Security predictions for 2023 from some of the best CISOs around

Thoughts from CISOs and business leaders...

Scottish Water dangles £50m for new cybersecurity partner

Wanted: MDR and a whole lot more

As CIO budgets tighten, Apache Superset looks like a Big Data winner

Free data exploration and visualisation tool continues to gain traction

Intel's new "On Demand" will make you pay extra license to unleash chips

Intel touts one of the “most important product launches in company history”

Royal Mail cyber incident sees international shipments crippled

National Crime Agency investigating as well as NCSC

Gird your loins: Patch Tuesday’s back

It’s that time of the month again: Microsoft has pushed out 98 security patches for January’s Patch Tuesday: 11 are critical, one CVE-2023-21674  is being actively exploited and another gives unauthenticated remote access to your SharePoint Server – and requires not just the patch but a “SharePoint upgrade action”

Ray-Ban maker saw $272 million stolen by cybercriminals -- behind it was a romance scam

Company blames JPMorgan for AML failings, sues it for recovery

"Caught by the Fuzz" -- These free tools for hackers are also good for application security QA

Analysis by The Stack of over 90,000 vulnerabilities revealed a sharp growth in bugs associated with widely known “CWEs” – or potentially exploitable weaknesses that can occur in architecture, design, code, or implementation and which could potentially have been caught upstream in a secure development process. One control is to

We analysed 90,000+ software vulnerabilities: Here's what we learned

Can you guess the product with the most CVEs in 2022?

Browse by Tags

Search the site

Your link has expired. Please request a new one.
Your link has expired. Please request a new one.
Your link has expired. Please request a new one.
Great! You've successfully signed up.
Great! You've successfully signed up.
Welcome back! You've successfully signed in.
Success! You now have access to additional content.