Content Paint

The Stack

Interviews, insight, intelligence, and exclusive events for digital leaders.

Axios  | Apr 13, 2026
/
Axios has a CVSS 10 bug, risks "full cloud compromise"
 |  startups  | Apr 13, 2026
/
STACKUP: The Stack's weekly tech startups and funding wrap
 |  vulnerabilities  | Apr 13, 2026
/
Adobe confirms exploitation: Malware uses undocumented API
 |  France  | Apr 10, 2026
/
France to swap Windows for Linux across government as it ramps up sovereignty drive
 |  data sovereignty  | Apr 09, 2026
/
France's OVH answers Europe's sovereignty call with dedicated defence unit
 |  AI  | Apr 09, 2026
/
GitHub admits it needs "deep architectural work" as outages persist

All the latest

All the latest

4170 Posts
Axios has a CVSS 10 bug, risks "full cloud compromise"

"If an attacker can pollute Object.prototype via any other library in the stack (e.g., qs, minimist, ini, body-parser), Axios will automatically..."

UK police spend £25m on legacy comms network waiting for new Emergency Network Service

£25 million for six months after a four-year-long £50 million contract.

STACKUP: The Stack's weekly tech startups and funding wrap

This week's rounds and milestones.

Command Line: Mythos burnout and the boardroom

"Architectural segmentation becomes the primary control limiting blast radius"

Why IBM and Arm are partnering up on AI for mainframes

'The same features and qualities that distinguish IBM Z and LinuxONE will be available to aarch64 workloads.'

Adobe confirms exploitation: Malware uses undocumented API

Adobe has confirmed active exploitation of a critical vulnerability affecting Acrobat and Reader. The bug has been allocated CVE-2026-34621.

France to swap Windows for Linux across government as it ramps up sovereignty drive

“C'est l'année de Linux dans la desktop!”

Inside the freshly vendor-neutral payments protocol putting the 402 status code to use

The Linux Foundation will take over a new payment protocol that facilitates transactions at the HTTP layer.

Adobe Reader 0day abused in wild to deliver three-stage exploit chain

Step1: An improper input sanitisation in "ANFancyAlertImpl"

Browse by Tags

Search the site

Your link has expired. Please request a new one.
Your link has expired. Please request a new one.
Your link has expired. Please request a new one.
Great! You've successfully signed up.
Great! You've successfully signed up.
Welcome back! You've successfully signed in.
Success! You now have access to additional content.