Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

API Attacks - The Hidden Threat to Your Digital Ecosystem

APIs are the connective tissue of the digital economy, silently enabling transactions, data exchanges, and automation across industries. Yet, as businesses rush to integrate APIs into every aspect of their operations, they often overlook a significant reality: APIs are rapidly becoming the most targeted attack vector in cybersecurity.

Password Management Best Practices for Employees

Weak employee passwords create significant security risks. According to Keeper Security’s Password Management Report, 34% of users reuse variations of strong passwords, which leaves systems vulnerable. Employees who reuse strong passwords – even with slight modifications – can jeopardize the security of sensitive data. To reduce risk, employees should develop smart habits to improve their password hygiene and minimize human error.

Protect AI-power apps with Cloudflare Firewall for AI

As organizations refactor applications and adopt AI and Large Language Models (LLMs) to power new applications and enhance existing services, a new class of security vulnerabilities has emerged. Traditional web application firewalls (WAFs) are only partially equipped to defend against threats unique to AI. In this video, we provide an overview of Cloudflare's Firewall for AI product, how it works, and how you can use it to protect AI models and safeguard user interactions with those models.

7 Best Practices for eCommerce Fraud Prevention

When it comes to the stress of dealing with eCommerce scams, digital business teams don’t need reminding. But the current and projected cost of eCommerce fraud is truly staggering. A study by Juniper Research, a leader in fintech insights, forecasts that eCommerce fraud is set to leap from $44.3 billion in 2024 to $107 billion by 2029. That’s stomach-churning 141% jump. Needless to say, eCommerce fraud prevention has never been a more pressing goal.

6 Core Components of an Alertless SOC Security Teams Should Know

The traditional approach to managing security operations centers (SOCs) is straining the mental and physical reserves of even the most skilled security analysts—while also failing to provide the protection organizations need against today’s threats. Analysts are left to respond to a never-ending stream of alerts, resulting in an overwhelming, reactive cycle that stifles proactive investigation and threat hunting.

Thoughts from Stablecon 2025: Stablecoins at an Inflection Point

This year at Stablecon 2025, I had the privilege of delivering the opening keynote on behalf of Fireblocks. We supported the inaugural event as title sponsor because we believe stablecoins are reaching a pivotal moment—and this gathering marked an important step toward shaping the conversations that will define the space. For us, it was also a moment to take stock of how far the ecosystem has come—and the role Fireblocks continues to play at the center of it.

US Offers $10 Million Reward for Tips About State-Linked RedLine Cybercriminals

How would you like to earn yourself millions of dollars? Well, it may just be possible - if you have information which could help expose the identities of cybercriminals involved with the notorious RedLine information-stealing malware. The US Department of State is offering up to US$10 million for information about the government-backed hackers believed to be behind RedLine malware attacks, which have included US critical infrastructure among their targets.

CCPA and GDPR: Key Differences in Website Privacy Compliance

The digital privacy landscape is defined largely by two leading regulatory frameworks: the California Consumer Privacy Act (CCPA) and the European Union’s General Data Protection Regulation (GDPR). For businesses with online operations, understanding how the CCPA and GDPR differ is more than just a legal necessity—it’s a strategic imperative.

Not All Surprises Are Sweet: 5 Hidden Cyber Threats

At first glance, a donut is harmless, maybe even delightful. But take a bite, and you might find something unexpected inside. Raspberry? Custard? Malware? Okay, maybe not malware (hopefully), but that’s exactly how many cyber threats operate: they hide in plain sight, waiting for the moment you drop your guard. This Donut Day, we’re taking a light-hearted look at five cyber threats that appear harmless but pack a punch.