Latest Tweets

Latest Ransomware and Zero Day

The Big Feed

  • On March 8, in honor of International Women’s Day, the ICITAP Engaging Multinational Police Women on Equality and Rights (EMPoWER) team joined counterparts from the U.S. Department of State Bureau of Counterterrorism to release a three-part podcast episode, which highlights both Departments’ joint work in advancing the Women, Peace, and Security Agenda. Led by an…

  • President Biden included a nod to a rising issue in the entertainment and tech industries during his State of the Union address Thursday evening, calling for a ban on AI voice impersonations. From a report: “Here at home, I have signed over 400 bipartisan bills. There’s more to pass my unity agenda,” President Biden said,…

  • Microsoft said Friday that its corporate network was attacked by the Russian hacker group Midnight Blizzard, also known as Nobelium, APT29 or Cozy Bear. This group is responsible for the SolarWinds attack in 2020, which affected many US government institutions. Microsoft detected the attack on January 12, 2024 and immediately took action to block it…

  • “No man is an island / Entire of itself.” This line, gifted to us by the English poet and cleric John Donne, still resonates centuries later in a digital economy where identity is everything — the key to the office, the password to an employee’s computer, or the credentials to access sensitive corporate data. 

  • Today’s HOT includes 22 ransomware victims by the notorious LockBit 3.0, Stormous, Qilin, INC Ransom, Medusa, Play, WereWolves, BianLian, DoNex and RansomHub gangs.

  • Magnet Goblin is a financially motivated threat actor demonstrating proficiency in swiftly exploiting 1-day software vulnerabilities to gain a foothold in target environments. Their opportunistic approach targets a range of edge devices and enterprise software, with primary tools including custom Linux malware and repurposed commercial software.

  • We have talked about Amazon’s Fire TV on countless occasions. One of the most interesting set-top boxes based on Android TV with a wide family of models for which we have provided all kinds of articles telling tricks, methods and tutorials to get their full potential. One of them, we already told it in this…

  • Key Highlights: – Rapid Exploitation of 1-Day Vulnerabilities: Threat actor group Magnet Goblin’s hallmark is its ability to swiftly leverage newly disclosed vulnerabilities, particularly targeting public-facing servers and edge devices. In some cases, the deployment of the exploits is within 1 day after a POC is published, significantly increasing the threat level posed by this…

  • Children are often asked, “What do you want to be when you grow up?” For the majority of individuals, professions such as teacher, nurse, pilot or astronaut were popular responses. However, for generation alpha, these responses have shifted to viral YouTube sensations or TikTok content creators due to today’s popularity of social media apps. So…

  • Attacks related to Domain Name System (DNS) infrastructure have been on the rise and most organizations aren’t prepared for the onslaught. In fact, a recent report by Enterprise Management Associates (EMA) found that less than 31% of organizations are confident in their DNS security.

  • If there’s one constant in cybersecurity, it’s that security leaders embrace new opportunities — and confront unprecedented challenges — with each new year. Emerging technologies, new attack vectors and even geopolitical crises shape the day-to-day evolution of the chief information security officer’s job. 

  • These are tense times in many workplaces. In the tech sector, 1,000 tech companies laid off more than 260,000 employees last year, with a recent New York Times headline declaring that tech layoffs are entering a new phase, which is to say more and more targeted layoffs. This continuation of the “Year of Efficiency” impacts…

  • Today, we’re excited to talk about URL Scanner, a tool that helps everyone from security teams to everyday users to detect and safeguard against malicious websites by scanning and analyzing them. URL Scanner has executed almost a million scans since its launch last March on Cloudflare Radar, driving us to continuously innovate and enhance its…

  • Cloudforce One is our threat operations and research team. Its primary objective: track and disrupt threat actors targeting Cloudflare and the customer systems we protect. Cloudforce One customers can engage directly with analysts on the team to help understand and stop the specific threats targeting them.

  • Today, we are excited to announce beta availability of Log Explorer, which allows you to investigate your HTTP and Security Event logs directly from the Cloudflare Dashboard. Log Explorer is an extension of Security Analytics, giving you the ability to review related raw logs. You can analyze, investigate, and monitor for security attacks natively within…

  • In the children’s book The Snail and Whale, after an unexpectedly far-flung adventure, the principal character returns to declarations of “How time’s flown” and “Haven’t you grown?” It has been about four years since we last wrote about LavaRand and during that time the story of how Cloudflare uses physical sources of entropy to add…

  • We constantly measure our own network’s performance against other networks, look for ways to improve our performance compared to them, and share the results of our efforts. Since June 2021, we’ve been sharing benchmarking results we’ve run against other networks to see how we compare.

  • Cloudflare Gateway, our secure web gateway (SWG), now supports the detection, logging, and filtering of network protocols regardless of their source or destination port. Protocol detection makes it easier to set precise policies without having to rely on the well known port and without the risk of over/under-filtering activity that could disrupt your users’ work.…

  • During 2021’s Birthday Week, we announced our Email Routing service, which allows users to direct different types of email messages (such as marketing, transactional, or administrative) to separate accounts based on criteria such as the recipient’s address or department. Its capabilities and the volume of messages routed have grown significantly since launch.

  • $11.5 trillion – the Gross Domestic Product (GDP) of the world’s third-largest economy after the United States and China. However, this is not a country. It’s the estimated cost of cybercrime to the world in 2023. This figure is estimated to reach $23.84 trillion by 2027 and shows no signs of slowing down. As the…