Start auditing and controlling the AI models accessing your content
Site owners have lacked the ability to determine how AI services use their content for training or other...
Network performance update: Birthday Week 2024
When it comes to the Internet, everyone wants to be the fastest. At Cloudflare, we’re no different. We...
Making zone management more efficient with batch DNS record updates
Customers that use Cloudflare to manage their DNS often need to create a whole batch of records, enable...
Introducing Ephemeral IDs: a new tool for fraud detection
In the early days of the Internet, a single IP address was a reliable indicator of a single...
Broadcom hits back at AT&T in VMware support dispute
Broadcom has fired back in the ongoing legal dispute with AT&T over VMware software support services, claiming that...
NIST Awards $3 Million for Community-Based Cybersecurity Workforce Development
The grants of roughly $200,000 each will go to organizations that are working to address the nation’s shortage...
THN Cybersecurity Recap: Last Week’s Top Threats and Trends (September 16-22)
Hold on tight, folks, because last week’s cybersecurity landscape was a rollercoaster! We witnessed everything from North Korean...
Why ‘Never Expire’ Passwords Can Be a Risky Decision
Password resets can be frustrating for end users. Nobody likes being interrupted by the ‘time to change your...
How the Necro Trojan infiltrated Google Play, again
Introduction We sometimes come across modified applications when analyzing suspicious files. These are created in response to user...
Critical Flaw in Microchip ASF Exposes IoT Devices to Remote Code Execution Risk
A critical security flaw has been disclosed in the Microchip Advanced Software Framework (ASF) that, if successfully exploited,...
Discord Introduces DAVE Protocol for End-to-End Encryption in Audio and Video Calls
Popular social messaging platform Discord has announced that it’s rolling out a new custom end-to-end encrypted (E2EE) protocol...
New PondRAT Malware Hidden in Python Packages Targets Software Developers
Threat actors with ties to North Korea have been observed using poisoned Python packages as a way to...
Chinese Hackers Exploit GeoServer Flaw to Target APAC Nations with EAGLEDOOR Malware
A suspected advanced persistent threat (APT) originating from China targeted a government organization in Taiwan, and possibly other...
Estimating cost per dbt model in Databricks
Many data teams across Kraken are using Databricks and dbt to build their analytics lakehouses. Databricks is a...
Cloudflare’s 2024 Annual Founders’ Letter
This week Cloudflare will celebrate the fourteenth anniversary of our launch. We think of it as our birthday....
New Google Chrome feature will translate complex pages in real time
Google is testing a new API that uses machine learning models to offer real-time language translation for inputted...
MrBeast is YouTube’s biggest star – now he faces 54-page lawsuit
It’s been another busy week for Jimmy Donaldson, in what is becoming a bit of a theme for...
Global infostealer malware operation targets crypto users, gamers
A massive infostealer malware operation encompassing thirty campaigns targeting a broad spectrum of demographics and system platforms has...
Hacktivist Group Twelve Targets Russian Entities with Destructive Cyber Attacks
A hacktivist group known as Twelve has been observed using an arsenal of publicly available tools to conduct...
LinkedIn Halts AI Data Processing in UK Amid Privacy Concerns Raised by ICO
The U.K. Information Commissioner’s Office (ICO) has confirmed that professional social networking platform LinkedIn has suspended processing users’...