Links
Add
https://aws.amazon.com/compliance/gdpr-center/?sc_channel=sm&sc_campaign=AWS_Security&sc_publisher=TWITTER&sc_country=Security%20&%20Identity&sc_geo=GLOBAL&sc_outcome=awareness&trk=_TWITTER&sc_content=security_blog_gdpr_center&linkId=50238985
https://aws.amazon.com/compliance/gdpr-center/?sc_channel=sm&sc_campaign=AWS_Security&sc_publisher=TWITTER&sc_country=Security%20&%20Identity&sc_geo=GLOBAL&sc_outcome=awareness&trk=_TWITTER&sc_content=security_blog_gdpr_center&linkId=50238985
Added 1 month ago
Broken
Disaster Recovery
https://aws.amazon.com/disaster-recovery/
AWS Elastic Disaster Recovery (AWS DRS) minimizes downtime and data loss with fast, reliable recovery of on-premises and cloud-based applications.
Added 1 month ago
Broken
https://aws.amazon.com/documentation/
https://aws.amazon.com/documentation/
Added 1 month ago
Broken
Added 1 month ago
Show HN: Interface for all digital aspects of my life
https://beepb00p.xyz/hpi.html
Pretzel: email encryption and provider-supplied functions are compatible –
https://blog.acolyer.org/2017/10/10/pretzel-email-encryption-and-provider-supplied-functions-are-compatible/amp/
Added 1 month ago
Wrapping up another Birthday Week celebration
https://blog.cloudflare.com/birthday-week-2024-wrap-up/
Recapping all the big announcements made during 2024’s Birthday Week.
Added 1 month ago
Cloudflare 1.1.1.1 Incident on July 14, 2025
https://blog.cloudflare.com/cloudflare-1-1-1-1-incident-on-july-14-2025/
On July 14th, 2025, Cloudflare made a change to our service topologies that caused an outage for 1.1.1.1 on the edge, resulting in downtime for 62 minutes for customers using the 1.1.1.1 public DNS Resolver as well as intermittent degradation of service for Gateway DNS.
We’re deeply sorry for this outage.
This outage was the result of an internal configuration error and not the result of an attack or a BGP hijack. In this blog post, we’re going to talk about what the failure was, why it occurred, and what we’re doing to make sure this doesn’t happen again.
Added 1 day ago
Cloudflare service outage June 12, 2025
https://blog.cloudflare.com/cloudflare-service-outage-june-12-2025/
Multiple Cloudflare services, including Workers KV, Access, WARP and the Cloudflare dashboard, experienced an outage for up to 2 hours and 22 minutes on June 12, 2025.
Added 1 month ago
Defending the Internet: how Cloudflare blocked a monumental 7.3 Tbps DDoS attack
https://blog.cloudflare.com/defending-the-internet-how-cloudflare-blocked-a-monumental-7-3-tbps-ddos/
In mid-May 2025, blocked the largest DDoS attack ever recorded: a staggering 7.3 terabits per second (Tbps).
Added 4 weeks ago
How Cloudflare auto-mitigated world record 3.8 Tbps DDoS attack
https://blog.cloudflare.com/how-cloudflare-auto-mitigated-world-record-3-8-tbps-ddos-attack/
Over the past couple of weeks, Cloudflare's DDoS protection systems have automatically and successfully mitigated multiple hyper-volumetric L3/4 DDoS attacks exceeding 3 billion packets per second (Bpps). Our systems also automatically mitigated multiple attacks exceeding 3 terabits per second (Tbps), with the largest ones exceeding 3.65 Tbps. The scale of these attacks is unprecedented.
Added 1 month ago
HPKE: Standardizing public-key encryption (finally!)
https://blog.cloudflare.com/hybrid-public-key-encryption
HPKE (RFC 9180) was made to be simple, reusable, and future-proof by building upon knowledge from prior PKE schemes and software implementations. It is already in use in a large assortment of emerging Internet standards and has a large assortment of interoperable implementations. This article provides an overview of this new standard, going back to discuss its motivation, design goals, and development process.
Improving your monitoring setup by integrating Cloudflare’s analytics data
https://blog.cloudflare.com/improving-your-monitoring-setup-by-integrating-cloudflares-analytics-data-into-prometheus-and-grafana/
Here at Labyrinth Labs, we put great emphasis on monitoring. Having a working monitoring setup is a critical part of the work we do for our clients.
