Why it’s time for phishing prevention to move beyond email
While phishing has evolved, email security hasn’t kept up. Attackers now bypass MFA & detection tools with advanced phishing kits, […]
While phishing has evolved, email security hasn’t kept up. Attackers now bypass MFA & detection tools with advanced phishing kits, […]
The recently leaked trove of internal chat logs among members of the Black Basta ransomware operation has revealed possible connections
Today, we’re excited to announce AI Labyrinth, a new mitigation approach that uses AI-generated content to slow down, confuse, and
Imagine building an LLM-powered assistant trained on your developer documentation and some internal guides to quickly help customers, reduce support
Within the Cloudflare Application Security team, every machine learning model we use is underpinned by a rich set of static
Modern websites rely heavily on JavaScript. Leveraging third-party scripts accelerates web app development, enabling organizations to deploy new features faster
AI is transforming businesses — from automated agents performing background workflows, to improved search, to easier access and summarization of
Generative AI is reshaping many aspects of our lives, from how we work and learn, to how we play and
Researchers found a critical vulnerability in the AMI MegaRAC baseband management controller (BMC) used by multiple server manufacturers. The vulnerability
Chipmaker Nvidia has released a new open-source inferencing software — Dynamo, at its GTC 2025 conference, that will allow enterprises
In today’s digital world, security breaches are all too common. Despite the many security tools and training programs available, identity-based
The threat actors behind the ClearFake campaign are using fake reCAPTCHA or Cloudflare Turnstile verifications as lures to trick users
Activities which organisations must carry out to migrate safely to post-quantum cryptography in the coming years. Source:: NCSC Guidance
Identity-based attacks are on the rise. Attackers are targeting identities with compromised credentials, hijacked authentication methods, and misused privileges. While
At the end of 2024, we discovered a new stealer distributed via YouTube videos promoting game cheats. What’s intriguing about
HPE and Nvidia added to their joint, prepackaged service offerings that are aimed at helping enterprises support AI workloads. At
Why the key milestones for PQC migration are part of building and maintaining good cyber security practice. Source:: NCSC Guidance
Cybersecurity researchers have disclosed details of two critical flaws impacting mySCADA myPRO, a Supervisory Control and Data Acquisition (SCADA) system
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a vulnerability linked to the supply chain compromise of
The settlement with thousands of people who have worked at the tech giant has received preliminary approval. Source:: BBC News