
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[ The Cloudflare Blog ]]></title>
        <description><![CDATA[ Get the latest news on how products at Cloudflare are built, technologies used, and join the teams helping to build a better Internet. ]]></description>
        <link>https://blog.cloudflare.com</link>
        <atom:link href="https://blog.cloudflare.com/" rel="self" type="application/rss+xml"/>
        <language>en-us</language>
        <image>
            <url>https://blog.cloudflare.com/favicon.png</url>
            <title>The Cloudflare Blog</title>
            <link>https://blog.cloudflare.com</link>
        </image>
        <lastBuildDate>Wed, 15 Apr 2026 19:11:06 GMT</lastBuildDate>
        <item>
            <title><![CDATA[Killnet and AnonymousSudan DDoS attack Australian university websites, and threaten more attacks — here’s what to do about it]]></title>
            <link>https://blog.cloudflare.com/ddos-attacks-on-australian-universities/</link>
            <pubDate>Wed, 29 Mar 2023 11:10:13 GMT</pubDate>
            <description><![CDATA[ Over the past 24 hours, Cloudflare has observed HTTP DDoS attacks targeting university websites in Australia. Universities were the first of several groups publicly targeted by the pro-Russian hacker group Killnet and their affiliate AnonymousSudan, as revealed in a recent Telegram post ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/71imYZhzjgJ0CBHCdm80a8/27c197efb749c2d4814c210e68e73de4/image1-55.png" />
            
            </figure><p>Over the past 24 hours, Cloudflare has observed HTTP DDoS attacks targeting university websites in Australia. Universities were the first of several groups publicly targeted by the pro-Russian hacker group Killnet and their affiliate <a href="https://www.cloudflare.com/learning/ddos/glossary/anonymous-sudan/">AnonymousSudan</a>, as revealed in a recent <a href="https://twitter.com/FalconFeedsio/status/1639574349131677697?s=20">Telegram</a> post. The threat actors called for additional attacks against 8 universities, 10 airports, and 8 hospital websites in Australia beginning on Tuesday, March 28.</p><p>Killnet is a loosely formed group of individuals who collaborate via Telegram. Their Telegram channels provide a space for pro-Russian sympathizers to volunteer their expertise by participating in cyberattacks against western interests.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5n5WXHdc7GOAQWJKRjD8t6/ce76b71769d2a64c044d107fda890009/image2-4.jpg" />
            
            </figure><p><i>Figure: % of traffic constituting DDoS attacks for organizations in Australia</i></p><p>This is not the first time Cloudflare has reported on Killnet activity. On February 2,  2023 we noted in a <a href="/uptick-in-healthcare-organizations-experiencing-targeted-ddos-attacks/">blog</a> that a pro-Russian hacktivist group — claiming to be part of Killnet — was targeting multiple healthcare organizations in the US. In October 2022, Killnet called to attack US airport websites, and attacked the US Treasury the following month.</p><p>As seen with past attacks from this group, these most recent attacks do not seem to be originating from a single botnet, and the attack methods and sources seem to vary, suggesting the involvement of multiple individual threat actors with varying degrees of skill.</p><p>DDoS (Distributed Denial of Service) attacks often make headlines due to their ability to disrupt critical services. Cloudflare recently <a href="/cloudflare-mitigates-record-breaking-71-million-request-per-second-ddos-attack/">announced</a> that it had blocked the largest attack to date, which peaked at 71 million requests per second (rps) and was 54% higher than the previous record attack from June 2022.</p><p>DDoS attacks are designed to overwhelm networks with massive amounts of malicious traffic, and when executed correctly, can disrupt service or take networks offline. The size, sophistication, and frequency of attacks have been increasing over the past months.</p>
    <div>
      <h3>What is Killnet and AnonymousSudan?</h3>
      <a href="#what-is-killnet-and-anonymoussudan">
        
      </a>
    </div>
