<![CDATA[The Stack]]>https://www.thestack.technology/https://www.thestack.technology/favicon.pngThe Stackhttps://www.thestack.technology/Ghost 6.22Thu, 19 Mar 2026 12:02:38 GMT60<![CDATA[Checkout.com CPO on what’s next for the payments company that processed $300bn last year]]>https://www.thestack.technology/checkout-com-cpo-meron-colbeci/69bbda1f4849e40001687e22Thu, 19 Mar 2026 12:02:30 GMTFintech Checkout.com is entering a new era after spending over a decade laser focused on enterprise customers and payment performance, a vision that saw it process over $300 billion in e-commerce volume in 2025.

The London-based payment service provider, or PSP, now handles transactions for Uber, eBay, and Spotify and has a full year of profitability under its belt, after years of growth-focused spending.

"Staying focused on the core customer and our core offering, for us, for the last few years, it's been enterprise and performance,” Chief Product Officer Meron Colbeci tells The Stack.

The Stack sat down with Colbeci in London.

"Building a core business that is sustainable and good enables you to make a number of educated bets," the CPO adds. 

Colbeci outlined three areas the PSP was carefully moving into: agentic commerce, stablecoin settlement, and direct acquiring in the United States via a new banking charter.

"We have an internal process on how we make these bets judiciously, but also not do too many of them." Colbeci is confident Checkout.com’s reputation for being performance-obsessed will carry it through this new era, no matter where the chips fall. 

Agent, add to basket

The payments industry has spent the past year talking about "agentic commerce,” the idea that AI systems will eventually discover products, compare prices, and complete purchases on behalf of consumers. Colbeci is cautious about the hype.

"The honest answer is we don't know yet. It's very early days for agentic commerce," he says. "It's very much top of mind for a lot of retailers, for a lot of payment companies that want to be prepared for this world.”

The uncertainty hasn't stopped Checkout.com from positioning itself. The broader strategy seems to be avoiding picking winners too early: “Our approach at Checkout.com is to work with as many partners across the ecosystem.”

Colbeci says whether that’s Google, OpenAI, Microsoft, or card networks like Mastercard and Visa, the PSP would help its customers “understand the nature of this fast-moving sector, and how we facilitate payments in this new world.”

That hedge makes sense. Google launched its Agent Payments Protocol in September 2025. PayPal followed with its own agentic commerce services in October. Visa and Mastercard are running pilots, with commercial deployment expected as early as Q1 2026. The infrastructure is still fragmented and enterprises are navigating the new industry together. 

The right time for stablecoin

When Checkout.com first started offering stablecoin settlement to merchants in 2022, the regulatory environment was “pretty tricky," Colbeci says, "but that environment has changed."

The latest pitch is straightforward: traditional card network settlement runs on banking hours, meaning funds processed on Friday often don't arrive until Monday. Stablecoins settle around the clock.

"The ability to get settled 24/7 and not be dependent on banking hours, as well as the immediacy and the speed that stablecoins get settled, is attractive to some customers that are very liquidity sensitive," Colbeci said.

Two regulatory shifts have reopened the window. In Europe, the Markets in Crypto-Assets (MiCA) regulation came into full effect in late 2024. In the U.S., the current administration has signalled a more permissive approach to digital assets.

Checkout.com recently announced its acquisition of a Lithuanian payment service that can issue euro-backed stablecoins under the MiCA regulations in January. 

U.S. horizons

Checkout.com's third priority in 2026 is regulatory rather than technological. The company has obtained a Merchant Acquirer Limited Purpose Bank (MALPB) charter from the state of Georgia, a licence that lets it connect directly to Visa and Mastercard in the US without relying on a sponsoring bank.

"The classic model for an acquirer in the U.S. is to go through a BIN sponsor," Colbeci explained. "You have to partner with a bank and the bank has oversight around your onboarding policy and could affect pricing, and you're essentially borrowing their licence."

The MALPB charter changes that. "It gives you the opportunity to do that without a BIN sponsor, which is much more akin to the European model," Colbeci says. The new license gives them much more control over the experience, payment performance, pricing and customer onboarding. 

Georgia created the MALPB charter in 2012, but it sat unused for over a decade, card networks historically refused to grant direct membership to non-banks. That changed recently. Fiserv became the first company to process transactions under a MALPB charter in April 2025. Stripe's application was approved later that year.

