Everything you care about in one place

Follow feeds: blogs, news, RSS and more. An effortless way to read and digest content of your choice.

Get Feeder

blog.cloudflare.com

The Cloudflare Blog

Get the latest updates from The Cloudflare Blog directly as they happen.

Follow now 198 followers

Latest posts

Last updated about 6 hours ago

Fixing request smuggling vulnerabilities in Pingora OSS deployments

about 7 hours ago

In December 2025, Cloudflare received reports of HTTP/1.x request smuggling vulnerabilities in...

Active defense: introducing a stateful vulnerability scanner for APIs

about 7 hours ago

Security is traditionally a game of defense. You build walls, set up...

Complexity is a choice. SASE migrations shouldn’t take years.

about 15 hours ago

For years, the cybersecurity industry has accepted a grim reality: migrating to...

From the endpoint to the prompt: a unified data security vision in Cloudflare One

3 days ago

Cloudflare One has grown a lot over the years. What started with...

Ending the "silent drop": how Dynamic Path MTU Discovery makes the Cloudflare One Client more resilient

4 days ago

You’ve likely seen this support ticket countless times: a user’s Internet connection...

How Automatic Return Routing solves IP overlap

5 days ago

The public Internet relies on a fundamental principle of predictable routing: a...

A QUICker SASE client: re-building Proxy Mode

5 days ago

When you need to use a proxy to keep your zero trust...

Always-on detections: eliminating the WAF “log versus block” trade-off

5 days ago

Traditional Web Application Firewalls typically require extensive, manual tuning of their rules...

Mind the gap: new tools for continuous enforcement from boot to login

5 days ago

One of our favorite ask-me-anything questions for company meetings or panels at...

Moving from license plates to badges: the Gateway Authorization Proxy

6 days ago

We often talk about the "ideal" state, one where every device has...

Stop reacting to breaches and start preventing them with User Risk Scoring

6 days ago

Most security teams spend their days playing a high-stakes game of Whac-A-Mole...

Defeating the deepfake: stopping laptop farms and insider threats

6 days ago

Trust is the most expensive vulnerability in modern security architecture. In recent...