Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

ASPA: making Internet routing more secure

Internet traffic relies on the Border Gateway Protocol (BGP) to find its way between networks. However, this traffic can sometimes be misdirected due to configuration errors or malicious actions. When traffic is routed through networks it was not intended to pass through, it is known as a route leak. We have written on our blog multiple times about BGP route leaks and the impact they have on Internet routing, and a few times we have even alluded to a future of path verification in BGP.

Bringing more transparency to post-quantum usage, encrypted messaging, and routing security

Cloudflare Radar already offers a wide array of security insights — from application and network layer attacks, to malicious email messages, to digital certificates and Internet routing. And today we’re introducing even more. We are launching several new security-related data sets and tools on Radar.

The Rise of Kratos: How the New Phishing-as-a-Service Kit Industrializes Cybercrime

By the end of 2026, over 90% of all credential compromise attacks are estimated to be enabled by modular Phishing-as-a-Service (PhaaS) kits like the sophisticated, global threat, Kratos. This aggressive platform has already begun reshaping the threat landscape. At its core, Phishing-as-a-Service (PhaaS) is a malicious cloud-based service that allows easier deployment of phishing attacks and faster updating of features as compared to traditional phishing and malware attacks.

Is OneDrive Safe? Microsoft's Security, Privacy, and Encryption

OneDrive is the most popular cloud storage for Windows due to its easy integration in the Microsoft ecosystem. However, like most big tech companies from the US, there are concerns about how these companies use, secure, and keep your data private, leading many to wonder is OneDrive safe if you want to store photos, documents, or videos in privacy.

30 Years of Partner Commitment and a Decade of 5-Star Recognition from CRN

We’re proud to share that WatchGuard has once again been recognized by the CRN as a 5-Star Award recipient in the 2026 CRN Partner Program Guide. This marks the tenth consecutive year WatchGuard has earned this prestigious distinction, an achievement that underscores our unwavering commitment to delivering a partner-first approach and empowering MSPs with the tools, support, and innovation they need to succeed.

External Penetration Testing Tools: A Purpose Built Guide

The classic external penetration testing takes a systematic approach that includes reconnaissance, enumeration, validation, and proof-of-concept exploitation. Enterprise security teams deploy comprehensive suites of tools across the entire application, offering full lifecycle testing, which loses value when the toolchain isn’t purpose-built for each testing phase.

Outsource Penetration Testing: What Actually Works in 2026

The traditional model to outsource penetration testing was to engage a consultant to perform a once-a-year test, receive a lengthy PDF report, and then start the cycle again. This model today means something quite different: organizations are hiring external security professionals as continuous partners who constantly test, integrate into development pipelines, and deliver results in real time. It has grown from a check-the-box compliance activity to an integral part of a serious security program.

Why Legal AI Governance Must Operate at the Point of Use

A recent report of a solicitor facing regulatory investigation after uploading client documents into ChatGPT is not an isolated incident. It is a visible symptom of a broader structural issue unfolding across highly regulated industries. Legal professionals operate under strict duties of confidentiality, and yet the tools reshaping their workflows are being adopted faster than governance and operational controls can keep pace. The challenge is not whether AI should be used in legal practice.

Why identity security is a production asset in manufacturing

When a production line stops, the clock starts ticking. In manufacturing environments I’ve worked in, every minute of downtime can translate into missed delivery commitments and revenue you’ll never see again. How long that outage lasts will be decided in the first few minutes, when identity ownership and decision authority are still being sorted out. That authority gap is easy to underestimate. Manufacturing leaders already plan extensively for physical disruption.