Have you ever wondered if a website is legitimate or a scam? Watch this video to learn five easy ways you can check if a website is safe and how to avoid sketchy websites in the future.
A pretexting attack is a type of social engineering attack in which the threat actor persuades their target to reveal sensitive information or send money by making up a story – hence the word “pretext.” Learn more about pretexting attacks, how they work and how you can protect yourself.
What happens when real attackers target your infrastructure —and your team has to defend it in real time? This 24-minute cybersecurity documentary takes you inside a high-stakes Red Team vs Blue Team exercise, where Persistent Security simulates an advanced attack on Teleport’s Identity Security team. As the defenders race to detect, respond, and protect their systems, the film reveals the pressure, strategy, and human dynamics behind modern threat detection.
Welcome to the 22nd edition of the Cloudflare DDoS Threat Report. Published quarterly, this report offers a comprehensive analysis of the evolving threat landscape of Distributed Denial of Service (DDoS) attacks based on data from the Cloudflare network. In this edition, we focus on the second quarter of 2025. June was the busiest month for DDoS attacks in 2025 Q2, accounting for nearly 38% of all observed activity.
We are thrilled to announce that Cloudflare has been named a Visionary in the 2025 Gartner Magic Quadrant for Secure Access Service Edge (SASE) Platforms1 report. We view this evaluation as a significant recognition of our strategy to help connect and secure workspace security and coffee shop networking through our unique connectivity cloud approach. You can read more about our position in the report here.
HIPAA violations don’t always come from malicious attacks or headline-making data breaches. More often, they stem from everyday mistakes, like misdirected emails and vendors that aren’t as secure as they seem. Even small slip-ups can expose protected health information (PHI) and invite major consequences. In today’s complex compliance landscape, those mistakes are alarmingly common.
Security maturity means different things to different organizations, but the one constant is that it needs to be structured. By consistently assessing where you stand and where you need to go against a solid framework, you're able to take what seems like an impossible goal and break it down into achievable and actionable checkpoints that actually move the needle. The key to making this work isn't just having the right framework but making sure the right stakeholders are involved in the process.
As generative AI revolutionizes how we write software, it’s also reshaping how we secure it. Tools like GitHub Copilot and ChatGPT now allow developers to write functional applications with just a few prompts. This growing trend, dubbed “vibe coding,” represents a fundamental shift in development philosophy: developers rely on AI-generated code and focus more on ideas than implementation. This unlocks speed and creativity, but it also exposes new and serious security risks.
Rolling out 1Password across your company should be fast, simple, and secure. But if you’re an IT admin deploying to thousands of employees, it can quickly become tedious. That changes today. We’re excited to launch two powerful improvements to help enterprise teams roll out 1Password faster, more securely, and with more control: Let’s take a closer look.