    <p><a href="https://en.wikipedia.org/wiki/Killnet">Killnet</a> is not a traditional hacking group: it does not have membership, it does not have tools or infrastructure, and it does not operate for financial gain. Instead, Killnet is a space for pro-Russian "hacktivist" sympathizers to volunteer their expertise by participating in cyberattacks against western interests. This collaboration happens entirely in the open via Telegram, where anyone is welcome to join.</p><p>Killnet was formed shortly after (and likely in response to) the IT Army of Ukraine, and it emulates their tactics. Most days, administrators of the Killnet telegram channel will put out a call for volunteers to attack some particular target. Participants share many different tools and techniques for launching successful attacks, and inexperienced individuals are often coached on how to launch cyber attacks by those who are more experienced.</p><p>AnonymousSudan is another nontraditional hacking group similar to Killnet who is ostensibly composed of Sudanese "hacktivists". The two groups have recently begun collaborating to attack various western interests.</p><p>Attackers, including from these groups, are becoming more audacious in  the size and scale of the organizations they are targeting. What this means for businesses, especially those with limited cyber resources, is an increasing threat level against vulnerable networks.</p><p>Organizations of all sizes need to be prepared for the eventuality of a significant DDoS attack against their networks. Detection and mitigation of attacks should ideally be automated as much as possible, because relying solely on humans to mitigate in real time puts attackers in the driver’s seat.</p>
    <div>
      <h3>How should I protect my organization against DDoS?</h3>
      <a href="#how-should-i-protect-my-organization-against-ddos">
        
      </a>
    </div>
    <p>Cloudflare customers are protected against DDoS attacks; our systems have been automatically detecting and mitigating the attack. Our team continues to monitor the situation and will deploy countermeasures as needed.</p><p>As an additional step of precaution, customers in the Education, Travel, and Healthcare industries are advised to follow the below recommendations.</p><ol><li><p>Ensure all other <a href="https://developers.cloudflare.com/ddos-protection/managed-rulesets/">DDoS Managed Rules</a> are set to default settings (High sensitivity level and mitigation actions).</p></li><li><p>Enterprise customers with Advanced DDoS should consider enabling <a href="https://developers.cloudflare.com/ddos-protection/managed-rulesets/adaptive-protection/">Adaptive DDoS Protection</a>.</p></li><li><p>Deploy <a href="https://developers.cloudflare.com/firewall/cf-firewall-rules/">firewall rules</a> and <a href="https://developers.cloudflare.com/waf/rate-limiting-rules/">rate-limiting rules</a> to enforce a combined positive and negative security model. Reduce the traffic allowed to your website based on your known usage.</p></li><li><p>Turn on <a href="https://developers.cloudflare.com/bots/get-started/free/">Bot Fight Mode</a> or the equivalent level (SBFM, Enterprise Bot Management) available to you.</p></li><li><p>Ensure your origin is not exposed to the public Internet, i.e., only enable access to Cloudflare IP addresses.</p></li><li><p>Enable <a href="https://developers.cloudflare.com/cache/">caching</a> as much as possible to reduce the strain on your origin servers, and when using <a href="https://workers.cloudflare.com/">Workers</a>, avoid overwhelming your origin server with more subrequests than necessary</p></li><li><p>Enable <a href="https://developers.cloudflare.com/ddos-protection/reference/alerts/">DDoS alerting</a>.</p></li></ol><p>As easy as it has become for the attackers to launch DDoS attacks, we want to make sure that it is even easier - and free - for defenders of organizations of all sizes to protect themselves against DDoS attacks of all types. We've been providing unmetered and unlimited DDoS protection for free to all of our customers since 2017. Cloudflare's mission is to help build a better Internet. A better Internet is one that is more secure, faster, and reliable for everyone - even in the face of DDoS attacks.</p><p>If you’d like to learn more about key DDoS trends, download the <a href="https://www.cloudflare.com/lp/ddos-trends-report/">Cloudflare DDoS Threat Report</a> for quarterly insights.</p> ]]></content:encoded>
            <category><![CDATA[Attacks]]></category>
            <category><![CDATA[Australia]]></category>
            <guid isPermaLink="false">6k60VUUDMX8YLNOHj1SJuI</guid>
            <dc:creator>Patrick R. Donahue</dc:creator>
            <dc:creator>Ben Munroe</dc:creator>
        </item>
        <item>