For Checkout.com, the licence aligns its U.S. operations with how it already operates in Europe. The practical benefits for merchants: potentially improved authorisation rates, greater pricing transparency, and the ability to onboard customers that BIN sponsors might have rejected.

"The U.S. is our fastest growing market," Colbeci said. "But it's also one where we probably have the biggest opportunity." 

The discipline behind the roadmap

Colbeci returned repeatedly to the idea that these bets extend from Checkout.com’s core business, not distract from it.

"We want to continue to grow. We want to continue to evolve," he said. "We want to focus on what we do well and how we expand there. We're not so much worried about the competition. We'll deal with that when we need to."

Whether it’s agentic commerce, stablecoins, and direct U.S. acquiring, success will depend on factors largely outside Checkout.com's control: consumer behaviour, regulatory shifts, the decisions of card networks and AI labs. What the company can control is how much it wagers.

"In 2026, we're starting to expand out while we're continuing to strengthen our offering," Colbeci says, "whilst making a few bets." A few. Not many.

Delivered in partnership with Checkout.com.

]]>
<![CDATA[EU sanctions and CISA warnings: Iran's cyber attacks are evolving]]>https://www.thestack.technology/iran-cyber-attacks-eu-sanctions-cisa-warnings/69bab3734849e40001687c1fThu, 19 Mar 2026 11:12:01 GMT<![CDATA[Subscription pricing is 'foolish', says SAP CEO]]>https://www.thestack.technology/subscription-pricing-is-foolish-says-sap-ceo/69bbcb474849e40001687d8dThu, 19 Mar 2026 10:44:11 GMT<![CDATA[Cisco Firewall 0day exploited in ransomware attacks]]>https://www.thestack.technology/cisco-firewall-0day-exploited-in-ransomware-attacks-i/69baff8a4849e40001687d03Wed, 18 Mar 2026 21:55:03 GMT

A critical CVSS 10 Cisco firewall vulnerability is being exploited in the wild by a ransomware gang –  attacks started over a month before a March 4 patch.

AWS’s threat intelligence team gained access to a “misconfigured” server that contained the "operational toolkit" of the ransomware group, Interlock.

They found that the group had started exploiting the critical vulnerability in Cisco Secure Firewall Management Center (FMC) Software as a zero day in January – 36 days before Cisco disclosed the bug, CVE-2026-20131.

Cisco patched the critical CVSS 10 Cisco FMC vulnerability on March 4.

It updated its advisory today (March 18) to confirm what it described as “attempted exploitation.” AWS was more explicit: “Our research found that Interlock was exploiting this vulnerability [from] January 26, 2026…”

The Cisco FMC vulnerability lets any unauthenticated, remote attacker execute arbitrary Java code as root on affected devices, the vendor said. It blamed “insecure deserialization of a user-supplied Java byte stream.”

As The Stack published, it had not been added to CISA’s KEV - but would represent the 13th Cisco vulnerability exploited in the wild since the start of 2025 and the 87th bug in the agency’s “known exploited” catalogue. 

(A leading financial services sector CISO described network appliance security as a “travesty” this week, telling The Stack that of all the critical incidents their team responded to last year, over half were in systems “meant to protect us”. They have spun up their own dedicated bug-hunting team focused on such appliances in a bid to get ahead of such vulns.) 

The Stack keeps its cybersecurity reporting free for public interest purposes. Subscribing allows us to keep doing so and also gives you access to all of our premium analysis.

Subscribe here

CVE-2026-20131 affects Cisco Secure FMC Software and Cisco Security Cloud Control (SCC) Firewall Management, regardless of configuration.

AWS said its threat intelligence team found a poorly secured infrastructure server belonging to the ransomware group that was used for distributing “Interlock’s entire operational toolkit” – gleaning some critical intelligence.

Among the group’s tools AWS’s threat intel team found was a “PowerShell script designed for systematic Windows environment enumeration… 

This pulls details on “storage configuration, Hyper-V virtual machine inventory, user file listings across Desktop, Documents, and Downloads directories, browser artifacts from Chrome, Edge, Firefox, Internet Explorer, and 360 browser (including history, bookmarks, stored credentials, and extensions), active network connections… ARP tables, iSCSI session data, and RDP authentication events from Windows event logs,” AWS said.

Interlock was also using ConnectWise ScreenConnect, a commercial remote desktop tool; Volatility, an open-source memory forensics framework; and Certify, an open source offensive security tool designed to exploit misconfigurations in Active Directory Certificate Services (AD CS).

