Endigest logo
Endigest
All Tech BlogsExplore TagsSend Feedback
Newsletter
Endigest logo
Endigest

© 2026 Endigest. All rights reserved.

  • About
  • Privacy
  • Terms
  • Contact
  • RSS

Security Articles

Explore real-world engineering experiences from top tech companies.

필터 초기화
⌘K
AllFrontendBackendAI / MLML OpsDevOpsMobileArchitectureData EngSecurityProductCulture

Get the latest tech trends every morning

Receive daily AI-curated summaries of engineering articles from top tech companies worldwide.

  • 1
  • More pages
  • 18
  • 19
  • 20
  • More pages
  • 23
Google Cloud logoGoogle Cloud
012 min read
Security•2026-03-03

Coruna: The Mysterious Journey of a Powerful iOS Exploit Kit

Google Threat Intelligence Group (GTIG) identified "Coruna," a powerful iOS exploit kit targeting iPhones running iOS 13.0 through 17.2.1, containing 23 exploits across five full exploit chains.

Threat Intelligence
Cloudflare logoCloudflare
61 min read
Security•2026-03-03

Introducing the 2026 Cloudflare Threat Report

Cloudflare's 2026 Threat Report details a shift from brute-force attacks to high-trust exploitation, measured by attacker Measure of Effectiveness (MOE).

Threat Intelligence
Cloudforce One
Threats
Cloudflare logoCloudflare
21 min read
Security•2026-03-03

See risk, fix risk: introducing Remediation in Cloudflare CASB

Cloudflare CASB introduces Remediation, allowing customers to fix risky file-sharing configurations directly from the Cloudflare One dashboard without switching to each app's admin UI.

CASB
Microsoft 365
Google Workspace
Cloudflare One
SASE
SAAS Security
Cloudflare logoCloudflare
01 min read
Security•2026-03-03

How Cloudy translates complex security into human action

This post explains how Cloudflare's LLM-powered 'Cloudy' layer translates complex ML security signals into clear, actionable human-readable guidance within Cloudflare One.

Email Security
Security
Cloudflare One
CASB
Cloudflare logoCloudflare
21 min read
Security•2026-03-03

From reactive to proactive: closing the phishing gap with LLMs

Cloudflare describes how integrating LLMs into their email security pipeline shifts phishing detection from reactive to proactive by mapping the threat landscape at scale.

Email Security
Security
Cloudflare One
Zero Trust
Cloudflare logoCloudflare
21 min read
Security•2026-03-02

The truly programmable SASE platform

Cloudflare explains what true programmability means for their SASE platform, Cloudflare One, and how it enables real-time custom logic within security policies.

Cloudflare One
Zero Trust
SASE
Developer Platform
Cloudflare Workers
Cloudflare logoCloudflare
81 min read
Security•2026-03-02

Beyond the blank slate: how Cloudflare accelerates your Zero Trust journey

Cloudflare introduces Project Helix, an automated tool that configures its Cloudflare One SASE platform with best-practice Zero Trust policies in minutes instead of weeks.

Cloudflare One
Automation
Cloudflare logoCloudflare
71 min read
Security•2026-03-02

Modernizing with agile SASE: a Cloudflare One blog takeover

This post introduces Cloudflare One as an "agile SASE" platform designed to modernize corporate network security for the AI era.

Cloudflare One
SASE
HashiCorp logoHashiCorp
08 min read
Security•2026-02-27

Everything as code for your security lifecycle

This post explains the 'everything as code' approach to securing cloud infrastructure at scale, using HashiCorp tools.

Cloudflare logoCloudflare
31 min read
Security•2026-02-27

Toxic combinations: when small signals add up to a security incident

This post explains how Cloudflare identifies "toxic combinations" — converging minor signals that together indicate a security breach in progress.

Application Security
Cloudflare logoCloudflare
61 min read
Security•2026-02-27

Bringing more transparency to post-quantum usage, encrypted messaging, and routing security

Cloudflare introduces new security transparency tools on Radar covering post-quantum encryption, Key Transparency for E2EE messaging, and BGP routing security.

Radar
Security
Privacy
Post-Quantum
Routing
Research
Cloudflare logoCloudflare
41 min read
Security•2026-02-27

ASPA: making Internet routing more secure

This post introduces ASPA (Autonomous System Provider Authorization), a new cryptographic standard built on RPKI to validate BGP routing paths and prevent route leaks.

Security Week
BGP
RPKI
Routing
Routing Security
Radar

Trending This Week

#1
GitHub logoGitHub

Agent-driven development in Copilot Applied Science

11 views2026-03-31
#2
The Hacker News logoThe Hacker News

TrueConf Zero-Day Exploited in Attacks on Southeast Asian Government Networks

9 views2026-03-31
#3
The Hacker News logoThe Hacker News

Vertex AI Vulnerability Exposes Google Cloud Data and Private Artifacts

9 views2026-03-31
#4
Google Cloud logoGoogle Cloud

Spanner's multi-model advantage for the era of agentic AI

8 views2026-03-31
#5
Google Cloud logoGoogle Cloud

How AI-powered tools are driving the next wave of sustainable infrastructure and reporting

8 views2026-03-31
#6
Databricks logoDatabricks

What is a Cloud-Based Database Management System?

8 views2026-03-25