Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Mobile Payment Security in PCI DSS 4.0.1: In-App Purchase Protection vs Web Checkout

Nearly 70% of online purchases now happen on mobile, yet PCI scoping decisions are still often made as if mobile is just a smaller browser. It is not. A native in-app payment flow and a mobile web checkout trigger materially different obligations under PCI DSS 4.0.1. In one case, risk concentrates inside the application runtime through SDKs, platform storage, and release controls.

Clawing For Scraps: Risks of OpenClaw AKA ClawdBot

The world of AI is still advancing rapidly, but so are the threats. Wherever you get your news, Clawdbot, or is it Moltbot, or is it now called OpenClaw(?) is everywhere lately. You can’t avoid talk of this AI personal assistant. It’s actually now called OpenClaw after some naming drama, and at the time of writing has 166k followers on GitHub. The repository also has an alarming number of forks, issues, and pull requests.

New Malware Kit Promises Guaranteed Publication in the Chrome Web Store

A new malware-as-a-service (MaaS) kit called “Stanley” is offering users guaranteed publication in the Chrome Web Store, bypassing Google’s security verification process, according to researchers at Varonis. “For $2,000 to $6,000, Stanley provides a turnkey website-spoofing operation disguised as a Chrome extension, with its premium tier promising guaranteed publication on the Chrome Web Store,” Varonis says.

Agentic SOC in Practice Where Human Analysts Still Matter Most

Security operations centers (SOCs) are changing rapidly. Automation is playing a key role in how SOCs make decisions and proceed with investigations. This change has raised an important question: ‘If systems start acting on their own, why would human analysts be used?’ Agentic SOC is not going to remove people from security operations. It is about changing the way work is done and where analysts can apply their judgment.

Jupyter Notebook for Protegrity AI Developer Edition

Want to test Protegrity’s data protection features without any local installation? In this tutorial, Dan Johnson shows you how to make your first protect and unprotect API calls directly in your browser using our interactive Jupyter Notebook (Binder). This is the fastest way to see Protegrity’s Python SDK in action—authenticating, applying protection policies, and maintaining data utility in real-time.

LLM Application for Protegrity AI Developer Edition

Securing LLM Workflows with Protegrity AI Developer Edition Learn how to protect sensitive data and prevent malicious prompt injections in your AI applications. In this technical walkthrough, Dan Johnson, Software Engineer at Protegrity, demonstrates a dual-gate security architecture designed to safeguard Large Language Models. Discover how to implement a security gateway that sits between your users and your LLM. This demonstration covers the integration of semantic guardrails and classification APIs to ensure data privacy and system integrity.

CVE-2025-11953 - Metro4Shell RCE in React Native Metro Server

A critical unauthenticated remote code execution (RCE) vulnerability has been identified in the React Native Metro development server, with nearly 3,500 exposed instances currently reachable on the public internet. Tracked as CVE-2025-11953, also known as Metro4Shell, this flaw affects the Metro server used during React Native application build and testing workflows.

Inside the Threat Landscape: Biannual Cybersecurity Briefing Webinar

Staying ahead of cyber threats has never been more critical, and WatchGuard is here to help you do just that. Join cybersecurity experts Corey Nachreiner (CSO) and Marc Laliberte (Director of Security Operations) on February 19, 2026 for the Inside the Threat Landscape: Biannual Cybersecurity Briefing, a must-attend, live webinar designed to equip you with the latest threat insights and defensive strategies straight from the WatchGuard Threat Lab.

14 ways to lose Azure DevOps data

Table of contents: hide Azure Devops is a popular CI/CD platform utilized by software development teams. The core use includes source code hosting, CI/CD, project management, test managements and dependency management. Given the extensive capabilities of Azure DevOps, the attack vector for cyber criminals is also bigger – putting more pressure on securing sensitive data. With the growth of sophisticated cyber attacks – cyber security must also be re-evaluated and properly addressed.