Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

AWS GuardDuty Modules Explained: Features, Coverage, and How Customers Benefit with Coralogix

As organizations continue to scale their AWS environments, security teams face increasing challenges in detecting cloud-native threats such as compromised credentials, misused APIs, container breaches, and malicious workload behavior. Traditional perimeter-based controls and legacy endpoint tools are often insufficient in dynamic, cloud-first architectures. AWS GuardDuty provides native,intelligent threat detection for AWS environments.

AI Workload Security on AWS: Evaluating Native Tools vs Third-Party Solutions

Your Bedrock agent running on EKS receives a prompt through your RAG pipeline. CloudTrail logs it as a normal bedrock:InvokeModel event—status 200, authorized IAM role, expected endpoint. But inside the container, the agent’s response triggers a tool call that spawns curl to an external IP, exfiltrating the context window. GuardDuty doesn’t flag it because the connection routes through a permitted VPC endpoint. You open your AWS console and see a healthy API call.

Is Icedrive Safe to Store Your Personal Files?

If you’re tired of big tech cloud companies profiting from your data, fortunately, you have a variety of options available to make the switch from Google Drive, OneDrive, iCloud, and others. From cloud companies like Internxt, which was founded as a secure and private alternative to Google Drive, to Icedrive, a cloud storage company from the UK, you may be considering which option is best for you. But, is Icedrive safe?

Standing up for the open Internet: why we appealed Italy's "Piracy Shield" fine

At Cloudflare, our mission is to help build a better Internet. Usually, that means rolling out new services to our millions of users or defending the web against the world’s largest cyber attacks. But sometimes, building a better Internet requires us to stand up against laws or regulations that threaten its fundamental architecture.

The AWS logs you miss during an incident

Incident response in the cloud is derailed not by a lack of skill, but by a lack of visibility. Security teams frequently discover critical blind spots only after an incident is already underway, leading to delayed containment, inaccurate attribution, and incomplete forensic analysis. This report walks through six realistic, real-world inspired scenarios where missing log sources prevented effective investigations.

Announcing Cloudflare Account Abuse Protection: prevent fraudulent attacks from bots and humans

Today, Cloudflare is introducing a new suite of fraud prevention capabilities designed to stop account abuse before it starts. We've spent years empowering Cloudflare customers to protect their applications from automated attacks, but the threat landscape has evolved. The industrialization of hybrid automated-and-human abuse presents a complex security challenge to website owners.