Risk reduction redefined: How compromise assessment helps strengthen cyberdefenses
Introduction Organizations often rely on a layered defense strategy, yet breaches still occur, slipping past multiple levels of...
Migrating billions of records: moving our active DNS database while it’s in use
According to a survey done by W3Techs, as of October 2024, Cloudflare is used as an authoritative DNS...
Russian charged by U.S. for creating RedLine infostealer malware
The United States announced charges today against Maxim Rudometov, a Russian national, for being the suspected developer and...
Researchers Uncover Vulnerabilities in Open-Source AI and ML Models
A little over three dozen security vulnerabilities have been disclosed in various open-source artificial intelligence (AI) and machine...
Amazon Q Developer announces support for inline chat to streamline the developer experience
Today, Amazon Q Developer announces an enhanced chat experience that allows you to seamlessly initiate chat within the...
Forced offline: the Q3 2024 Internet disruption summary
Cloudflare’s network spans more than 330 cities in over 120 countries, where we interconnect with over 13,000 network...
A Sherlock Holmes Approach to Cybersecurity: Eliminate the Impossible with Exposure Validation
Sherlock Holmes is famous for his incredible ability to sort through mounds of information; he removes the irrelevant...
Dutch Police Disrupt Major Info Stealers RedLine and MetaStealer in Operation Magnus
The Dutch National Police, along with international partners, have announced the disruption of the infrastructure powering two information...
TikTok founder becomes China’s richest man
Zhang Yiming’s fortune has leapt to almost $50bn, according to a newly published rich list. Source:: BBC News...
Lumma/Amadey: fake CAPTCHAs want to know if you’re human
Attackers are increasingly distributing malware through a rather unusual method: a fake CAPTCHA as the initial infection vector....
U.S. Government Issues New TLP Guidance for Cross-Sector Threat Intelligence Sharing
The U.S. government (USG) has issued new guidance governing the use of the Traffic Light Protocol (TLP) to...
New Research Reveals Spectre Vulnerability Persists in Latest AMD and Intel Processors
More than six years after the Spectre security flaw impacting modern CPU processors came to light, new research...
AWS Trust & Safety Center is now available on AWS re:Post
Starting today, the AWS Trust & Safety Center is available on AWS re:Post. The AWS Trust & Safety...
VPC DNS Query Logging now available in the Asia Pacific (Malaysia) Region
Today, we are announcing the availability of Route 53 Resolver Query Logging in the Asia Pacific (Malaysia) Region....
New tool bypasses Google Chrome’s new cookie encryption system
A researcher has released a tool to bypass Google’s new App-Bound encryption cookie-theft defenses and extract saved credentials...
Business continuity that enables users to continue secure operations, even during a catastrophic event
Zscaler, trusted for resilience. As we recently announced, Zscaler continues to grow, adding more and more customers seeking...
Upcoming Webinar: Enhance Generative AI Model Accuracy Through High-Quality Data Processing
Learn how to build scalable data processing pipelines to create high-quality datasets. Learn how to build scalable data...
Exchange Online adds Inbound DANE with DNSSEC for everyone
Microsoft announced today that inbound SMTP DANE with DNSSEC for Exchange Online, a new capability to boost email...
Lessons learned: 4 Zscaler deployments later
When I joined Capitec in April 2022 as CTO, the first thing I wanted to find out was...
NTT Data to offer Palo Alto-based threat detection, remediation service
Palo Alto Networks is teaming with NTT Data to allow the global IT services company to offer an...