
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[ The Cloudflare Blog ]]></title>
        <description><![CDATA[ Get the latest news on how products at Cloudflare are built, technologies used, and join the teams helping to build a better Internet. ]]></description>
        <link>https://blog.cloudflare.com</link>
        <atom:link href="https://blog.cloudflare.com/" rel="self" type="application/rss+xml"/>
        <language>en-us</language>
        <image>
            <url>https://blog.cloudflare.com/favicon.png</url>
            <title>The Cloudflare Blog</title>
            <link>https://blog.cloudflare.com</link>
        </image>
        <lastBuildDate>Mon, 06 Apr 2026 12:44:31 GMT</lastBuildDate>
        <item>
            <title><![CDATA[Network-Layer DDoS Attack Trends for Q1 2020]]></title>
            <link>https://blog.cloudflare.com/network-layer-ddos-attack-trends-for-q1-2020/</link>
            <pubDate>Fri, 15 May 2020 11:00:00 GMT</pubDate>
            <description><![CDATA[ In Q1 2020, traffic levels have increased by over 50% in many countries, but have DDoS attacks increased as well? ]]></description>
            <content:encoded><![CDATA[ <p></p><p>As we wrapped up the first quarter of 2020, we set out to understand if and how <a href="https://www.cloudflare.com/learning/ddos/what-is-a-ddos-attack/">DDoS attack</a> trends have shifted during this unprecedented time of global shelter in place. Since then, traffic levels have <a href="/recent-trends-in-internet-traffic/">increased by over 50%</a> in many countries, but have DDoS attacks increased as well?</p><p>Traffic increases are often observed during holiday seasons. During holidays, people may spend more time online; whether shopping, ordering food, playing online games or a myriad of other online activities. This higher usage translates into higher revenue per minute for the companies that provide those various online services.</p><p>Downtime or service degradation during these peak times could result in user churn and loss of significant revenue in a very short time. <a href="https://itic-corp.com/blog/2019/05/hourly-downtime-costs-rise-86-of-firms-say-one-hour-of-downtime-costs-300000-34-of-companies-say-one-hour-of-downtime-tops-1million/">ITIC estimates</a> that the average cost of an outage is $5,600 per minute, which extrapolates to well over $300K per hour. It is therefore no surprise that attackers capitalize on the opportunity by launching a higher number of DDoS attacks during the holiday seasons.</p><p>The current pandemic has a similar cause and effect. People are forced to stay home. They have become more reliant on online services to accomplish their daily tasks which has generated a surge in the Internet traffic and DDoS attacks.</p>
    <div>
      <h3>The Rise of Smaller, Shorter Attacks</h3>
      <a href="#the-rise-of-smaller-shorter-attacks">
        
      </a>
    </div>
    <p>Most of the attacks that we observed in Q1 2020 were relatively small, as measured by their bit rates. As shown in the figure below, in Q1 2020, 92% of the attacks were under 10 Gbps, compared to 84% in Q4 2019.</p><p>Diving deeper, an interesting shift can be observed in the distribution of attacks below 10 Gbps in Q1, as compared to the previous quarter. In Q4, 47% of <a href="https://www.cloudflare.com/learning/ddos/layer-3-ddos-attacks/">network-layer DDoS attacks</a> peaked below 500 Mbps, whereas in Q1 they increased to 64%.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/574LRbusrFwhDeWu5bzVXq/85d8589349814691f66243ed3210ef6f/BDES-618_Infographic-for-Network-Level-DDoS_BlogAsset_01.png" />
            
            </figure><p>From a packet rate perspective, the majority of the attacks peaked below 1 million packets per second (pps). This rate, along with their bit rate, indicates that attackers are no longer focusing their efforts and resources to generate high-rate floods -- bits or packets per second.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7wZR0vNSSRNKrERvbltwV0/5d4fe4164cf6db15253ac11b9afa46b9/BDES-618_Infographic-for-Network-Level-DDoS_BlogAsset_02_V2--1-.png" />
            