The ransomware group also had a log erasure routine running as a cron job every five minutes, AWS said: “The routine truncates all *.log files under /var/log and suppresses shell history by unsetting the HISTFILE variable. 

“This aggressive evidence destruction, wiping logs every five minutes, combined with the purpose-built HTTP forwarding proxy, indicates the script establishes disposable traffic-laundering relay nodes. These nodes obscure exploit traffic origin, relay [C2] communications, or proxy data exfiltration, making it nearly impossible to trace attacks back to their source,” AWS said.

  • AWS has IOCs here.
  • Cisco has a tool to determine potential exposure here
Cisco Firewall 0day exploited in ransomware attacks
]]>
<![CDATA[AMD keeping Samsung close amid memory shortage]]>https://www.thestack.technology/amd-samsung-close-amid-memory-shortage/69bac3954849e40001687c89Wed, 18 Mar 2026 16:52:51 GMT<![CDATA[Chainguard eyes CI/CD security with hardened Github Actions, looks to ISV images too.]]>https://www.thestack.technology/chainguard-eyes-ci-cd-security-with-hardened-github-actions-looks-to-isv-images-too/69baad814849e40001687bd9Wed, 18 Mar 2026 14:07:04 GMT

Chainguard’s pushed so far “left” in software security that plenty of platform engineers and security professionals still don’t understand the category yet*; there’s no Magic Quadrant to help them, either, although rumour abounds that one (for software supply chain security) is on its way.

That hasn’t stopped the company – all ~600 staff, ~480 customers, and lots of purpose-built-for-security software packages– having outsized ambitions. The hefty £892 million it has raised from a who’s who of software investors suggests they certainly see the gameplan and market opportunity. 

Those ambitions were on show at its second “Assemble” conference in New York this week, where the company touted multiple major new features, explained its new approach to providing a pipeline of secure software at scale (via its open-source DriftlessAF event-driven reconciliation infrastructure) and brought customers from OpenAI and KKR onstage. 

The announcements show Chainguard bullishly moving from not just hardening open-source container images and OSS libraries, but also to CI/CD workflows and even proprietary software, as it looks to cement a position as a trusted, managed supply chain partner for open-source consumers (which, let’s be honest, is pretty much everyone who is building…) 

What’s Chainguard again? A recap

Chainguard provides hardened, minimal container and VM images, secure open-source software libraries and a stripped back Linux distro built from source for security too. The idea, at its heart, is simple: Help customers create software and products with very secure, “zero CVE” building blocks.

(Dang, that sounds like lock-in to dependency on a proprietary if useful ecosystem, you say? CEO Dan Lorenc summed his response to this often-heard criticism in a January 2026 blog: “I don’t believe it’s possible to provide hardened containers with real software choice without from-source builds and your own distro. People call that ‘lock-in,’ but there’s no other honest way to do it. And besides, you’re already locked in if you’re using hardened images built from opaque binaries, abandoned images, and ad-hoc pipelines no one can reproduce…” (Disagree? Postcards welcome.)

Chainguard eyes CI/CD security with hardened Github Actions, looks to ISV images too.

Chainguard currently provides 400,000+ architecture-specific image versions, ranging from the likes of Pytorch, to an Apache Airflow Helm chart, its own distribution of the AWS Load Balancer Controller Helm chart, “pre-configured with hardened Chainguard Images…” and a lot more.

Anyhow, we’re burying the lede…

“AI is changing everything except the importance of CI/CD”

Despite all the changes that agentic coding tools have delivered, some things haven’t changed: the risk of ingesting insecure upstream OSS software packages into your software; the challenge of actually migrating from legacy codebases to more secure ones; the risk of third-party vendors’ janky, insecure code adding to your attack surface; and, increasingly, the risk that comes with using CI/CD workflows from a community marketplace…

Chainguard’s looking to tackle these risks with a swathe of new features.

Some of these push it a little right, Among those announced at the Assemble Summit, for example, were “Chainguard Actions” – a “securely rebuilt catalog of GitHub Actions and similar CI/CD workflows”; “Chainguard Commercial Builds” – a way for “commercial vendors to package and maintain their software” to an SLSA Level 3 standard “with zero CVEs... SBOMs, signatures, FIPS validation, and behavioral consistency”; and its “Guardener” agent – to help organisations migrate “legacy” container images to Chainguard-validated, secure ones. 

