News

Latest news on the subject of B2B cyber security >>> PR agencies: Add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

DDoS attacks continue to rise
B2B Cyber ​​Security ShortNews

In the last quarter of 2024, DDoS attacks increased by 16 percent quarter-on-quarter and 83 percent year-on-year. About seven in ten of the HTTP DDoS attacks came from known botnets. In the other HTTP DDoS attacks, attackers disguised themselves as legitimate browsers, had suspicious or unusual HTTP attributes, or resorted to other means. Cloudflare has published the 20th edition of its DDoS Threat Report. The quarterly report provides a comprehensive analysis of the current threat landscape with regard to Distributed Denial of Service (DDoS) attacks, based on data from the Cloudflare network. The current report focuses…

Read more

Cybercrime: Current Threats and Tactics
Cybercrime: Current Threats and Tactics

A connectivity cloud provider is making its research data on global cybercrime available to the public. It has tracked down attackers targeting governments, the defense sector and critical infrastructure, and provides companies with insights to implement offensive and defensive security strategies. Cloudflare, announced that its threat intelligence team, Cloudforce One, which aims to make important threat intelligence available to a wider public, will publish its research results for the first time. Thanks to Cloudforce One's expertise and the performance of Cloudflare's global network - one of the largest in the world - IT security teams can now have timely...

Read more

IT security for everyone – free security tools
IT security for everyone - free security tools

A leading provider of connectivity cloud services is making several key security tools that are often expensive available to businesses for free, including access to its comprehensive Zero Trust platform that can automatically defend against some of the most well-known threats. One of the biggest hurdles to protecting a business is the cost of acquiring the tools needed to defend against today's sophisticated threat actors. The services required to do this have traditionally only been affordable for companies large enough to afford both the technology and the teams to implement it.

Read more

Post-Quantum Cryptography
B2B Cyber ​​Security ShortNews

IT security specialist Cloudflare announces the standard and free deployment of post-quantum cryptography to protect its websites, APIs, cloud tools and remote workers from future threats. This now allows all Cloudflare customers to smoothly enter the next era of cybersecurity standards—instantly and at no cost. Setting the course before things get serious Quantum computers solve complex arithmetic tasks many times faster than today's computers and are expected to reach such a sophisticated level in the next few years that they will be able to decrypt most of the encrypted data on the Internet. Recently, the administration of the US President...

Read more

Largest DDoS attack ever on Cloudflare network
B2B Cyber ​​Security ShortNews

Cyber ​​security company Cloudflare has detected and repelled dozens of DDoS attacks. Most attacks peaked at between 50 and 70 million requests per second (rps), with the largest attack exceeding 71 million rps. A few weeks ago, strangers attacked Cloudflare's network. However, the CDN provider was able to fend off the DDoS attack without further failures and redirected the requests to its large scrubbing center. These can easily record and analyze the attacks and sort out and block the malicious requests. However, normal requests to a page are forwarded. DDoS as a standard weapon DDoS is one of the oldest…

Read more

Do companies need a Chief Zero Trust Officer?
Do companies need a Chief Zero Trust Officer?

In recent years, ransomware and data breaches have caused tremendous disruption to organizations and governments. As companies drive digital transformation and move their operations to the cloud, they increasingly rely on a zero-trust model to create a resilient and secure network infrastructure. Do companies need a Chief Zero Trust Officer? Established as a cloud-based convergence of network access and security services, Secure Access Service Edge is a common approach for enterprise Zero Trust adoption. The challenge, however, is that in many…

Read more

Post-quantum cryptography for websites and APIs
B2B Cyber ​​Security ShortNews

Cloudflare has introduced support for post-quantum cryptography for all websites and APIs served over Cloudflare's network. With this, Cloudflare enables the support of post-quantum cryptography on almost 20% of the Internet. The use of quantum computers is steadily increasing. In the future, quantum computers will be able to decrypt encrypted communication. The problem: cryptography for every type of application (no matter how commonplace) has an expiration date: from email and online banking to medical records and government secrets. Thus, quantum computers potentially pose a major security challenge for companies, individuals and governments….

Read more

Zero Trust: Promotion with hardware security keys for MFA
Zero Trust: Promotion with hardware security keys for MFA

Cloudflare makes hardware security keys more accessible than ever to millions of customers and increases security with MFA. An exclusive offer has been created in collaboration with Yubico to end phishing attacks once and for all. Cloudflare, Inc. is the security, performance and reliability specialist dedicated to creating a better Internet. The company presents a new offering that makes physical security keys the most accessible and economical solution for customers to better protect their business and employees. Cloudflare customers can use security keys from Yubico, the leading provider of hardware security keys and thus the…

Read more

Zero Trust SIM for BYOD protects all traffic
Zero Trust SIM for BYOD protects all traffic

Cloudflare has introduced a new solution: Zero Trust SIM. This is the industry's first Zero Trust solution for securing mobile devices at the SIM level. This also allows end devices to be secured according to the BYOD principle and data traffic to be scanned for dangers. Cloudflare announced the development of the Cloudflare Zero Trust SIM - the first solution to secure every packet of data sent from a mobile device. With the Zero Trust SIM that Cloudflare developed, companies can quickly and securely connect their employees' devices to Cloudflare's global network. Organizations can view devices directly in Cloudflares...

Read more

0ktapus phishing campaign: 130 victims like Cloudflare or MailChimp  
0ktapus phishing campaign: 130 victims like Cloudflare or MailChimp

Group-IB has discovered that the recently uncovered 0ktapus phishing campaign targeting Twilio and Cloudflare employees was part of the massive attack chain that resulted in 9.931.000 accounts from over 130 organizations being compromised. The campaign was codenamed 0ktapus by researchers at Group-IB because it posed as a popular identity and access management service. The vast majority of victims are located in the United States, and many of them use Okta's identity and access management services. Group-IB Threat Intelligence teamdiscovered and analyzed the attackers' phishing infrastructure, including phishing domains, the phishing kit, and the...

Read more