            </figure><p>However, it's not only the packet and bit rates that are decreasing, but also the attack durations. The figure below illustrates that 79% of DDoS attacks in Q1 lasted between 30 to 60 minutes, compared to 60% in Q4, which represents a 19% increase.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7hnIPPkGYmFY4qDliAFXlY/2d8efbc7330ca2f48f54176c2f168f8f/BDES-618_Infographic-for-Network-Level-DDoS_BlogAsset_03--1-.png" />
            
            </figure><p>These three trends could be explained by the following:</p><ul><li><p>Launching DDoS attacks is cheap and you don’t need much technical background. DDoS-as-a-service tools have provided a possible avenue for bad actors with little to no technical expertise to launch DDoS attacks quickly, easily, in a cost-effective manner and with limited bandwidth. According to <a href="https://securityaffairs.co/wordpress/57429/cyber-crime/cost-ddos-attack-service.html">Kaspersky</a>, DDoS attack services can cost as little as $5 for a 300-second attack (5 minutes). Additionally, amateur attackers can also easily leverage free tools to generate floods of packets. As we'll see in the next section, almost 4% of all DDoS attacks in Q1 were generated using variations of the publicly available Mirai code</p></li><li><p>While an attack under 10 Gbps might seem small, it can still be enough to affect underprotected Internet properties. Smaller and quicker attacks might prove to deliver a high ROI for attackers to extort a ransom from companies in lieu of not disrupting the availability of the Internet property.</p></li></ul>
    <div>
      <h3>Larger Attacks Still Persist, Albeit in Smaller Numbers</h3>
      <a href="#larger-attacks-still-persist-albeit-in-smaller-numbers">
        
      </a>
    </div>
    <p>While the majority of the attacks were under 10 Gbps, larger attacks are still prevalent. The below graph shows a trend in the largest bit-rate of network-layer DDoS attacks that Cloudflare has observed and mitigated in Q4 2019 and Q1 2020. The largest attack for the quarter was observed during March and peaked just above 550 Gbps.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7avGuCU21dX1aBgR3bQGXU/239d5dbe5ee8257ebeccff15c37bbf88/image-2.png" />
            
            </figure>
    <div>
      <h3>If At First You Don’t Succeed, Try, Try Again</h3>
      <a href="#if-at-first-you-dont-succeed-try-try-again">
        
      </a>
    </div>
    <p>A persistent attacker is one that does not give up when their attacks fail; they try and try again. They launch multiple attacks on their target, often utilizing multiple attack vectors. In the Q4 2019 holiday season, attackers persisted and launched as many as 523 DDoS attacks in one day against a single Cloudflare IP. Each Cloudflare IP under attack was targeted by as many as 4.6 DDoS attacks every day on average.</p><p>During Q1, as the world entered COVID-19 lockdown, we observed a significant increase in the number of attacks compared to the monthly average. The last time we saw such an increase was in the Q4 2019 holiday season. However, an interesting difference is that attackers seem less persistent now than during the holidays. In Q1 2020, the average persistence rate dropped as low as 2.2 attacks per Cloudflare IP address per day, with a maximum of 311 attacks on a single IP; 40% less than the previous holiday quarter.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/pS4m1PGR2eqZLgx6NgW1W/15b3f002a4aab9e0d9d9b7d7f5771a60/imageLikeEmbed.png" />
            
            </figure><p>Throughout the past two quarters, the average number of attack vectors employed in DDoS attacks per IP per day has been mostly steady at approximately 1.4, with a maximum of 10.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/56lKu9N0bvNtnLR2LPD4qp/30adf60a238c8773a82434fa31789e0a/imageLikeEmbed--2-.png" />
            
            </figure><p>Over the past quarter, we've seen over 34 different types of attack vectors on L3/4. SYN attacks formed the majority (60.1%) in Q1, followed by ACK attacks with 12.4%, and in third place, CLDAP (5.3%). Together, SYN &amp; ACK DDoS attacks (TCP) form 72% of all L3/4 attack vectors in Q1.</p>
    <div>
      <h3>Top Attack Vectors</h3>
      <a href="#top-attack-vectors">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/AUVpIjrfmwhoziUEQJgDn/f3bf4b76311b70c40c371b7b67891b58/image--1-.png" />
            