            <title><![CDATA[Cloudflare One vs Zscaler Zero Trust Exchange: who is most feature complete? It’s not who you might expect]]></title>
            <link>https://blog.cloudflare.com/cloudflare-one-vs-zscaler-zero-trust-exchange/</link>
            <pubDate>Fri, 24 Jun 2022 14:30:11 GMT</pubDate>
            <description><![CDATA[ How does Cloudflare One compare to Zscaler's Trust Exchange. Read on to find out. ]]></description>
            <content:encoded><![CDATA[ 
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/484f4I30CuPgNa0gWDI8vM/e2cbf8a22fbbe0de8a064630449bb804/Zero-Trust-Exchange.png" />
            
            </figure><p>Zscaler has been building out its security offerings for 15 years. Cloudflare is 13 years old, and we have been delivering Zero Trust for the last four. This sounds like we are a late starter — but in this post, we’re going to show that on total <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust</a>, <a href="https://www.cloudflare.com/learning/access-management/security-service-edge-sse/">SSE</a>, <a href="https://www.cloudflare.com/learning/access-management/what-is-sase/">SASE</a> and beyond, Cloudflare One functionality surpasses that of Zscaler Zero Trust Exchange.  </p>
<table>
<colgroup>
<col></col>
<col></col>
<col></col>
</colgroup>
<thead>
  <tr>
    <th><span>Functional Criteria Group</span></th>
    <th><span>Cloudflare</span></th>
    <th><span>Zscaler</span></th>
  </tr>
</thead>
<tbody>
  <tr>
    <td><span>Internet-native network platform</span></td>
    <td><span>100% </span>(5 of 5)</td>
    <td><span>20%</span> (1 of 5)</td>
  </tr>
  <tr>
    <td><span>Cloud-native service platform</span></td>
    <td><span>100% </span>(4 of 4)</td>
    <td><span>25% </span><span>(1 of 4)</span></td>
  </tr>
  <tr>
    <td><span>Services to adopt SASE</span></td>
    <td><span>83%</span><span> (5 of 6)</span></td>
    <td><span>66%</span> (4 of 6)</td>
  </tr>
  <tr>
    <td><span>Services to extend ZT, SSE, SASE and beyond</span></td>
    <td><span>66%</span><span> (8 of 12)</span></td>
    <td><span>58%</span> (7 of 12)</td>
  </tr>
  <tr>
    <td><span>Network on-ramps</span></td>
    <td><span>90%</span> (9 of 10)</td>
    <td><span>50% </span>(5 of 10)</td>
  </tr>
</tbody>
</table><p>This may come as a surprise to many folks. When we’ve shared this with customers, the question we’ve often received is: <i>How?</i> How has Cloudflare been able to build out a competitive offering so quickly?</p><p>Having built out the world’s largest programmable Anycast network has certainly been a big advantage. This was the foundation for Cloudflare’s existing application services business — which delivers secure, performant web and application experiences to customers all around the world. It’s given us deep insight into security and performance on the Internet. But not only was our infrastructure ready to address real customer problems at scale, but our serverless compute development platform — <a href="https://workers.cloudflare.com/">Workers</a> — was specifically designed to build globally distributed applications with security, reliability, and performance built in. We’ve been able to build on top of our platform to deliver Zero Trust services at an unmatched velocity — a velocity which we only expect to continue.</p><p>But we’ve also had another advantage that this timelines belies. So much has changed in the enterprise security space in the past 15 years. The idea of a performant global network like ours, for example, was not an assumption that could be made back then. When we started building out our Zero Trust offering, we had the benefit of a complete blank slate, and we’ve built out our offering on completely modern cloud assumptions.</p><p>But we know the reason you’re here — you want to see the proof. Here it is: we have released a new functional deep dive on our public page <a href="https://www.cloudflare.com/products/zero-trust/cloudflare-vs-zscaler/">comparing Zscaler and Cloudflare’s platforms</a>. Let’s share a sneak peek of two of the five criteria groups – services to adopt SASE and network on-ramps. Many criteria include footnotes in the <a href="https://cfl.re/cloudflare-vs-zscaler-functional">PDF</a> for added context and clarity (indicated by an *)</p>
<table>
<colgroup>
<col></col>
<col></col>
<col></col>
</colgroup>
<thead>
  <tr>
    <th><span>Network on-ramps</span></th>
    <th><span>Cloudflare</span></th>
    <th><span>Zscaler</span></th>
  </tr>
</thead>
<tbody>
  <tr>
    <td><span>Clientless browser-based access</span></td>
