Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Cloudflare Radar: New TLD Insights and Certificate Transparency

André, who joined Cloudflare as an intern in Lisbon, Portugal, in 2024, explains how radar.cloudflare.com showcases trends in Internet traffic, protocol adoption, and security. He walks us through Radar’s new Top-Level Domain (TLD) insights, how the team uses DNS magnitude to measure domain popularity, and why certificate transparency is crucial for a safer web. The conversation also goes into outage monitoring, the Data Explorer and URL scanner tools, and how users around the world are finding surprising Internet trends — like the rise of Linux usage in France.

Configure Web Authentication (WebAuthn) for 2FA in Jira and Confluence | miniOrange 2FA Login

This video shows how to set up Web Authentication (WebAuthn) as a Two-Factor Authentication (2FA) method in Jira and Confluence using the miniOrange 2FA app. WebAuthn provides a phishing-resistant authentication experience by allowing users to log in securely using biometrics (like fingerprint or facial recognition) or hardware security keys. The WebAuthn method enhances both security and convenience, ensuring users can access Jira and Confluence without depending solely on passwords or OTPs.

Configure OTP over SMS for 2FA in Jira and Confluence | Strengthen Login Security with miniOrange

This video guides you through the process of setting up the OTP over SMS method for the miniOrange 2FA app for Jira and Confluence. Add an extra verification step to your Jira and Confluence logins by sending one-time passwords (OTPs) directly to users’ mobile phones, ensuring secure access to your Atlassian applications. With the miniOrange 2FA app for Jira and Confluence, you can: Timestamps.

CVE-2025-59287: Critical WSUS Vulnerability Exploited in the Wild

Microsoft disclosed CVE-2025-59287 , a critical, unauthenticated RCE in Windows Server Update Services (WSUS) that lets attackers execute SYSTEM-level code via unsafe deserialization. In this video we break down how the exploit works, which servers are at risk, and real-world attack activity observed after the PoC went public.