Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Unlock Deeper Insights: Mastering Cloudflare Log Explorer for Better Security & Performance

Cloudflare Log Explorer is the native observability and forensics tool designed to give security teams and developers unparalleled, granular access to Cloudflare traffic logs directly within the dashboard. Key benefits include: Understanding your traffic patterns is fundamental to optimizing for peak performance and maintaining a robust security posture.

Keeping the Internet fast and secure: introducing Merkle Tree Certificates

The world is in a race to build its first quantum computer capable of solving practical problems not feasible on even the largest conventional supercomputers. While the quantum computing paradigm promises many benefits, it also threatens the security of the Internet by breaking much of the cryptography we have come to rely on. To mitigate this threat, Cloudflare is helping to migrate the Internet to Post-Quantum (PQ) cryptography.

Resilient by Design: Cato's Visibility and Backbone Performance Through the AWS Outage

On October 20, 2025, Amazon Web Services (AWS) experienced an outage affecting its US-East-1 region. The event caused temporary service degradation across a wide range of global applications and digital services, including business collaboration tools, financial platforms, airline operations, and consumer-facing websites used by millions of people worldwide, as reported in the news. We extend our appreciation to our partners at AWS for their swift and professional handling of the incident.

Securing agentic commerce: helping AI Agents transact with Visa and Mastercard

The era of agentic commerce is coming, and it brings with it significant new challenges for security. That’s why Cloudflare is partnering with Visa and Mastercard to help secure automated commerce as AI agents search, compare, and purchase on behalf of consumers. Through our collaboration, Visa developed the Trusted Agent Protocol and Mastercard developed Agent Pay to help merchants distinguish legitimate, approved agents from malicious bots.

How Cloudflare's client-side security made the npm supply chain attack a non-event

In early September 2025, attackers used a phishing email to compromise one or more trusted maintainer accounts on npm. They used this to publish malicious releases of 18 widely used npm packages (for example chalk, debug, ansi-styles) that account for more than 2 billion downloads per week. Websites and applications that used these compromised packages were vulnerable to hackers stealing crypto assets (“crypto stealing” or “wallet draining”) from end users.

Cloudflare Connect 2025 Highlights: Common, James Allworth, David Tuber & Kenton Varda

We cover Cloudflare’s partnership with Mastercard & Visa on AI agent commerce, highlights from rapper Common, and conversations with: Full interviews with each guest will be published in the coming weeks. Plus: next week’s Cloudflare blog series on Internet Measurement, Resilience, and Transparency — the foundations of a faster, safer, and more reliable web.

Agentless Network Monitoring: The New Standard for Cloud Security Visibility

Agentless network monitoring represents a fundamental shift in cloud security strategy. Rather than installing software agents across every cloud resource, this approach leverages existing infrastructure to gather comprehensive security intelligence remotely.

Beyond the AWS Outage: How CloudCasa and Any2Cloud Enable True Multi-Cloud Resilience for Kubernetes

When AWS’s US-East-1 region went down again this month, it reminded the industry of an uncomfortable truth: even the most trusted cloud platforms can fail. From streaming services to SaaS providers, many businesses were caught off guard, not because they lacked backups, but because they lacked redundancy. In a Kubernetes world, redundancy isn’t just about having data snapshots.

Jingle Thief Gift Card Fraud: How Cloud Account Misuse Became a Pandemic for Retailers

Jingle Thief gift card fraud is a reminder that attackers don’t always need zero-day bugs or exotic malware to make millions — they need credentials and patience. In 2024–2025, security teams observed a financially motivated cluster (tracked by defenders as “Jingle Thief” / CL‑CRI‑1032) that focused on phishing and identity misuse to quietly harvest access to cloud platforms, then abuse gift-card issuance workflows at scale.