Investigating multi-vector attacks in Log Explorer
Log Explorer customers can now identify and investigate multi-vector attacks. Log Explorer supports 14 additional Cloudflare datasets, enabling users to have...
20 articles
Log Explorer customers can now identify and investigate multi-vector attacks. Log Explorer supports 14 additional Cloudflare datasets, enabling users to have...
Cloudflare's new Security Overview dashboard transforms overwhelming security data into prioritized, actionable insights, empowering defenders with contextua...
Dutch intelligence reveals Russian state hackers are trying to hijack the Signal and WhatsApp accounts of key targets
Unit 42 research reveals AI judges are vulnerable to stealthy prompt injection. Benign formatting symbols can bypass security controls.
Cloudflare will be integrating Mastercard’s RiskRecon attack surface intelligence capabilities to help you eliminate Internet-facing blind spots while contin...
Palo Alto Networks launches Prisma AIRS in Singapore. Get AI-native threat protection, data residency and cyber resilience.
US national cyber strategy focuses on stronger defenses, countering threats, fostering innovation
New UK Online Crime Centre will combine expertise from a range of sources to takedown online channels cyber-scammers rely on
Today we’re disclosing request smuggling vulnerabilities when our open source Pingora service is deployed as an ingress proxy and how we’ve fixed them in Pin...
Over one in five winners of IT-Harvest’s 2026 Cyber 150 are AI security companies
Derrick Van Yeboah admitted he stole over $10m in romance scams as part of crime gang
Discover how Cloudflare partners TachTech and Adapture are shattering the 18-month migration myth, deploying agile SASE for global enterprises in weeks by tr...
Palo Alto Networks applauds the new National Cyber Strategy. We detail our support for key aspects of its six pillars, to include AI security and quantum rea...
Cloudflare One unifies data security from endpoint to prompt: RDP clipboard controls, operation-mapped logs, on-device DLP, and Microsoft 365 Copilot scannin...
Almost a quarter of the zero days detected by Google in 2025 targeted security and networking appliances
In-depth analysis of threat activity we call CL-UNK-1068. We discuss their toolset, including tunneling, reconnaissance and credential theft.
The ability to continue operating safely in an unsafe environment where competitors cannot is a competitive advantage that is rarely measured or discussed
We’re excited to announce that Amazon Web Services (AWS) has completed the annual Dubai Electronic Security Centre (DESC) certification audit to operate as a...
Malicious insiders are using misusing AI for nefarious gain, while employees cutting corners also creates risk, warns Mimecast
Critical flaw "ContextCrush" in Context7 MCP Server could allow malicious instructions into AI tools