🌐 Cloudflare Threat Updates Why we're rethinking cache for the AI eraIntroducing EmDash — the spiritual successor to WordPress that solves plugin securityOur ongoing commitment to privacy for the 1.1.1.1 public DNS resolverIntroducing Programmable Flow Protection: custom DDoS mitigation logic for Magic Transit customers 🔴 Critical Alerts (CISA) Hackers Exploit CVE-2025-55182 to Breach 766 Next.js Hosts, Steal CredentialsCisco Patches 9.8 CVSS IMC and SSM Flaws Allowing Remote System CompromiseThreatsDay Bulletin: Pre-Auth Chains, Android Rootkits, CloudTrail Evasion & 10 More StoriesResearchers Uncover Mining Operation Using ISO Lures to Spread RATs and Crypto Miners 🧠 Threat Intelligence (Mandiant) vSphere and BRICKSTORM Malware: A Defender's GuideNorth Korea-Nexus Threat Actor Compromises Widely Used Axios NPM Package in Supply Chain AttackM-Trends 2026: Data, Insights, and Strategies From the FrontlinesThe Proliferation of DarkSword: iOS Exploit Chain Adopted by Multiple Threat Actors 🛡 Microsoft Security Updates Chromium: CVE-2026-5291 Inappropriate implementation in WebGLChromium: CVE-2026-5290 Use after free in CompositingChromium: CVE-2026-5289 Use after free in NavigationChromium: CVE-2026-5287 Use after free in PDF