    <td>YES</td>
    <td><span>YES</span></td>
  </tr>
  <tr>
    <td><span>Device client software</span></td>
    <td><span>YES</span></td>
    <td><span>YES</span></td>
  </tr>
  <tr>
    <td><span>Application connector software*</span></td>
    <td><span>YES</span></td>
    <td><span>YES</span></td>
  </tr>
  <tr>
    <td><span>Branch connector software*</span></td>
    <td><span>NO</span></td>
    <td><span>YES</span></td>
  </tr>
  <tr>
    <td><span>Anycast DNS, GRE, IPsec, QUIC, Wireguard tunnels*</span></td>
    <td><span>YES</span></td>
    <td><span>NO</span></td>
  </tr>
  <tr>
    <td><span>Private network interconnect for data centers &amp; offices</span></td>
    <td><span>YES</span></td>
    <td><span>NO</span></td>
  </tr>
  <tr>
    <td><span>Inbound IP transit (BYOIP)</span></td>
    <td><span>YES</span></td>
    <td><span>NO</span></td>
  </tr>
  <tr>
    <td><span>IPv6-only connection support*</span></td>
    <td><span>YES</span></td>
    <td><span>NO</span></td>
  </tr>
  <tr>
    <td><span>Recursive DNS resolvers</span></td>
    <td><span>YES</span></td>
    <td><span>YES</span></td>
  </tr>
  <tr>
    <td><span>Device clients and DNS resolvers freely open to public*</span></td>
    <td><span>YES</span></td>
    <td><span>NO</span></td>
  </tr>
</tbody>
</table><p>While the <a href="https://cfl.re/cloudflare-vs-zscaler-functional">deep dive comparison of 37 functional criteria</a> shows we’re out in front, and <a href="https://www.cloudflare.com/products/zero-trust/cloudflare-vs-zscaler/">our page</a> explains why our architecture is simpler, more trusted, and faster to innovate — we also know there’s more to a product than a list of features. Given that zero trust gets rolled out across an entire organization, the experience of using the product is paramount. Here are three key areas where Cloudflare One surpasses the Zscaler Zero Trust Exchange for both end-users and administrators.</p>
    <div>
      <h4>1) Every service is built to run in every location at enterprise scale</h4>
      <a href="#1-every-service-is-built-to-run-in-every-location-at-enterprise-scale">
        
      </a>
    </div>
    <p><b>Claim:</b> Zscaler claims to run the “<a href="https://www.zscaler.com/company/about-zscaler">largest security cloud on the planet</a>” yet Zscaler's network is broken into at <a href="https://config.zscaler.com/zscaler.net/cenr">least 8 distinct clouds</a>, according to its own configuration resources: zscalertwo.net, zscalerthree.net, for example. On the front end, from a usability perspective, many clouds don’t make for a seamless administrator experience as each of Zscaler’s key offerings comes with its own portal and login, meaning you interact with each like a separate product rather than with one single “security cloud.”</p><p><b>The Cloudflare One advantage:</b> We are transparent about the size of our massive, global Anycast network and we report on the number of cities, not data centers. The location of our customers matter, and their ability to access every one of our services no matter where they are, matters. The number of cities in which we have data centers is more than 270 (all in the same <a href="https://www.cloudflare.com/learning/cloud/what-is-cloud-networking/">cloud network</a>) compared to Zscaler’s 55 cities (and remember — not all of these cities are in the same cloud network). Every service (and their updates and new features) on Cloudflare One is built to run on every server in every data center in every city, which is available to every one of our customers. And on the frontend, Cloudflare One provides one dashboard for all Zero Trust — <a href="https://www.cloudflare.com/learning/access-management/what-is-ztna/">ZTNA</a>, <a href="https://www.cloudflare.com/learning/access-management/what-is-a-casb/">CASB</a>, <a href="https://www.cloudflare.com/learning/access-management/what-is-a-secure-web-gateway/">SWG</a>, <a href="https://www.cloudflare.com/learning/access-management/what-is-browser-isolation/">RBI</a>, <a href="https://www.cloudflare.com/learning/access-management/what-is-dlp/">DLP</a>, and much more — solving the swivel chair problem by not spending time manually aligning policies and analytics isolated across separate screens.</p>
    <div>
      <h4>2) More throughput for improved end-user experience</h4>
      <a href="#2-more-throughput-for-improved-end-user-experience">
        
      </a>
    </div>
