Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Setup WordPress Employee Directory with Active Directory (AD/LDAP) Search

Looking for a simple way to create an Employee Directory in WordPress using your Active Directory (AD) / LDAP? In this demo video, we’ll walk you through the complete setup of the WordPress LDAP Directory Search Plugin — making it easy to search, filter, and display employee details from your LDAP/AD server directly inside your WordPress site.

A Single Cyberattack Stopped Jaguar Land Rover-and Could Stop You Next

The $2 Billion Cyber Disaster That Shook the Automotive World On September 2, 2025, Jaguar Land Rover (JLR) suffered a automotive cyberattack that instantly froze production lines, shutdown the dealerships and paralyzed the luxury automaker’s global IT systems during the UK’s “New Plate Day”—one of the busiest times for the industry.

Introducing Observatory and Smart Shield - see how the world sees your website, and make it faster in one click

Modern users expect instant, reliable web experiences. When your application is slow, they don’t just complain — they leave. Even delays as small as 100 ms have been shown to have a measurable impact on revenue, conversions, bounce rate, engagement and more.

Cloudflare just got faster and more secure, powered by Rust

Cloudflare is relentless about building and running the world’s fastest network. We have been tracking and reporting on our network performance since 2021: you can see the latest update here. Building the fastest network requires work in many areas. We invest a lot of time in our hardware, to have efficient and fast machines. We invest in peering arrangements, to make sure we can talk to every part of the Internet with minimal delay.

CVE-2025-20333: Authenticated RCE in Cisco ASA / FTD VPN Web Server

A high-severity vulnerability (CVSS 9.9) has been disclosed in the VPN web server component of Cisco Secure Firewall ASA and FTD software. An authenticated attacker (i.e. one possessing valid VPN credentials) can send specially crafted HTTP(S) requests that bypass input validation and lead to remote code execution as root. This means full device compromise is possible.

The Behavioral Science Behind the Click

Welcome back. In our last blog post, we talked about the great divide between tech-focused and people-focused security. Now, let’s get nerdy and talk about the fascinating, complex, and occasionally infuriating operating system at the heart of the problem: the human brain. Ever wondered why that "Urgent Invoice" email from a brand-new supplier creates an immediate jolt of anxiety that makes you want to click? That’s not a logic failure; it’s a feature.

The Dawn of the Agentic SOC: Reimagining Cybersecurity for the AI Era

At Fal.Con 2025, I had the privilege of addressing over 8,000 cybersecurity professionals about something that’s on my mind – and should be on all of ours: how do we fundamentally reimagine security for the age of AI? We're living through the fourth industrial revolution. The first brought us steam power, the second electricity, and the third the digital age we all know and love.

What Businesses Learn from the Top Web Designer in Singapore

Digital growth depends on effective websites. Companies that want strong online visibility study industry leaders carefully. A Top Web Designer in Singapore demonstrates how design impacts branding, user trust, and long-term success. Modern websites go beyond attractive visuals. They combine structure, speed, and seamless user interaction. Design influences credibility, and customers often judge brands by online appearance. The process requires more than technical skills.