Its “Actions” release stood out to The Stack. Chainguard describes it as a “securely rebuilt catalog of GitHub Actions and similar CI/CD workflows.” 

(GitHub Actions is a platform built directly into GitHub that lets you execute custom, automated software development workflows in your repo. And like so much of the upstream software development landscape, it’s a bit of a Wild West; its marketplace, for example – a massive central hub where developers and companies share pre-built Actions – is easy to spam with potentially malicious actions that developers may be tempted to use.)

Chainguard says it has run security analysis on 20,000 GitHub Actions published in the community marketplace, has applied hardening to avoid the likes of “script injection vulnerabilities, insecure environment variable handling, or unsafe command interpolation” and published an auditable record of the changes it has made to each action; ultimately publishing the “Action” as a “verified artifact” that can be securely used…) 

Per its product team: “Modern development workflows rely heavily on reusable CI/CD automation. Actions handle dependency installation, artifact publishing, container builds, and deployment orchestration. They are pulled directly from public repositories and executed with elevated privileges in CI environments… CI/CD workflows have historically lacked meaningful security and compliance controls. Workflows can contain unsafe shell expressions, token exposure risks, or insecure input handling that create pathways to repository compromise or infrastructure access.”

Pushing its secure “software factory” approach into CI/CD as well as container images is statement of intent. It's arguably notable, too, that GitHub hasn't natively done more here.

How much more might Chainguard push into GitHub's space, we ask?

"Are you asking, we're going to compete with GitHub?" queries Lorenc.

"I don't know. We use GitHub. GitHub is kind of where all source code lives. There's a lot of tools around GitHub, though, right? It's not just a source code manager. And if you were to look at their suite of features, they have hundreds of things,and I think parts of those we will have to do: the way code gets reviewed, the way code gets tested, the way it gets built... but hundreds of other vendors offer those too."

Also notable in its new product releases was a “Commercial Builds” proposition where Chainguard works with partners to harden their proprietary software too: Elastic, Grafana, and GitLab are among the early adopters.

The proposition allows commercial vendors to meet the same SLSA Level 3 standards as OSS consumed via Chainguard and hands some of the heavy lifting like upstream patching, SBOM generation, and FIPS compliance to Chainguard - customers meanwhile get the confidence that they don’t have to make security exceptions for software from ISVs because they now (also) come with a zero-CVE guarantee and a verifiable audit trail…

It’s a statement of real ambition. As Chainguard CEO Dan Lorenc puts it to The Stack though, it's not different from what the company already does in many ways.

“Customers are saying, ‘why can't you fix this one?’ [container image etc.] And well, ‘the license says we can't! So let's go talk to that person and figure out how the two of us can work together to satisfy a mutual customer.’ It's a couple more hops, but at the end of the day, makes our catalogue better and more valuable for everyone…”

There’s a lot of trust involved there, The Stack ventures…

“We show them how we do it. We show them how they can check what we're doing,” Lorenc says.

There have been a few things to iron out, he admits, e.g. “sometimes when they know about a vulnerability before we do” (e.g. that was disclosed to the ISV privately but which Chainguard needs to help fix to get a secure container image into its catalogue) “but at the end of the day,” he says, “they're confident in the infrastructure we built and using that as a way to get their product to their customers…”

*How can we say this? We asked a bunch of (OK, three) fairly switched on principal engineers at big Real World CompaniesTM if they had heard of Chainguard and b) knew what it did. “No” and “no” was the answer, although one drew a vague but convincingly authoritative comparison with Snyk - which really doesn’t play in same place, ultimately.  

]]>
<![CDATA[7 tech companies worth trillions pledge $12.5m to open source security]]>https://www.thestack.technology/major-tech-companies-grants-open-source-security/69ba82c74849e40001687abeWed, 18 Mar 2026 13:17:19 GMT<![CDATA[UK's new supercomputer is coming 13 months too late, NAO report]]>https://www.thestack.technology/uk-new-national-supercomputer-too-late/69ba8a684849e40001687b09Wed, 18 Mar 2026 13:14:48 GMT<![CDATA[Jensen Huang compares OpenClaw to Linux, and other nuggets from the 2-hour-long NVIDIA GTC keynote]]>https://www.thestack.technology/nvidia-gtc-keynote-takeaways-nemoclaw/69b95b134849e400016879c9Tue, 17 Mar 2026 15:50:30 GMT

NVIDIA CEO Jensen Huang took the stage at the company’s developer conference on Monday to talk up new CPUs, agentic software, and the future of AI economics. 

