Almost all VPNs are vulnerable to traffic-leaking TunnelCrack attacks

Several vulnerabilities that affect most VPN products out there can be exploited by attackers to read user traffic, steal user information, or even attack user devices, researchers have discovered. “Our attacks are not computationally expensive, … Continue reading Almost all VPNs are vulnerable to traffic-leaking TunnelCrack attacks

Threat Actors Abuse Cloudflare Tunnel for Persistent Access, Data Theft

Threat actors have been observed abusing the open source Cloudflare Tunnel tool Cloudflared to maintain stealthy, persistent access to compromised systems.
The post Threat Actors Abuse Cloudflare Tunnel for Persistent Access, Data Theft appeared first … Continue reading Threat Actors Abuse Cloudflare Tunnel for Persistent Access, Data Theft

Cloudflare reports ‘alarming surge’ in DDoS sophistication, escalation in recent months

Attacks used to make websites and web services inaccessible are evolving and becoming more concerning, the company said Tuesday.

The post Cloudflare reports ‘alarming surge’ in DDoS sophistication, escalation in recent months appeared first on CyberScoop.

Continue reading Cloudflare reports ‘alarming surge’ in DDoS sophistication, escalation in recent months

Cloudflare joins forces with Databricks to enable organizations collaborate on live data

Cloudflare has partnered with Databricks to enable organizations to safely, simply, and affordably share and collaborate on live data. With Cloudflare and Databricks, joint customers can eliminate the complexity and dynamic costs that stand in the way … Continue reading Cloudflare joins forces with Databricks to enable organizations collaborate on live data

9 free cybersecurity whitepapers you should read

In today’s rapidly evolving digital landscape, organizations face constant cyber threats that can compromise their sensitive data, disrupt operations, and damage their reputation. Staying informed about the latest cyberattacks and understanding e… Continue reading 9 free cybersecurity whitepapers you should read

Infosec products of the month: May 2023

Here’s a look at the most interesting products from the past month, featuring releases from: Aqua Security, Axiado, Bitwarden, Cloudflare, ComplyAdvantage, Dashlane, Delinea, Enzoic, Feedzai, Immersive Labs, Intruder, Nebulon, NETSCOUT, Neurotechnology… Continue reading Infosec products of the month: May 2023

Which IP address would be most safe and suitable to use as a placeholder in a live system?

Is there a best practice IP address that is safe to use as a placeholder in a live public system on the Internet?
e.g. In a similar capacity, the domain name example.com is reserved and can be safely used without risk of this becoming som… Continue reading Which IP address would be most safe and suitable to use as a placeholder in a live system?

New infosec products of the week: May 19, 2023

Here’s a look at the most interesting products from the past week, featuring releases from Bitwarden, Cloudflare, ComplyAdvantage, Enzoic, Neurotechnology, Nozomi Networks, and Satori. ComplyAdvantage Fraud Detection identifies and prevents transaction… Continue reading New infosec products of the week: May 19, 2023