            </figure>
    <div>
      <h3>A Crisis is Unfortunately Sometimes a Malevolent Opportunity</h3>
      <a href="#a-crisis-is-unfortunately-sometimes-a-malevolent-opportunity">
        
      </a>
    </div>
    <p>The number of DDoS attacks in March 2020 increased as compared to January and February. Attackers found the crisis period to be an opportune time to launch an increased number of DDoS attacks, as illustrated below.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7xJH3mbLxgmv0eSwcMddpp/d116d5c379a16216f97d3221d661eca1/BDES-618_Infographic-for-Network-Level-DDoS_BlogAsset_07.png" />
            
            </figure><p>Furthermore, as various government authorities started mandating lockdowns and shelter-in-place orders, attackers resorted to increasing the number of large-sized attacks in the latter half of March. There were 55% more attacks observed in the second half of month (March 16-31) as compared to the first half (March 1-15). Additionally, 94% of attacks peaking at 300-400 Gbps were launched in the month of March.</p>
    <div>
      <h3>Stop DDoS attacks, Large or Small, Closer To The Source</h3>
      <a href="#stop-ddos-attacks-large-or-small-closer-to-the-source">
        
      </a>
    </div>
    <p>With the ever shifting DDoS landscape, it is important to have a DDoS protection solution which is comprehensive and adaptive. In context with the attack insights illustrated above, here’s how Cloudflare stays ahead of these shifts to protect our customers.</p><ul><li><p>As attacks shrink in rate and duration, Time To Mitigate SLAs as long as 15 minutes provided by legacy vendors are just not practical anymore. Cloudflare mitigates network layer DDoS attacks under 10 seconds in most cases, which is especially critical for the increasingly shorter attacks. Read more about the recent <a href="/rolling-with-the-punches-shifting-attack-tactics-dropping-packets-faster-cheaper-at-the-edge/">enhancements to our DDoS detection and mitigation systems</a> that allow us to automatically detect and mitigate DDoS attacks so quickly at scale.</p></li><li><p>An increasing number of <a href="/rolling-with-the-punches-shifting-attack-tactics-dropping-packets-faster-cheaper-at-the-edge/">DDoS attacks are localized</a>, which implies that legacy DDoS solutions which adopt a scrubbing center approach are not a feasible solution, as they are limited in their global coverage as well as act as a choke point, as DDoS traffic needs to be hauled back and forth from them. Cloudflare’s unique distributed architecture empowers every one of its data centers, spanning across 200 cities globally, to provide full DDoS mitigation capabilities.</p></li><li><p>Large distributed volumetric attacks still exist and are employed by resourceful attackers when the opportunity is rife. An attack exceeding 1 Tbps can be expected in the future, so the ability to mitigate large DDoS attacks is a key aspect of today’s DDoS solution. Cloudflare has one of the most interconnected networks in the world with a capacity of over 35 Tbps which allows it to mitigate even the largest DDoS attacks. This massive network capacity concomitant with the globally distributed architecture allows Cloudflare to mitigate attacks, both small and large, closer to the source.</p></li></ul><p>To learn more about Cloudflare’s DDoS solution <a href="https://www.cloudflare.com/plans/enterprise/contact/">contact us</a> or <a href="https://dash.cloudflare.com/sign-up">get started</a>.</p> ]]></content:encoded>
            <category><![CDATA[DDoS]]></category>
            <category><![CDATA[Trends]]></category>
            <category><![CDATA[COVID-19]]></category>
            <category><![CDATA[Magic Transit]]></category>
            <category><![CDATA[Speed & Reliability]]></category>
            <category><![CDATA[DDoS Reports]]></category>
            <guid isPermaLink="false">14KJ60XxOYz3T1EmPwS6GN</guid>
            <dc:creator>Omer Yoachimik</dc:creator>
            <dc:creator>Arun Singh</dc:creator>
        </item>
        <item>
            <title><![CDATA[DDoS attacks have evolved, and so should your DDoS protection]]></title>
            <link>https://blog.cloudflare.com/ddos-attacks-have-evolved-and-so-should-your-ddos-protection/</link>
            <pubDate>Thu, 30 Apr 2020 15:26:13 GMT</pubDate>
            <description><![CDATA[ Building a modern DDoS solution that is truly effective in thwarting ever-evolving DDoS attacks, to protect all of our customers has been a core tenet for us - enabling us to be an industry leader. ]]></description>
            <content:encoded><![CDATA[ <p></p><p>The proliferation of DDoS attacks of varying size, duration, and persistence has made DDoS protection a foundational part of every business and organization’s online presence. However, there are key considerations including network capacity, management capabilities, global distribution, alerting, reporting and support that security and risk management technical professionals need to evaluate when selecting a DDoS protection solution.</p>
    <div>
      <h3>Gartner’s view of the DDoS solutions; How did Cloudflare fare?</h3>
      <a href="#gartners-view-of-the-ddos-solutions-how-did-cloudflare-fare">
        
