Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security Week 2025: in review

Thank you for following along with another Security Week at Cloudflare. We’re extremely proud of the work our team does to make the Internet safer and to help meet the challenge of emerging threats. As our CISO Grant Bourzikas outlined in his kickoff post this week, security teams are facing a landscape of rapidly increasing complexity introduced by vendor sprawl, an “AI Boom”, and an ever-growing surface area to protect.

Cross-Border Data Compliance: Navigating Public Security Regulations in a Connected World

It is a significant benefit that the world is connected the way it is, with the potential for even greater interconnectivity. However, this has come at huge costs, too, considering the rise in the direct involvement of state actors engaged in cyber warfare. Against this background, nations have a more acute awareness of digital vulnerabilities, which has radiated into regulatory frameworks concerning cross-border data compliance.

How we standardized error handling at Vanta

‍ I love working in monolithic repositories. It fosters collaboration, code reuse, and knowledge sharing—some of my favorite aspects of engineering culture here. ‍ However, without guardrails, complexity can grow unchecked, making it harder to reason about the system as a whole. In early 2024, it was clear that our error handling strategies had fallen victim to this, and it was impacting the quality of our product.

Ultimate Guide: Leveraging Intelligence to Prevent Card Fraud

Card fraud is evolving—fast. With unauthorised payment card fraud surpassing £275 million in the first half of 2024, businesses face increasing financial and reputational risks. Fraudsters steal physical cards, breach databases, and exploit digital channels, making fraud a low-risk, high-reward crime. The consequences? Lost revenue, customer trust, and compliance fines, with the average UK data breach now costing £3.5 million.

Why Principle of Least Privilege Matters More Than Ever in a World of Backdoored Large Language Models (LLMs)

The concept of “principle of least privilege” has been around for a long time. In fact, it is older than me; there are papers from the 70s that discuss it: “Every program and every user of the system should operate using the least set of privileges necessary to complete the job.” (The protection of information in computer systems, Saltzer and Schroeder, 1974).

Streamline MSP operations: Application Control and OS Deployment features launched in Endpoint Central MSP Cloud

The landscape of managed service providers (MSPs) is constantly evolving, demanding greater efficiency and robust security. Today, we’re thrilled to announce a significant leap forward in our cloud-based MSP software: the release of Application Control and OS Deployment features in Endpoint Central MSP Cloud.

The Prime Cyber Battleground- How Hacktivists and APTs Are Intensifying Attacks

]India has emerged as the globe's number one cyberattack target, with advanced persistent threat (APT) groups and hacktivist groups escalating their cyber assaults. From denial-of-service (DDoS) attacks to high-profile data breaches, cybercriminals are exploiting vulnerabilities in India's rapidly digitizing landscape.

Nation-State Threat Actors Leverage Windows Shortcut Vulnerability

The newly found Windows shortcut vulnerability is now being actively exploited by state-sponsored Advanced Persistent Threat (APT) actors to execute covert malicious commands. According to new research conducted by Trend Micro's Zero Day Initiative (ZDI), the vulnerability, designated as ZDI-CAN-25373, is now being exploited by Chinese, Iranian, North Korean, and Russian threat actors for worldwide cyber espionage and data theft.

Google's $32B Multicloud Security Bet: What the Wiz Deal Means to the Market

In a record-breaking transaction that reflects the increasing importance of multicloud security, Google is to acquire cloud security giant Wiz in a whopping $32 billion all-cash deal. The largest deal by Google so far, the buyout marks a seismic step ahead in its cloud security offerings. As cyber threats continue to evolve at a record pace, businesses are looking for better, AI-driven solutions to protect their cloud-based digital properties.