Cloudforce_One Profile Banner
Cloudforce One Profile
Cloudforce One

@Cloudforce_One

Followers
766
Following
4
Media
2
Statuses
38

The official threat intelligence account for @Cloudflare. Follow for threat research, incident assessments, WAF rule updates for emerging threats, and more.

Global
Joined July 2022
Don't wanna be here? Send us removal request.
@Cloudforce_One
Cloudforce One
6 days
Cloudflare Security Research Analysts: New WAF rule deployed! CVE-2025-59340 (JinJava) → RCE, full server compromise, potential lateral movement Read more about the full ruleset update:
Tweet card summary image
developers.cloudflare.com
Cloudflare WAF managed rulesets 2025-10-13 release
0
1
6
@Cloudforce_One
Cloudforce One
10 days
Today, we're announcing new incident response and advisory services. Our experts provide on-demand support to help organizations prepare for and recover from security crises.
Tweet card summary image
blog.cloudflare.com
We're launching Cloudforce One REACT, a team of expert security responders designed to eliminate the gap between perimeter defense and internal incident response. The team brings unmatched threat...
2
8
26
@Cloudforce_One
Cloudforce One
11 days
Our new protection stopped 1M attacks in the last 24 hours.
0
0
2
@Cloudforce_One
Cloudforce One
13 days
→ Predictable multipart boundary — HTTP Parameter Pollution (CVE-2025-7783) Read more about the full ruleset update:  https://t.co/BSVnO4Rj1t
Tweet card summary image
developers.cloudflare.com
Cloudflare WAF managed rulesets 2025-10-06 release
0
0
0
@Cloudforce_One
Cloudforce One
13 days
Cloudflare has deployed new WAF protections - including an emergency rule for Oracle E-Business Suite RCE (CVE-2025-61882), which can lead to full system compromise. Also covered: → Chaos Mesh unauthenticated in-cluster RCE (CVE-2025-59358/59359/59360/59361)
3
4
16
@Cloudforce_One
Cloudforce One
20 days
Cloudflare has rolled out new WAF rules to protect against: ->SimpleHelp Auth Bypass (CVE-2024-57727) ->Flowise Cloud Info Disclosure (CVE-2025-58434) ->WordPress Ditty Plugin SSRF (CVE-2025-8085) ->Vite Directory Traversal (CVE-2025-30208)
1
1
6
@Cloudforce_One
Cloudforce One
21 days
CVE-2025-20333 (9.9): Auth attacker → RCE → full takeover CVE-2025-20362 (6.7): Unauth attacker → VPN exposure CVE-2025-20363 (9.0): Critical RCE → malware, persistence, exfiltration
0
0
0
@Cloudforce_One
Cloudforce One
21 days
CVE-2025-20333 CVE-2025-20362 CVE-2025-20363 could be under active exploitation. Patch immediately. Cloudflare is actively monitoring and researching the CVEs, but in the meantime we deployed 2 aggressive rules (default off) for who wants to block access all together.
1
1
13
@Cloudforce_One
Cloudforce One
25 days
GoAnywhere MFT (CVE-2025-10035): Exploitation enables attackers to escalate privileges or achieve RCE via command injection. Read more about the full ruleset update: https://t.co/tKbwOSwiHw
Tweet card summary image
developers.cloudflare.com
Cloudflare WAF managed rulesets 2025-09-24 emergency release
0
0
0
@Cloudforce_One
Cloudforce One
25 days
From Cloudflare Security Research Analysts: Cloudflare has released new WAF rule to address the following CVE and strengthen customer protection:
1
0
6
@Cloudforce_One
Cloudforce One
27 days
Skyvern (CVE-2025-49619): Server-Side Template Injection (SSTI) → could lead to remote code execution. Adobe Commerce (CVE-2025-54236): Remote Code Execution (RCE) → could allow takeover of e-commerce platforms. Read more about the full ruleset update:
Tweet card summary image
developers.cloudflare.com
Cloudflare WAF managed rulesets 2025-09-22 release
0
0
0
@Cloudforce_One
Cloudforce One
27 days
Cloudflare has released new WAF rules addressing the following CVEs to enhance customer protection. Azure Networking (CVE-2025-54914): Elevation of Privilege → could allow full compromise of networking components.
1
0
1
@Cloudforce_One
Cloudforce One
1 month
UPDATE: Earlier today, the threat actor posted to their Telegram channel that they recovered their service. After we became aware of this, we took additional action against the the threat actor. We continue to work hand in hand with @MicrosoftDCU.
0
0
2
@Cloudforce_One
Cloudforce One
1 month
In partnership with Microsoft and law enforcement, we've disrupted RaccoonO365 — a sophisticated Phishing-as-a-Service enterprise targeting Microsoft credentials. Our new report outlines the coordinated action and technical details. Learn more: https://t.co/CybSJP7oXV
4
15
40
@Cloudforce_One
Cloudforce One
1 month
Sitecore (CVE-2025-53694): A sensitive information disclosure → Unauthorized access to sensitive information Read more about the full ruleset update: https://t.co/xfZsRkod6I
Tweet card summary image
developers.cloudflare.com
Cloudflare WAF managed rulesets 2025-09-15 release
0
0
2
@Cloudforce_One
Cloudforce One
1 month
Argo CD (CVE-2025-55190): Exposure of Sensitive Information → Could access sensitive credential information. DataEase (CVE-2025-57773): Unvalidated Input → JNDI Injection & Deserialization RCE
1
0
2
@Cloudforce_One
Cloudforce One
1 month
From Cloudflare Security Research Analysts: Cloudflare has released new WAF rules to address the following CVEs and strengthen customer protection:
1
0
5
@Cloudforce_One
Cloudforce One
1 month
🚨 Cloudflare Security Research Analysts have investigated the compromise to popular npm packages maintained by developer ~qix. We found no trace of impact to our enterprise Page Shield customers so far. Detection has since been deployed to score future matches as Malware.
1
9
33
@Cloudforce_One
Cloudforce One
1 month
- WordPress Plugin 'InfiniteWP Client' (CVE-2020-8772): Critical Authentication Bypass. Read more about the full ruleset update: https://t.co/QJPu8zbHzG
Tweet card summary image
developers.cloudflare.com
Cloudflare WAF managed rulesets 2025-09-08 release
0
2
4