      </a>
    </div>
    <p>Gartner recently published the report Solution Comparison for DDoS Cloud Scrubbing Centers (ID G00467346), authored by Thomas Lintemuth, Patrick Hevesi and Sushil Aryal. This report enables customers to view a side-by-side solution comparison of different DDoS cloud scrubbing centers measured against common assessment criteria.  If you have a Gartner subscription, you can view the report <a href="https://www.gartner.com/document/3983636">here</a>. Cloudflare has received the greatest number of ‘High’ ratings as compared to the 6 other DDoS vendors across 23 assessment criteria in the report.</p>
    <div>
      <h3>The vast landscape of DDoS attacks</h3>
      <a href="#the-vast-landscape-of-ddos-attacks">
        
      </a>
    </div>
    <p>From our perspective, the nature of DDoS attacks has transformed, as the economics and ease of launching a DDoS attack has changed dramatically. With a rise in cost-effective capabilities of launching a DDoS attack, we have observed a rise in the number of under 10 Gbps DDoS network-level attacks, as shown in the figure below. Even though 10 Gbps from an attack size perspective does not seem that large, it is large enough to significantly affect a majority of the websites existing today.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2Ra5D7MmxLrRGPozCBPLvR/c2fb0687a97c9757da0e49d97f9d6d8e/image3-17.png" />
            
            </figure><p>At the same time, larger-sized DDoS attacks are still prevalent and have the capability of crippling the availability of an organization’s infrastructure. In March 2020, Cloudflare observed numerous 300+ Gbps attacks with the largest attack being 550 Gbps in size.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6OB9Z5DNZ7BWXFCVuzT367/2686a778cbe056a2f36b145f5f0c14b7/image2-22.png" />
            
            </figure><p>In the report Gartner also observes a similar trend, <i>“In speaking with the vendors for this research, Gartner discovered a consistent theme: Clients are experiencing more frequent smaller attacks versus larger volumetric attacks.</i>” In addition, they also observe that <i>“For enterprises with Internet connections up to and exceeding 10 Gbps, frequent but short attacks up to 10 Gbps are still quite disruptive without DDoS protection. Not to say that large attacks have gone away. We haven’t seen a 1-plus Tbps attack since spring 2018, but attacks over 500 Gbps are still common.”</i></p><p>Gartner recommends in the report to <i>“Choose a provider that offers scrubbing capacity of three times the largest documented volumetric attack on your continent.”</i></p><p>From an application-level DDoS attack perspective an interesting DDoS attack observed and mitigated by Cloudflare last year, is shown below. This HTTP DDoS attack had a peak of 1.4M requests per second, which isn’t highly rate-intensive. However, the fact that the 1.1M IPs from which the attack originated were unique and not spoofed made the attack quite interesting. The unique IP addresses were actual clients who were able to complete a TCP and HTTPS handshake.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2GpF3Jz6n0qYY1XxOwfNLv/bdc22fae5c1c5efb4ed6242ff967c6ad/image4-14.png" />
            
            </figure>
    <div>
      <h3>Harness the full power of Cloudflare’s DDoS protection</h3>
      <a href="#harness-the-full-power-of-cloudflares-ddos-protection">
        