Cloudflare's Analytics dashboard provides a lot of useful information for debugging and analytics purposes for our customer Pixel Federation. However, it doesn’t automatically integrate with existing monitoring tools such as Grafana and Prometheus, which our DevOps engineers use every day to monitor our infrastructure.
Added 1 month ago
Introducing Access for Infrastructure: SSH
https://blog.cloudflare.com/intro-access-for-infrastructure-ssh/
Access for Infrastructure, BastionZero’s integration into Cloudflare One, will enable organizations to apply Zero Trust controls to their servers, databases, Kubernetes clusters, and more. Today we’re announcing short-lived SSH access as the first available feature of this integration.
Added 1 month ago
Open-sourcing OpenPubkey SSH (OPKSSH): integrating single sign-on with SSH
https://blog.cloudflare.com/open-sourcing-openpubkey-ssh-opkssh-integrating-single-sign-on-with-ssh/
OPKSSH (OpenPubkey SSH) is now open-sourced as part of the OpenPubkey project. This enables users and organizations to configure SSH to work with single sign-on technologies like OpenID Connect, removing the need to manually manage & configure SSH keys without adding a trusted party other than your IdP.
Added 1 month ago
Unimog - Cloudflare’s edge load balancer
https://blog.cloudflare.com/unimog-cloudflares-edge-load-balancer/
Unimog is the Layer 4 Load Balancer for Cloudflare’s edge data centers. This post explains the problems it solves and how it works.
https://blog.cryptoaustralia.org.au/2017/11/15/favourite-block-lists-cryptoaustralia/
https://blog.cryptoaustralia.org.au/2017/11/15/favourite-block-lists-cryptoaustralia/
Wonk post: chosen ciphertext security in public-key encryption (Part 1) – A
https://blog.cryptographyengineering.com/2018/04/21/wonk-post-chosen-ciphertext-security-in-public-key-encryption-part-1/
In general I try to limit this blog to posts that focus on generally-applicable techniques in cryptography. That is, I don't focus on the deeply wonky. But this post is going to be an exception. Today, I'm going to talk about a topic that most "typical" implementers don't -- and shouldn't -- think about. Specifically:…
Added 1 month ago
https://blog.docker.com/2018/12/simplifying-kubernetes-with-docker-compose-and-friends/
https://blog.docker.com/2018/12/simplifying-kubernetes-with-docker-compose-and-friends/
This year at Microsoft Build, Docker will blend developer experience, security, and AI innovation with our latest product announcements. Whether you attend in person at the Seattle Convention Center or tune in online, you’ll see how Docker is redefining the way teams build, secure, and scale modern applications. Docker’s Vision for Developers At Microsoft Build...
Announcing Flux by Black Forest Labs: The Next Leap in Text-to-Image Models
https://blog.fal.ai/flux-the-largest-open-sourced-text2img-model-now-available-on-fal/
Experience Flux the largest open-source text-to-image model with 12B parameters, now on fal! Generate stunning visuals faster and with exceptional quality. Try the demo today!
Added 1 month ago
GitHub Actions Security Best Practices [cheat sheet included]
https://blog.gitguardian.com/github-actions-security-cheat-sheet/
Learn how to secure your GitHub Actions with these best practices! From controlling credentials to using specific action version tags, this cheat sheet will help you protect against supply-chain attacks. Don't let a malicious actor inject code into your repository - read now!
Added 1 month ago
Google announces Gemini CLI: your open-source AI agent
https://blog.google/technology/developers/introducing-gemini-cli-open-source-ai-agent/
Free and open source, Gemini CLI brings Gemini directly into developers’ terminals — with unmatched access for individuals.
Added 3 weeks ago
Netcat – All you need to know
https://blog.ikuamike.io/posts/2021/netcat/
Introduction Netcat is a tool that reads and writes data across network connections, using TCP or UDP protocol. Netcat has been referred to as the TCP/IP / networking swiss army knife. In this article we’ll look at different applications of netcat and how it can be useful in day to day activities of a pentester, security professional, sysadmin etc…
If you would like to test out these commands in a lab environment without the need to install them on your own machine have a look at my scenario on CYBERRANGES using the link below.
Added 1 month ago