Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Cloudflare enables native monitoring and forensics with Log Explorer and custom dashboards

In 2024, we announced Log Explorer, giving customers the ability to store and query their HTTP and security event logs natively within the Cloudflare network. Today, we are excited to announce that Log Explorer now supports logs from our Zero Trust product suite. In addition, customers can create custom dashboards to monitor suspicious or unusual activity.

Cyber Threats in 2025: Top Intelligence Trends Every CISO Must Keep an Eye on

With cybercriminals becoming increasingly more sophisticated, utilizing the latest tools such as generative AI and SaaS exploits, the cybersecurity world in 2025 appears to be more convoluted than ever before. From compromised credentials-driven SaaS attacks to social engineering-based fraud facilitated through deepfakes, CISOs need to remain ahead with insightful recommendations.

AI-Driven Vulnerability Management: How Generative AI is Transforming Cybersecurity

With the rapid and dynamic nature of the digital world of today, businesses are seeing a mounting high rate of cybersecurity attacks. Cyber attackers keep evolving and coming up with new methods of breaching their systems, which leaves security teams under immense pressure to identify, assess, and remediate vulnerabilities at scale. Traditional methods of vulnerability management are typically behind the curve because the sheer volume of threats is overwhelming.

Dark Storm Team: The Hacker Group Behind the DDoS Attack on X (Twitter)

On March 10, 2025, X (formerly Twitter) experienced a series of outages due to a large-scale Distributed Denial of Service (DDoS) attack. The platform went down multiple times throughout the day, affecting millions of users globally. Elon Musk later confirmed that X was targeted by a "massive cyberattack", with initial investigations pointing to Ukraine-based IP addresses as the source.

PCI Readiness Survey: Key challenges for 2025

The Payment Card Industry Data Security Standard (PCI DSS) has been a critical framework for protecting cardholder data for the last two decades. It’s also presented a major — and gradually rising — compliance challenge for organizations that handle cardholder data. That challenge is set to ramp up significantly in the coming months, as security standards become even more stringent with PCI DSS 4.0 updates taking full effect in March 2025.

What is Bundesamt für Sicherheit in der Informationstechnik (BSI)?

Most countries have some sort of government agency dedicated to protecting digital infrastructure and promoting cybersecurity awareness. In the English-speaking world alone, the UK has the National Cyber Security Center (NCSC), the US has the National Institute of Standards and Technology (NIST), and Canada has the Canadian Centre for Cyber Security; chances are you’re already aware of them.

Announcing Jit's Customizable SAST Rulesets: Detect Security Issues Unique to Your Environment

We’re excited to announce Jit's Customizable SAST Rulesets, a powerful new feature that allows AppSec and DevOps teams to create and manage custom Semgrep rules tailored to their specific security needs. With Jit orchestrating Semgrep scans across the entire codebase and continuously analyzing every code change, teams can now ensure security gaps are identified and addressed before they reach production.

Why Convert MP4 to WEBM in 2025? Benefits & Best Tools Explained

Many creators want high quality videos that load fast and don't hog data. In 2025 converting MP4 to WEBM is crucial because it delivers smaller file sizes and smoother playback on modern browsers. This shift means more efficient streaming and better user experiences.

European Cyber Report 2025: 137% more DDoS attacks than last year - what companies need to know

Cyberattacks are no longer an abstract threat - they dominate risk planning for companies worldwide. The latest Link11 European Cyber Report shows an alarming trend: the number of DDoS attacks has more than doubled, and they are shorter, more targeted, and more technically sophisticated. Organizations that do not continuously evolve their security strategies face significant financial losses and long-term reputational damage.