Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

A CISO's Honest Take on Regulation

Cybercriminals don't care about borders. So why do we have 12 different regulatory frameworks for the same threat? Olivier Busolini, Group Head of Information Security at Mashreq Bank, voiced the frustration every global CISO feels: "In every country, I have 12 countries at Mashreq. In every country, there is a slightly different or sometimes vastly different requirement that I have to abide to.".

AI, DDoS, and the Internet in 2025 | Cloudflare Radar Year in Review

In this special Year in Review episode of This Week in NET, host João Tomé is joined by David Belson to break down the Cloudflare Radar 2025 Year in Review. Together, they explore what Cloudflare’s global network reveals about how the Internet evolved over the past year — from the rapid rise of AI crawlers and agent traffic, to record-breaking DDoS attacks, the spread of post-quantum encryption, and the growing impact of government-directed shutdowns and outages.

Demo: Manage security posture of GenAI apps

See how Cloudflare One helps you manage the security posture of GenAI tools like ChatGPT, Claude, and Gemini. This demo highlights: API integrations: Available for ChatGPT, Gemini, and Claude, and most popular SaaS apps 0:18 Posture findings: Scan for misconfigurations, unauthorized activity, and other security issues 0:50 Shadow AI discovery: Find what third-party AI apps access your SaaS tools 1:15.

Demo: Prevent data exposure in AI

See how Cloudflare One helps protect sensitive data when users interact with generative AI apps. This demo highlights secure access service edge (SASE) capabilities including: Data loss prevention (DLP) detections for sensitive content (e.g., PII, source code, financials) 0:22 Detections for data at rest in AI tools like ChatGPT 1:00 Guardrails for user prompts based on intent / topic to block jailbreak attempts, code abuse, PII requests, and other risky behavior 2:12.

Demo: Discover workforce use of shadow AI

See how Cloudflare One helps restore visibility and controls over unsanctioned use of AI tools. This demo highlights secure access service edge (SASE) capabilities including: Shadow AI reporting: Analyze how AI apps are used across your environment 0:10 Application confidence scores: Evaluate the risks posed by specific AI apps 1:10 Access controls: Allow, block, redirect, isolate, and more based on an app’s approval status 1:45.

Demo: Access controls for GenAI and agentic AI

See how Cloudflare One simplifies access controls across both generative AI and agentic AI communication — all from one unified secure access service edge (SASE) dashboard. This demo highlights: Securing human-to-AI connections by as blocking or redirecting from unapproved tools and isolating AI apps to protect data (0:09) Streamlining access to MCP servers for AI-to-resource connections via Cloudflare’s MCP server portals (1:10)

Building a Real-Time Multiplayer Chess Game Inside ChatGPT (Agents SDK)

In this clip from This Week in NET, Systems Engineer Steve James gives a hands-on demo of a real-time multiplayer chess game running inside ChatGPT, built with the Agents SDK and Cloudflare Workers. Beyond the demo, we talk about what developers can build today with AI agents — and why, given the pace of innovation, it’s genuinely hard to predict what applications and experiences will emerge in 2026.

Proactive WAF Vulnerability Protection & Firewall for AI + Multiplayer Chess Demo in ChatGPT

In this episode of This Week in NET, we talk with Daniele Molteni, Director of Product Management for Cloudflare’s WAF, about how Cloudflare responded within hours to a newly disclosed React Server Components vulnerability — deploying global protection before the public advisory was even released.

Cybersecurity Predictions 2026: What Security Leaders Learned in 2025

In this special compilation episode of The Connectivity Cloud Podcast with Cloudflare, Lia Kazandzhieva, Marketing Campaign Manager at Cloudflare revisits the most impactful conversations from 2025 with leading CISOs and security experts to distill the lessons that will define 2026 and beyond. What You'll Learn.

