Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

New Malware Kit Promises Guaranteed Publication in the Chrome Web Store

A new malware-as-a-service (MaaS) kit called “Stanley” is offering users guaranteed publication in the Chrome Web Store, bypassing Google’s security verification process, according to researchers at Varonis. “For $2,000 to $6,000, Stanley provides a turnkey website-spoofing operation disguised as a Chrome extension, with its premium tier promising guaranteed publication on the Chrome Web Store,” Varonis says.

Agentic SOC in Practice Where Human Analysts Still Matter Most

Security operations centers (SOCs) are changing rapidly. Automation is playing a key role in how SOCs make decisions and proceed with investigations. This change has raised an important question: ‘If systems start acting on their own, why would human analysts be used?’ Agentic SOC is not going to remove people from security operations. It is about changing the way work is done and where analysts can apply their judgment.

Jupyter Notebook for Protegrity AI Developer Edition

Want to test Protegrity’s data protection features without any local installation? In this tutorial, Dan Johnson shows you how to make your first protect and unprotect API calls directly in your browser using our interactive Jupyter Notebook (Binder). This is the fastest way to see Protegrity’s Python SDK in action—authenticating, applying protection policies, and maintaining data utility in real-time.

LLM Application for Protegrity AI Developer Edition

Securing LLM Workflows with Protegrity AI Developer Edition Learn how to protect sensitive data and prevent malicious prompt injections in your AI applications. In this technical walkthrough, Dan Johnson, Software Engineer at Protegrity, demonstrates a dual-gate security architecture designed to safeguard Large Language Models. Discover how to implement a security gateway that sits between your users and your LLM. This demonstration covers the integration of semantic guardrails and classification APIs to ensure data privacy and system integrity.

CVE-2025-11953 - Metro4Shell RCE in React Native Metro Server

A critical unauthenticated remote code execution (RCE) vulnerability has been identified in the React Native Metro development server, with nearly 3,500 exposed instances currently reachable on the public internet. Tracked as CVE-2025-11953, also known as Metro4Shell, this flaw affects the Metro server used during React Native application build and testing workflows.

Inside the Threat Landscape: Biannual Cybersecurity Briefing Webinar

Staying ahead of cyber threats has never been more critical, and WatchGuard is here to help you do just that. Join cybersecurity experts Corey Nachreiner (CSO) and Marc Laliberte (Director of Security Operations) on February 19, 2026 for the Inside the Threat Landscape: Biannual Cybersecurity Briefing, a must-attend, live webinar designed to equip you with the latest threat insights and defensive strategies straight from the WatchGuard Threat Lab.

14 ways to lose Azure DevOps data

Table of contents: hide Azure Devops is a popular CI/CD platform utilized by software development teams. The core use includes source code hosting, CI/CD, project management, test managements and dependency management. Given the extensive capabilities of Azure DevOps, the attack vector for cyber criminals is also bigger – putting more pressure on securing sensitive data. With the growth of sophisticated cyber attacks – cyber security must also be re-evaluated and properly addressed.

APC Battery Recycling: A Complete Guide to Responsible UPS Battery Disposal

APC battery recycling is the most responsible and environmentally sound way to manage used or expired UPS batteries from APC systems. As uninterruptible power supplies become essential in homes, offices, and data centers, APC battery recycling has moved from being a niche concern to a critical sustainability practice. Proper APC battery recycling protects the environment, ensures regulatory compliance, and helps businesses and individuals avoid unnecessary risks associated with improper battery disposal.

Why Cybersecurity is the Core of Corporate Survival

Is your business ready for a digital ambush? It's a loaded question, sure. But not a hypothetical one. In today's landscape, it's practically rhetorical. One phishing scam, one rogue USB stick, one "I'll-just-connect-to-this-coffee-shop-Wi-Fi-for-a-minute" moment and everything can unravel. You'd think big companies would be immune with all their resources, right? Tell that to MGM Resorts, which hemorrhaged over $100 million in 2023 due to a single compromised login. A phone call. That's all it took.