      </a>
    </div>
    <p>Cloudflare’s cloud-delivered DDoS solution provides key features that enable security professionals to protect their organizations and customers against even the most sophisticated DDoS attacks. Some of the key features and benefits include:</p><ul><li><p><b>Massive network capacity</b>: With over 35 Tbps of network capacity, Cloudflare ensures that you are protected against even the most sophisticated and largest DDoS attacks. Cloudflare’s network capacity is almost equal to the total scrubbing capacity of the other 6 leading DDoS vendors combined.</p></li><li><p><b>Globally distributed architecture</b>: Having a few scrubbing centers globally to mitigate DDoS attacks is an outdated approach. As DDoS attacks scale and individual attacks originate from millions of unique IPs worldwide, it’s important to have a DDoS solution that mitigates the attack at the source rather than hauling traffic to a dedicated scrubbing center. With every one of our data centers across 200 cities enabled with full DDoS mitigation capabilities, Cloudflare has more points of presence than the 6 leading DDoS vendors combined.</p></li><li><p><b>Fast time to mitigation</b>: Automated edge-analyzed and edge-enforced DDoS mitigation capabilities allows us to mitigate attacks at unprecedented speeds. Typical time to mitigate a DDoS attack is less than 10s.</p></li><li><p><b>Integrated security:</b> A key design tenet while building products at Cloudflare is integration. Our DDoS solution integrates seamlessly with other product offerings including WAF, Bot Management, CDN and many more. A comprehensive and integrated security solution to bolster the security posture while aiding performance. No tradeoffs between security and performance!</p></li><li><p><b>Unmetered and unlimited mitigation:</b> Cloudflare offers unlimited and unmetered DDoS mitigation. This eliminates the legacy concept of ‘Surge Pricing,’ which is especially painful when a business is under duress and experiencing a DDoS attack. This enables you to avoid unpredictable costs from traffic.</p></li></ul><p>Whether you’re part of a large global enterprise, or use Cloudflare for your personal site, we want to make sure that you’re protected and also have the visibility that you need. DDoS Protection is included as part of every Cloudflare service. Enterprise-level plans include advanced mitigation, detailed reporting, enriched logs, productivity enhancements and fine-grained controls. Enterprise Plan customers also receive access to dedicated customer success and solution engineering.</p><p>To learn more about Cloudflare’s DDoS solution <a href="https://www.cloudflare.com/plans/enterprise/contact/">contact us</a> or <a href="https://dash.cloudflare.com/sign-up">get started</a>.</p><p>*Gartner “Solution Comparison for DDoS Cloud Scrubbing Centers,” Thomas Lintemuth,  Patrick Hevesi, Sushil Aryal, 16 April 2020</p> ]]></content:encoded>
            <category><![CDATA[DDoS]]></category>
            <category><![CDATA[Attacks]]></category>
            <category><![CDATA[Gartner]]></category>
            <category><![CDATA[Trends]]></category>
            <category><![CDATA[Network]]></category>
            <category><![CDATA[Speed & Reliability]]></category>
            <guid isPermaLink="false">2PeoRADj0aE5C25sWpAM9f</guid>
            <dc:creator>Arun Singh</dc:creator>
            <dc:creator>Omer Yoachimik</dc:creator>
        </item>
        <item>
            <title><![CDATA[Cloudflare’s protection against a new Remote Code Execution vulnerability (CVE-2019-16759) in vBulletin]]></title>
            <link>https://blog.cloudflare.com/cloudflares-protection-against-a-new-remote-code-execution-vulnerability-cve-2019-16759-in-vbulletin/</link>
            <pubDate>Sat, 28 Sep 2019 22:54:56 GMT</pubDate>
            <description><![CDATA[ Cloudflare has released a new rule as part of its Cloudflare Specials Rulesets, to protect our customers against a high-severity vulnerability in vBulletin.  A new zero-day vulnerability was discovered for vBulletin, a proprietary Internet forum software.  ]]></description>
            <content:encoded><![CDATA[ <p>Cloudflare has released a new rule as part of its Cloudflare Specials Rulesets, to protect our customers against a high-severity vulnerability in vBulletin.  </p><p>A new zero-day vulnerability was discovered for vBulletin, a proprietary Internet forum software. By exploiting this vulnerability, bad actors could potentially gain privileged access and control to the host servers on which this software runs, through Remote Code Execution (RCE).</p>
    <div>
      <h2>Implications of this vulnerability</h2>
      <a href="#implications-of-this-vulnerability">
        
