How Cloudflare can help stop malware before it reaches your app
Let’s assume you manage a job advert site. On a daily basis…
How cybercriminals can get hold of your passwords
For most us, a password is simply the most common method for…
DNS record comments and tags
Starting today, we’re adding support on all zone plans to add custom…
How Much is Your Hacked Site Worth?
How Much is Your Hacked Site Worth? The Wordfence Threat Intelligence team…
A new, configurable and scalable version of Geo Key Manager, now available in Closed Beta
Today, traffic on the Internet stays encrypted through the use of public…
Freebie Bot search online products with incorrect prices
Specialists from Kasada, a company specializing in protection against bot attacks, said…
How to Automating repetitive tasks for free
During the work day we perform a large number of actions in…
Your Backups Might Be Your Greatest Weakness
Configuration Probing: Your Backups Might Be Your Greatest Weakness Configuration files exist…
Emotet’s Uncommon Approach of Masking IP Addresses
In a recent campaign of Emotet, McAfee Researchers observed a change in…
How we detect route leaks and our new Cloudflare Radar route leak service
Today we’re introducing Cloudflare Radar’s route leak data and API so that…