Cloudflare
10 corporate cybersecurity blogs worth your time
In this article, we’ve curated a list of insightful corporate cybersecurity blogs that provide analysis and actionable advice to help you keep your company’s …
Okta breach post mortem reveals weaknesses exploited by attackers
The recent breach of the Okta Support system was carried out via a compromised service account with permissions to view and update customer support cases. “During our …
1Password also affected by Okta Support System breach
Following in the footsteps of BeyondTrust and CloudFlare, 1Password has revealed that it has been affected by the Okta Support System breach. “On September 29, we …
Dangerous vulnerability can be exploited to carry out massive DDoS attacks (CVE-2023-44487)
Cloudflare, Google, and Amazon AWS revealed that a zero-day vulnerability in the HTTP/2 protocol has been used to mount massive, high-volume DDoS attacks, which they dubbed …
Cybertech Europe 2023 video walkthrough
In this Help Net Security video, we take you inside Cybertech Europe 2023 at La Nuvola Convention Center in Rome. The video features the following vendors: Accenture, Armis, …
Factors leading to organizations losing control over IT and security environments
Companies are challenged with the growing need to connect everything in their business while maintaining control over their security, productivity, and competitive growth, …
Cloudflare One Data Protection Suite secures developer and AI environments
Cloudflare announced Cloudflare One Data Protection Suite, a unified set of advanced security solutions designed to protect data across every environment – web, SaaS, and …
Meter collaborates with Cloudflare to launch DNS Security
Meter announced DNS Security, built in partnership with Cloudflare. Meter DNS Security is now widely available for all Meter Network customers, expanding Meter’s existing NaaS …
What makes a good ASM solution stand out
In this Help Net Security interview, Patrice Auffret, CTO at Onyphe, explains how the traditional perimeter-based security view is becoming obsolete. He suggests that …
30% of phishing threats involve newly registered domains
Phishing remains the most dominant and fastest growing internet crime, largely due to the ubiquity of email and the ceaseless issue of human error that is preyed upon by …
Almost all VPNs are vulnerable to traffic-leaking TunnelCrack attacks
Several vulnerabilities that affect most VPN products out there can be exploited by attackers to read user traffic, steal user information, or even attack user devices, …
Cloudflare joins forces with Databricks to enable organizations collaborate on live data
Cloudflare has partnered with Databricks to enable organizations to safely, simply, and affordably share and collaborate on live data. With Cloudflare and Databricks, joint …
Featured news
Sponsored
Don't miss
- Top priorities for federal cybersecurity: Infrastructure, zero trust, and AI-driven defense
- Benefits and best practices of leveraging AI for cybersecurity
- Kali Linux 2024.3 released: 11 new tools, Qualcomm Snapdragon SDM845 SoC support
- Ivanti fixes critical vulnerabilities in Endpoint Management (CVE-2024-29847)
- Cybersecurity is a fundamental component of patient care and safety