Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

AI, DDoS, and the Internet in 2025 | Cloudflare Radar Year in Review

In this special Year in Review episode of This Week in NET, host João Tomé is joined by David Belson to break down the Cloudflare Radar 2025 Year in Review. Together, they explore what Cloudflare’s global network reveals about how the Internet evolved over the past year — from the rapid rise of AI crawlers and agent traffic, to record-breaking DDoS attacks, the spread of post-quantum encryption, and the growing impact of government-directed shutdowns and outages.

Continuous Vendor Risk Monitoring: Real-Time Cyber Risk Visibility with Bitsight

Gain real-time visibility into cyber risks across your entire vendor ecosystem with Bitsight Continuous Monitoring. Continuously track third- and fourth-party security performance, uncover hidden vulnerabilities, and identify high-risk changes before they impact your business. Powered by the industry’s most comprehensive cyber risk data, Bitsight helps security and GRC teams respond faster to critical threats—including zero-day vulnerabilities—while improving vendor collaboration and strengthening overall supply chain resilience.

Migrating the ionCube Blog: Infrastructure, Automation, and a Fresh Start

WordPress. We love it. We know not everyone feels the same way. There are obvious reasons, one of which is the regular news (though not as regular as it used to be) of a plugin containing a vulnerability. Needless to say, that kind of news sucks. You have to admit though that WordPress has come a long way to make such things less sucky with an impactful auto update process. Unfortunately, the only kind of update which is beyond WordPress’s sphere is the back end, i.e. the AMP stack.

Critical React2Shell RCE Hits React and Next.js (CVE-2025-55182 / CVE-2025-66478)

React2Shell is a severe remote, unauthenticated RCE vulnerability recently uncovered in React Server Components (RSC) and the Next.js App Router — tracked as CVE-2025-55182, with CVE-2025-66478 later merged as a duplicate — that allows attackers to execute arbitrary code on servers by exploiting insecure Flight protocol deserialization (CWE-502), earning the flaw a maximum CVSS score of 10.0.

CISO Spotlight: Lefteris Tzelepis on Leadership, Strategy, and the Modern Security Mandate

Lefteris Tzelepis, CISO at Steelmet /Viohalco Companies, was shaped by cybersecurity. From his early exposure to real-world attacks at the Greek Ministry of Defense to building and leading security programs inside complex enterprises, his career mirrors the evolution of the CISO role itself. Now a group CISO overseeing security across multiple organizations, Lefteris brings a practitioner’s mindset to leadership and incident response.

Top tips: Secure your devices before you disconnect for the holidays

Top tips is a weekly column where we highlight what’s trending in the tech world and share ways to stay ahead. This week, as the holiday season rolls in and many of us finally take that much-needed break, let’s talk about something equally important: Stepping away from work safely. The holidays are all about resting–logging off and soaking in all the merry feelings. But to truly switch into that much-needed DND mode, it helps to secure your devices before you head out for the holidays.

Is This Endgame? How Takedowns Are Reshaping eCrime

In November 2025, a major public-private sector collaboration took down three significant malware networks. Operation Endgame involved law enforcement agencies from six EU countries, Australia, Canada, the U.K., and the U.S., along with Europol and 30 private sector partners, including CrowdStrike. The dismantled infrastructure consisted of hundreds of thousands of infected computers containing several million stolen credentials.

Episode 4 - Staying Curious: Lessons from 25 Years in Cybersecurity

In Episode 4 of Corelight Defenders, I sit down with Angela Loomis, Corelight's Director of Technical Account Management, to explore her remarkable 25-year journey in cybersecurity. Angela shares her unconventional entry into the field, starting from a background in television production to becoming a leader in security strategy. We delve into the importance of curiosity in cybersecurity, discussing how diverse experiences enrich the profession, and whether formal education might dampen that curiosity.