Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How Cloudflare's client-side security made the npm supply chain attack a non-event

In early September 2025, attackers used a phishing email to compromise one or more trusted maintainer accounts on npm. They used this to publish malicious releases of 18 widely used npm packages (for example chalk, debug, ansi-styles) that account for more than 2 billion downloads per week. Websites and applications that used these compromised packages were vulnerable to hackers stealing crypto assets (“crypto stealing” or “wallet draining”) from end users.

Advanced vector search in air-gapped environments

For organizations in air-gapped environments with no external network connection, implementing the latest search and AI technology can be challenging, often to the point of impossibility. However, Elastic’s customers in highly sensitive industries, such as national security and defense, have relied on Elastic’s agile technology for over a decade, trusting it for mission-critical use cases in air-gapped environments or even on tech kits.

Securing agentic commerce: helping AI Agents transact with Visa and Mastercard

The era of agentic commerce is coming, and it brings with it significant new challenges for security. That’s why Cloudflare is partnering with Visa and Mastercard to help secure automated commerce as AI agents search, compare, and purchase on behalf of consumers. Through our collaboration, Visa developed the Trusted Agent Protocol and Mastercard developed Agent Pay to help merchants distinguish legitimate, approved agents from malicious bots.

What Is Unified Threat Management (UTM)? What Are Its Benefits

Cybercrime is growing at a rapid pace. Although there are security products available to counter different cyber threats, managing too many security products can be a daunting task. It’s neither easy nor cost-effective to manage numerous separate security products. Organizations are looking for ways to consolidate multiple security functions into a single network security appliance because it is easier to manage and is more cost-effective.

Zero-shot Security Classification with Foundation-Sec-8B and Splunk DSDL

Earlier this year, we showcased how the Foundation-Sec-8B model’s chat capabilities can be leveraged within the Splunk App for Data Science and Deep Learning (DSDL) to summarize security events and provide detection suggestions. Building on its robust security expertise, Foundation-Sec-8B also supports zero-shot classification for a wide range of security tasks.

Cybersecurity Trends in 2026: From AI Defense to Digital Trust

In 2026, cybersecurity has evolved from being an IT concern to becoming one of the most strategic levers of global stability. As artificial intelligence systems become self-learning, quantum computing moves closer to commercialization, and consumer data flows multiply across platforms, cybersecurity is no longer about preventing attacks-it's about maintaining trust in an increasingly automated world.

How to Conduct a Thorough Free Background Check

Each year, U.S. county courts alone process over 80 million new cases, generating a massive and continuous stream of public records. This vast repository of data, alongside information from other government and public sources, forms the foundation for conducting a background check. While many services offer comprehensive reports for a fee, it is possible to gather a significant amount of information without cost by accessing these public records directly.

How Lobbyist Bill Tracking Software Saves Hours of Research Every Week

Lobbyist bill tracking software has completely changed how policy professionals monitor and manage legislation. Instead of spending late nights combing through endless government portals, lobbyists now have tools that streamline tracking, notifications, and reporting-all in one place.

Seeing the Invisible: Visualizing and Protecting AI-Agent Activity with Exabeam & Google

Artificial intelligence is no longer just an emerging technology in security operations and modern SIEMs. AI agents now enrich alerts, drive investigations, generate reports, and increasingly act as extensions of human analysts. But as with any powerful technology, new risk surfaces follow. From the Exabeam perspective, every entity in your environment deserves protection.

Understanding MySQL Database Backup Fundamentals

Losing a MySQL database without a backup means losing customer records, transactions, and your business’s good reputation. Whether you’re running a single application or managing containerized workloads, you need a backup strategy that works when disaster strikes. The challenge isn’t just creating backups but making sure that they’re consistent, they’re recoverable, and they match your recovery time objectives.