There were announcements on the new Vera CPU and BlueField-4 STX Storage, as part of the Vera Rubin platform for agentic workflows, and Huang said demand for GPUs will push the company’s revenue to $1 trillion in 2027. 

NVIDIA came through with the predicted NemoClaw release. Huang said OpenClaw “exceeded what Linux did in 30 years. It is that important.” He told the audience every company needs an OpenClaw strategy and touted NVIDIA's new privacy and security wrapper for running “claws,” autonomous agents built using OpenClaw. 

Other than the shiny new launches, there were larger themes in Huang’s speech illustrating NVIDIA's current strategy as a vendor that buyers responsible for AI budgets may want to take note of. 

]]>
<![CDATA[4 KVM vendors, 9 vulns – including an unfixed CVSS 9.8]]>https://www.thestack.technology/kvm-vulns-everywhere-unpatched/69b958834849e400016879b2Tue, 17 Mar 2026 15:11:15 GMT

Consumer-grade IP KVM (Keyboard, Video, Mouse) devices that are increasingly popular are a security nightmare, researchers from Eclypsium said on Tuesday.

Reynaldo Vasquez Garcia and Paul Asadoorian reported finding a total of nine vulnerabilities across devices from four different vendors. One rates as a CVSS 9.8, another comes in at 8.8, and neither has been fixed.

The vendor Angeet/Yeeso, responsible for those flaws, had not committed to fixing them at the time of public disclosure.

The price of cheap 

Rack-mounted, multi-port, and quite expensive KVM-over-IP has been around for years, offering the next best thing to actually sitting in front of a machine for purposes up to and including messing with BIOS settings.

Single-port KVMs are a newer phenomenon, with prices as low as $30, appealing to "homelabbers, small IT shops, MSPs," said the researchers, as well as increasingly "enterprises seeking per-machine out-of-band access."

Per-machine KVMs are sometimes used for branch offices or edge computing to run dedicated VMs for local services without central orchestration, offering isolation and flexibility on modest hardware.

Under the hood these KVMs have several hallmarks of terrible security engineering, said Eclypsium: "missing firmware signature validation, no brute-force protection, broken access controls, and exposed debug interfaces."

]]>
<![CDATA[Alibaba just launched an enterprise agent platform, and a whole token business around it]]>https://www.thestack.technology/alibaba-launches-enterprise-agent-platform/69b9364a4849e4000168792bTue, 17 Mar 2026 12:12:53 GMT<![CDATA[Hackers turned a compromised npm package into full AWS admin access in 72 hours]]>https://www.thestack.technology/npm-supply-chain-aws-admin-access/69b403b7925ffa0001a7578cTue, 17 Mar 2026 10:29:25 GMT<![CDATA[Fujitsu hasn't put any money aside for Horizon compensation, taxpayers fund £1.44 billion bill]]>https://www.thestack.technology/fujitsu-not-paid-horizon-compensation-taxpayer-funded/69b7ef834849e40001687690Tue, 17 Mar 2026 08:29:30 GMT<![CDATA[Google gives Europe $30m to help offset AI-related job losses]]>https://www.thestack.technology/google-gives-europe-30m-to-help-offset-ai-related-job-losses/69b7ea3d4849e40001687671Mon, 16 Mar 2026 14:43:33 GMT

Google is offering $30 million to help Europeans master AI to offset future AI-driven job losses, while calling for more permissive AI regulation.

At the Future of Work Forum in Latvia, Google execs announced a new project and corresponding funding to help Europeans meet the AI era.

Google's VP for government affairs and public policy in Europe also said there needs to be more clarity on how businesses can use AI for innovation.

In 2024, Google announced a project by an almost identical name in the US with an initial funding pledge of $75 million.

]]>
<![CDATA[Exclusive: Nomura appoints Tokyo-based CIO as Patrick Eltridge leaves]]>https://www.thestack.technology/nomura-cio-patrick-eltridge-leaves/69b7f7084849e400016876c9Mon, 16 Mar 2026 13:04:46 GMT

Japan's largest investment bank will have a new group CIO in April, it told The Stack on Monday, with Akio Hori appointed to the role.

Patrick Eltridge will be leaving the company on March 31, it said simultaneously.

Eltridge is among the five members of Nomura's 84-member executive team currently listed as being based in London. Another handful of its leaders are based in New York or Singapore.

]]>