      </a>
    </div>
    <p>At Cloudflare, we use three key indicators to understand the severity of a vulnerability 1) how many customers on Cloudflare are running the affected software 2) the Common Vulnerability Scoring System (CVSS) score, and 3) the OWASP Top 10, an open-source security framework.</p><p>We assess this vulnerability to be very significant as it has a CVSS score of 9.8/10 and affects 7 out of the 10 key risk areas of the <a href="https://www.owasp.org/index.php/Top_10-2017_Top_10">OWASP 2017 Top 10</a>.</p><p>Remote Code Execution is considered a type of injection, which provides the capability to potentially launch a catastrophic attack. Through RCE an attacker can gain privileged access to the host server that might be running the unpatched and vulnerable version of this software. With elevated privileges the attacker could perform malicious activities including discovery of additional vulnerabilities in the system, checks for misconfigured file permissions on configuration files and even delete logs to wipe out the possibility of audit trails to their activities.</p><p>We also have often observed attackers exploit RCE vulnerabilities to deploy malware on the host, make it part of a DDoS Botnet attack or exfiltrate valuable data stored in the system.</p>
    <div>
      <h2>Cloudflare’s continuously learning Firewall has you covered</h2>
      <a href="#cloudflares-continuously-learning-firewall-has-you-covered">
        
      </a>
    </div>
    <p>At Cloudflare, we continuously strive to improve the security posture of our customers by quickly and seamlessly mitigating vulnerabilities of this nature. Protection against common RCE attacks is a standard feature of Cloudflare's Managed Rulesets. To provide coverage for this specific vulnerability, we have deployed a new rule within our Cloudflare Specials Rulesets (ruleId: 100166). Customers who have our Managed Rulesets and Cloudflare Specials enabled will be immediately protected against this vulnerability.</p><p>To check whether you have this protection enabled, please login, navigate to the Firewall tab and under the Managed Rulesets tab you will find the toggle to enable the WAF Managed Rulesets. See below:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2oRuE3AturOHuORwrN7g1a/f5d01dfc0a4af320a4849e71c9d321a9/pasted-image-0-3.png" />
            
            </figure><p>Next, confirm that you have the Cloudflare Specials Rulesets enabled, by checking in the Managed Rulesets card as shown below:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7uvCe0gSqbwl5XiS4N8ojT/4ffbccce7a8b84f6e2967936906f89f6/pasted-image-0--1--2.png" />
            
            </figure><p>Our customers who use our free services or those who don't have Cloudflare's Managed Rulesets turned on, can also protect themselves by deploying a patch on their own. The vBulletin team have released a security patch, the details of which can be found <a href="https://forum.vbulletin.com/forum/vbulletin-announcements/vbulletin-announcements_aa/4422707-vbulletin-security-patch-released-versions-5-5-2-5-5-3-and-5-5-4">here</a>.</p><p>Cloudflare’s Firewall is built on a network that continuously learns from our vast network spanning over 190 countries. In Q2’19 Cloudflare blocked an average of 44 billion cyber threats each day. <a href="https://www.cloudflare.com/waf/">Learn</a> more about our simple, easy to use and powerful Cloudflare Firewall and protect your business today.</p> ]]></content:encoded>
            <category><![CDATA[Vulnerabilities]]></category>
            <category><![CDATA[WAF]]></category>
            <category><![CDATA[Security]]></category>
            <guid isPermaLink="false">h5BHJvPbIR5wZrnTd6XsZ</guid>
            <dc:creator>Alex Cruz Farmer</dc:creator>
            <dc:creator>Arun Singh</dc:creator>
        </item>
    </channel>
</rss>