Content Paint

The Stack

Interviews, insight, intelligence, and exclusive events for digital leaders.

Cisco  | Apr 25, 2026
/
FIRESTARTER backdoor used for persistence on Cisco boxes in "widespread campaign
 |  Security  | Apr 24, 2026
/
The NCSC is worried about HDMI-based attacks, should you be?
ActiveMQ  | Apr 23, 2026
/
activemq bugs exploited
 |  IBM  | Apr 23, 2026
/
Big Blue says its sleeper AI tool 'Bob' boosted dev productivity 45%
 |  Command Line  | Apr 21, 2026
/
Command Line: Inference is breaking the bank, GitHub throttles AI use, GEICO's rethinking its network
 |  AI  | Apr 21, 2026
/
GitHub pauses Copilot sign ups, tightens limits as agents stretch capacity

All the latest

All the latest

4208 Posts
Security leaders need to focus on core discipline, embracing AI, and consolidating to critical tools.

SPONSORED - In 2016, just 5,579 cybersecurity vulnerabilities (CVEs) were reported in software. By 2021 it took just 12 weeks to hit the 5,000 mark. This rampant growth in software vulnerabilities – many of which are now abused at scale and at blistering pace by an increasingly well-resourced and

Patent punch pushes Intel down, as net income tumbles 41%, data centre chip sales fall 20%

CEO blames "cloud inventory digestion" and a patent loss.

Satellite data that tracks how much water plants use. A man named “Pythagoras”. A small Greek tech startup. And the United Nations.

Using geospatial data and advanced modelling to tackle land degradation

There are "several unpatched and exploitable" vulns in Exim -- known since October 2020.

Reported in October 2020, fix pending (thanks to the reporting company Qualys...)

Critical new 0day in Pulse Secure VPN exploited by Chinese APT to hit gov't, finance, and defense targets in the US, EU.

Critical RCE under active attack.

S&P Global adds 25 new datasets, unveils interactive "Workbench", new machine learning tools from Kensho

Machine readable earnings transcripts, judicial filings, patents...

IBM returns to growth on cloud boom, buoyant mainframe sales.

Big Blue's new leaders are making good progress...

Blue chip customers' code targeted, after widely used software tool modified by hackers in supply chain attack

Attacker stole data stored in users' continuous integration (CI) environments.

So... you start work at 10:45am? New ONS figures capture remote working shifts.

More recruiters "specifying remote-first roles that are location agnostic"

Browse by Tags

Search the site

Your link has expired. Please request a new one.
Your link has expired. Please request a new one.
Your link has expired. Please request a new one.
Great! You've successfully signed up.
Great! You've successfully signed up.
Welcome back! You've successfully signed in.
Success! You now have access to additional content.