Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

When Screenshots, Clipboard Activity, & File Uploads Become Security Incidents: Lessons from a Recent Insider Threat Case

A leading cybersecurity vendor recently terminated an employee who took internal screenshots and shared them with threat actors, who then attempted to pass off the leaked material as evidence of a system breach. While no customer data was compromised and production systems remained secure, the incident exposed a blind spot that should concern every CISO: authorized users with legitimate access becoming your biggest vulnerability.

AI Browsers: A Security Nightmare Flipping the Board on Decades of Security Progress

Modern browsers are among the most hardened mass consumer applications that we have access to. Decades of work have produced strict isolation between sites, safer defaults for cookies, strong TLS enforcement, controlled permissions, and a user experience that steers people away from phishing and fraud. The result is a trustworthy gatekeeper that keeps untrusted sites and attacker payloads confined to their own sandboxes.

CVE-2025-54057: Stored XSS Vulnerability in Apache SkyWalking Exposes Monitoring Dashboards to Attackers

Apache SkyWalking is one of the most widely adopted open-source Application Performance Monitoring (APM) and observability platforms, trusted by developers and DevOps teams to visualize telemetry, trace distributed systems, and ensure application uptime. However, a recently disclosed vulnerability has revealed that the very dashboards designed to improve visibility could be turned into attack vectors.

Synology x Acronis Partner to Deliver True Image with BeeDrive and BeeStation NAS

Synology and Acronis announced a joint collaboration to enhance customer data security. All Synology BeeDrive, BeeStation, and BeeStation Plus product lines now include a three-year license to Acronis True Image Essentials for one computer. This partnership enables users to perform full-system computer backups while maintaining complete ownership and control of their data through local storage.

Top OS migration software: Efficiently transfer your operating system

When you decide to migrate your system, the goal is to move everything, including your operating system, applications, data and even personal settings, to a new storage device while preserving how things looked, worked and felt before. With the right migration software, you can easily do that and move from an older HDD to a faster new SSD, a larger HDD or a new computer with minimal effort and without spending countless hours manually rebuilding everything from scratch.

Best Patch Management Software & Tools 2026

In our hyperconnected landscape, software vulnerabilities are proliferating at a record pace. In 2024 alone, more than 40,000 Common Vulnerabilities and Exposures (CVEs) were published, marking a 38% increase over the previous year. Many of these vulnerabilities are weaponized within days, leaving organizations exposed if updates are not applied immediately. Patch management software addresses this risk by automating the detection, acquisition, and deployment of software updates across an IT environment.

AI Meets Kubernetes Security: Tigera CEO Reveals What Comes Next for Platform Teams

Platform teams are tasked with keeping clusters secure and observable while navigating a skills gap. At KubeCon + CloudNativeCon North America, The New Stack spoke with Ratan Tipirneni, President and CEO of Tigera, about the future of Kubernetes security, AI-driven operations, and emerging trends in enterprise networking. The highlights from that discussion are summarized below.

Cato CTRL Threat Research: From Productivity Boost to Ransomware Nightmare - Weaponizing Claude Skills with MedusaLocker

Claude Skills is a new feature from Anthropic that has gained rapid adoption, with more than 17,000+ GitHub stars already since its launch in October 2025, allowing users to create and share custom code modules that expand Claude’s capabilities and streamline workflows. But as this ecosystem grows, Cato CTRL uncovered a serious oversight into how Skills are executed.

Mastering ASPM: Unifying Your Application Security Strategy

Application security is becoming increasingly fragmented. Development and security teams use a wide array of tools for testing, protection, and supply chain security. While each tool serves a purpose, they often operate in silos. This fragmentation creates a disconnected view of an organization’s security posture, making it difficult to prioritize and remediate risk effectively.