Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Black Hat Europe 2025: Lessons from the NOC

With the holiday season all wrapped up (pun definitely intended), I finally have time to sit down and digest what we saw in the network traffic at Black Hat Europe 2025 while working alongside the other Network Operations Center (NOC) partners: Arista, Cisco, Jamf, and Palo Alto Networks. As usual, there is a mix of the expected, a dash of the unexpected, and some lessons for newcomers and greybeards alike. Let’s get into it.

Best Security for K8s Clusters: A Runtime-First Approach

Why does traditional Kubernetes security fall short? Static scanners flag thousands of CVEs but can’t tell you which ones are actually loaded into memory and exploitable—only about 15% are loaded at runtime. Traditional tools also create siloed visibility, with CSPM, vulnerability scanners, and EDR each seeing only one slice of your environment. This makes it impossible to spot lateral movement or connect events across cloud, cluster, container, and application layers.

ASPA: making Internet routing more secure

Internet traffic relies on the Border Gateway Protocol (BGP) to find its way between networks. However, this traffic can sometimes be misdirected due to configuration errors or malicious actions. When traffic is routed through networks it was not intended to pass through, it is known as a route leak. We have written on our blog multiple times about BGP route leaks and the impact they have on Internet routing, and a few times we have even alluded to a future of path verification in BGP.

Bringing more transparency to post-quantum usage, encrypted messaging, and routing security

Cloudflare Radar already offers a wide array of security insights — from application and network layer attacks, to malicious email messages, to digital certificates and Internet routing. And today we’re introducing even more. We are launching several new security-related data sets and tools on Radar.

The Rise of Kratos: How the New Phishing-as-a-Service Kit Industrializes Cybercrime

By the end of 2026, over 90% of all credential compromise attacks are estimated to be enabled by modular Phishing-as-a-Service (PhaaS) kits like the sophisticated, global threat, Kratos. This aggressive platform has already begun reshaping the threat landscape. At its core, Phishing-as-a-Service (PhaaS) is a malicious cloud-based service that allows easier deployment of phishing attacks and faster updating of features as compared to traditional phishing and malware attacks.

Is OneDrive Safe? Microsoft's Security, Privacy, and Encryption

OneDrive is the most popular cloud storage for Windows due to its easy integration in the Microsoft ecosystem. However, like most big tech companies from the US, there are concerns about how these companies use, secure, and keep your data private, leading many to wonder is OneDrive safe if you want to store photos, documents, or videos in privacy.

30 Years of Partner Commitment and a Decade of 5-Star Recognition from CRN

We’re proud to share that WatchGuard has once again been recognized by the CRN as a 5-Star Award recipient in the 2026 CRN Partner Program Guide. This marks the tenth consecutive year WatchGuard has earned this prestigious distinction, an achievement that underscores our unwavering commitment to delivering a partner-first approach and empowering MSPs with the tools, support, and innovation they need to succeed.

External Penetration Testing Tools: A Purpose Built Guide

The classic external penetration testing takes a systematic approach that includes reconnaissance, enumeration, validation, and proof-of-concept exploitation. Enterprise security teams deploy comprehensive suites of tools across the entire application, offering full lifecycle testing, which loses value when the toolchain isn’t purpose-built for each testing phase.