precision control over every part of your cache
One year ago we introduced Cache Rules, a new way to customize…
Network flow monitoring is GA, providing end-to-end traffic visibility
Network engineers often find they need better visibility into their network’s traffic…
Malicious “RedAlert – Rocket Alerts” Application Targets Israeli Phone Calls, SMS, and User Information
On October 13, 2023, Cloudflare’s Cloudforce One Threat Operations Team became aware…
A Socket API that works across JavaScript runtimes — announcing a WinterCG spec and Node.js implementation of connect()
Earlier this year, we announced a new API for creating outbound TCP…
How To Limit Login Attempts on WordPress (+ Should You?)
WordPress is (by far) the most popular content management system – and…
You can now use WebGPU in Cloudflare Workers
The browser as an app platform is real and stronger every day;…
Agent Tesla’s Unique Approach: VBS and Steganography for Delivery and Intrusion
Agent Tesla functions as a Remote Access Trojan (RAT) and an information…
Peeling Back the Layers of RemcosRat Malware
McAfee labs observed a Remcos RAT campaign where malicious VBS files were…
Use Windows 365 and Teams Walkie Talkie on ThinkPhone
Businesses that use the Lenovo ThinkPhone by Motorola will soon be able…
Malware in the free game Super Mario 3: Mario Forever
We often talk about the perils of downloading pirated versions of games,…