Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Introducing Aikido AI Cloud Search

Gain instant visibility into your cloud environment with Aikido Cloud Search. Search your cloud like a database. Whether you want to identify exposed databases, vulnerable virtual machines, or over-permissive IAM roles — Aikido gives you the power to uncover risk in seconds. No query language required, no waiting on devops. Just describe what you’re looking for, like “Give me all VMs with CVE-2025-32433 that have port 22 open.” Scroll down to "How It Works" to get technical.

Google Dorking Secrets Hackers Do Not Want You to Know

Google Dorking is also known as Google hacking and is one of the most used techniques by hackers in searching for any information that has been inadvertently exposed to the internet. This is generally done based on advanced search operators as indexed by search engines. While a great tool for cyber professionals, ethical hackers and researchers, it can be risky when used in the wrong way.

Cloudflare named in 2025 Gartner Magic Quadrant for Security Service Edge

For the third consecutive year, Gartner has named Cloudflare in the Gartner Magic Quadrant for Security Service Edge (SSE) report. This analyst evaluation helps security and network leaders make informed choices about their long-term partners in digital transformation. We are excited to share that Cloudflare is one of only nine vendors recognized in this year’s report. You can read more about our position in the report here.
Featured Post

Level-up Your Cloud Success with AWS and MSP expertise

For the modern enterprise, data is the foundational element that allows businesses to operate. As information technology continues to evolve and grow in complexity, organisations need to store and manage greater quantities of mission critical data. To achieve this, businesses are increasingly adopting cloud computing, with many opting to make use of one of the public clouds, such as AWS.

Resolving a request smuggling vulnerability in Pingora

On April 11, 2025 09:20 UTC, Cloudflare was notified via its Bug Bounty Program of a request smuggling vulnerability (CVE-2025-4366) in the Pingora OSS framework discovered by a security researcher experimenting to find exploits using Cloudflare’s Content Delivery Network (CDN) free tier which serves some cached assets via Pingora.