    <p>It’s no good offering great security if it slows and degrades user experience; seamless, frictionless, and <b>fast</b> access is critical to successful Zero Trust deployments — otherwise you will find your users looking for work arounds before you know it.</p><p>Zscaler states that they support “... a maximum bandwidth of 1 Gbps for each <a href="https://www.cloudflare.com/learning/network-layer/what-is-gre-tunneling/">GRE</a> [IP] tunnel if its internal IP addresses aren’t behind NAT.”  While most Internet applications and connections would hit a 1 Gbps network bottleneck somewhere in their path to the end user, some applications require more bandwidth and have been designed to support it — for example, users expect video streams or large file sharing to be as instant as anything else on the Internet. The assumption that there will be a bottleneck creates an artificial limit on the kinds of throughput that can be achieved, limiting throughput even when link speeds and connectivity can be guaranteed.</p><p><b>The Cloudflare One advantage:</b> We have spent a lot of time testing, and the results are clear: from an end-user perspective, performance on Cloudflare One is exceptional, and exceeds that of Zscaler.  We tested the throughput between two devices that were running a high-bandwidth application. These devices were located in different VPCs within a public cloud’s network, but they could also be on different subnets within an on-premise private network. Each VPC was configured to use Cloudflare’s Anycast IP tunnel as an on-ramp to Cloudflare’s network thereby enabling both devices to connect securely over Cloudflare One. And the throughput results recorded in both directions was 6 Gbps, which is significantly more capacity than the limits placed by Zscaler and others. So, your organization doesn’t need to worry that your new high-bandwidth application will be constrained by the Zero Trust platform you adopted.</p>
    <div>
      <h4>3) Better connected to the rest of the Internet</h4>
      <a href="#3-better-connected-to-the-rest-of-the-internet">
        
      </a>
    </div>
    <p>Zscaler claims to be the “fastest onramp to the Internet.” But this is a sleight of hand: an on-ramp is only one part of the equation; your data needs to transit the network, and also exit when it reaches its destination. Without fast, effective connectivity capabilities beyond the on-ramp, Zscaler is just an SSE platform and does not extend to SASE — translating this from initialism to English, Zscaler has not focused on the net working part of the platform.</p><p><b>The Cloudflare One advantage:</b> We have over 10,500 interconnection peers, which is an order of magnitude better. We don’t hand customers off at the edge like Zscaler. You can use Cloudflare’s virtual backbone for transit. The Cloudflare network routes over 3 trillion requests per day — providing Argo Smart Routing with a unique vantage point to detect real-time congestion and <a href="/argo-for-packets-generally-available/">route IP packets</a> across the fastest and most reliable network paths.</p><p>We started this blog writing about the importance of functionality and so let’s end there. All the peering and proven throughout advantages don’t matter as much without considering the services offered. And, while Zscaler claims to be able to eliminate the need for regional DC hubs by offering services such as SWG and ZTNA, they completely miss out on addressing organizations’ need to protect their cloud applications or on-premise servers end-to-end — including inbound traffic when they’re exposed to the Internet — using Web Application Firewalls, Load Balancing, Authoritative DNS, and DDoS Protection, exactly the space in which Cloudflare had its beginnings and now leads the pack.</p><p>In four years, we have surpassed Zscaler in completeness of offering including deployment simplicity, network resiliency and innovation velocity; <a href="https://www.cloudflare.com/products/zero-trust/cloudflare-vs-zscaler/">read the details here for yourself</a> and join us as we look to the next four years and beyond.</p> ]]></content:encoded>
            <category><![CDATA[Cloudflare One Week]]></category>
            <category><![CDATA[Cloudflare One]]></category>
            <category><![CDATA[Cloudflare Zero Trust]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[SASE]]></category>
            <guid isPermaLink="false">1wKwqsuYvsKmeB9YFLi4LP</guid>
            <dc:creator>Ben Munroe</dc:creator>
        </item>
    </channel>
</rss>