Scaling Globally? Use Argo Smart Routing to Cut Latency for Users Worldwide

Routing is the process of selecting the best path for data to travel across a network to its destination. But what if routing could be smarter and faster? Enter Cloudflare Smart Shield + Argo Smart Routing, which optimizes data paths to enhance both speed and reliability. Discover what smart routing is and how it can revolutionize your network performance: Key benefits of Argo Smart Routing: Want to dive deeper into routing and smart routing? Explore these resources in Cloudflare’s Learning Center.

The Zero-Markup Domain: Transfer Your Domain to Cloudflare for Price and Security

Are you tired of rising domain renewal costs and sneaky WHOIS privacy fees? Unlike other registrars that mark up renewal costs, Cloudflare charges you ZERO markup, passing wholesale pricing directly to you. Top 3 Reasons to Transfer: Wholesale Pricing: No markup, ever. You pay what Cloudflare pays. Unbreakable Security: Free WHOIS Privacy and advanced domain locking. Seamless Integration: Instant access to Cloudflare's global CDN and DNS infrastructure.

The 2025 Cloudflare Radar Year in Review: The rise of AI, post-quantum, and record-breaking DDoS attacks

The 2025 Cloudflare Radar Year in Review is here: our sixth annual review of the Internet trends and patterns we observed throughout the year, based on Cloudflare’s expansive network view.

React2Shell and related RSC vulnerabilities threat brief: early exploitation activity and threat actor techniques

On December 3, 2025, immediately following the public disclosure of the critical, maximum-severity React2Shell vulnerability (CVE-2025-55182), the Cloudforce One Threat Intelligence team began monitoring for early signs of exploitation. Within hours, we observed scanning and active exploitation attempts, including traffic originating from infrastructure associated with Asian-nexus threat groups.

AI, Creators & Agentic Commerce - A Conversation with Cloudflare CSO Stephanie Cohen

In this episode of This Week in NET, host João Tomé sits down with Stephanie Cohen, Cloudflare’s Chief Strategy Officer, for a candid conversation about AI, content creators, financial services, partnerships, and the future of the Internet. Stephanie shares how Cloudflare is helping keep the Internet open and resilient — from giving creators transparency and control over AI scraping, to enabling new models of agentic commerce through partnerships with Visa and Mastercard, to empowering organizations of all sizes through Cloudflare’s global network.

Deepfake Candidates Are Getting Hired - Here's How

Hiring in 2025: Is the person you hired even real? Deepfakes resumes. Outsourced interviews. Candidates landing jobs they never intended to do. We've moved from KYC to KYE, and organizations haven't caught up yet. In the latest episode of The Connectivity Cloud Podcast, we explore how attackers are weaponizing the job market with Vladimir Krupnov and Blake Darché. For anyone in hiring, HR tech, or security leadership, this is a must-listen.

Cloudflare WAF proactively protects against React vulnerability

Cloudflare has deployed a new protection to address a vulnerability in React Server Components (RSC). All Cloudflare customers are automatically protected, including those on free and paid plans, as long as their React application traffic is proxied through the Cloudflare Web Application Firewall (WAF). Cloudflare Workers are inherently immune to this exploit. React-based applications and frameworks deployed on Workers are not affected by this vulnerability.

Cloudflare's 2025 Q3 DDoS threat report -- including Aisuru, the apex of botnets

Welcome to the 23rd edition of Cloudflare’s Quarterly DDoS Threat Report. This report offers a comprehensive analysis of the evolving threat landscape of Distributed Denial of Service (DDoS) attacks based on data from the Cloudflare network. In this edition, we focus on the third quarter of 2025.

The Easiest Hacks Are the Most Dangerous

Some of the most successful cyberattacks aren't even that sophisticated. A misconfigured Zoom tenant. A forgotten 2FA. A Salesforce setting was left wide open. The problem isn't always the platform, but how we use it. Vladimir Krupnov and Blake Darché joined us in the latest episode of The Connectivity Cloud Podcast to unpack the myth that you need advanced tools to breach a system.