Top 50 most impersonated brands in phishing attacks and new tools you can use to protect your employees from them
Someone in your organization may have just submitted an administrator username and…
How to protect funds being stolen from bank cards with a chip and NFC
Payment services have become both more convenient and more secure over recent…
Wordfence Intelligence Weekly WordPress Vulnerability Report (Feb 27, 2023 to Mar 5, 2023)
Wordfence Intelligence Weekly WordPress Vulnerability Report (Feb 27, 2023 to Mar 5,…
Why you shouldn’t use desktop messengers
Many companies, especially small ones, don’t use specialized systems like Slack or…
Keeping the Cloudflare API ‘all green’ using Python-based testing
At Cloudflare, we reuse existing core systems to power multiple products and…
How secure are authenticator apps?
Information security experts have long agreed that the most reliable form of…
Oxy is Cloudflare’s Rust-based next generation proxy framework
In this blog post, we are proud to introduce Oxy - our…
Wordfence Intelligence Weekly WordPress Vulnerability Report (Feb 20, 2023 to Feb 26, 2023)
Wordfence Intelligence Weekly WordPress Vulnerability Report (Feb 20, 2023 to Feb 26,…
How cybercriminals tailor attacks for different age groups of gamers
These days, a 12 or 13-year-old kid can become a professional eSports…