TURN and anycast: making peer connections work globally
A TURN server helps maintain connections during video calls when local networking conditions prevent participants from connecting directly...
New standards for a faster and more private Internet
As the Internet grows, so do the demands for speed and security. At Cloudflare, we’ve spent the last...
Introducing Speed Brain: helping web pages load 45% faster
Each time a user visits your web page, they are initiating a race to receive content as quickly...
Cloudflare’s 12th Generation servers — 145% more performant and 63% more efficient
Cloudflare is thrilled to announce the general deployment of our next generation of servers — Gen 12 powered...
Cybersecurity Researchers Warn of New Rust-Based Splinter Post-Exploitation Tool
Cybersecurity researchers have flagged the discovery of a new post-exploitation red team tool called Splinter in the wild....
Cybersecurity Researchers Warn of New Rust-Based Splinter Post-Exploitation Tool
Cybersecurity researchers have flagged the discovery of a new post-exploitation red team tool called Splinter in the wild....
James McAvoy and Tom Brady fall for ‘Goodbye Meta AI’ hoax
More than 600,000 people have shared a message falsely denying Meta the right to use their images to...
Biden-Harris Administration Launches NSTC Workforce Center of Excellence with Expected $250 Million Investment
Today, the Biden-Harris Administration announced the launch of the National Semiconductor Technology Center’s (NSTC) Workforce Center of Excellence...
Terminator creator James Cameron joins board of AI company
His role at Stable Diffusion creator StabilityAI will focus on AI’s use in special effects. Source:: BBC News...
Expert Tips on How to Spot a Phishing Link
Phishing attacks are becoming more advanced and harder to detect, but there are still telltale signs that can...
From 12 to 21: how we discovered connections between the Twelve and BlackJack groups
While analyzing attacks on Russian organizations, our team regularly encounters overlapping tactics, techniques, and procedures (TTPs) among different...
Agentic AI in SOCs: A Solution to SOAR’s Unfulfilled Promises
Security Orchestration, Automation, and Response (SOAR) was introduced with the promise of revolutionizing Security Operations Centers (SOCs) through...
ChatGPT macOS Flaw Could’ve Enabled Long-Term Spyware via Memory Function
A now-patched security vulnerability in OpenAI’s ChatGPT app for macOS could have made it possible for attackers to...
Transportation Companies Hit by Cyberattacks Using Lumma Stealer and NetSupport Malware
Transportation and logistics companies in North America are the target of a new phishing campaign that delivers a...
CISA Flags Critical Ivanti vTM Vulnerability Amid Active Exploitation Concerns
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a critical security flaw impacting Ivanti Virtual...
Sharp rise in problematic teenage social media use, study says
The report says a “continuously online” generation needs more help to live healthy digital lives. Source:: BBC News...
Will the US presidential election define the future of crypto?
Crypto currency firms are waiting to see how November’s vote will impact upon them. Source:: BBC News –...
Instant Purge: invalidating cached content in under 150ms
(part 3 of the Coreless Purge series) Over the past 14 years, Cloudflare has evolved far beyond a...
Windows 10 KB5043131 update released with 9 changes and fixes
Microsoft has released the September 2024 non-security preview update for Windows 10, version 22H2, with fixes for bugs...
Caroline Ellison sentenced to 2 years for role in FTX crypto fraud
Ellison testified as a star witness against her ex-boyfriend and FTX’s founder, Sam Bankman-Fried. Source:: BBC News –...