{"id":2307,"date":"2023-09-30T11:03:46","date_gmt":"2023-09-30T09:03:46","guid":{"rendered":"https:\/\/certitude.consulting\/blog\/?p=2307"},"modified":"2023-10-25T08:04:26","modified_gmt":"2023-10-25T06:04:26","slug":"bleepingcomputer-september-30th-2023","status":"publish","type":"post","link":"https:\/\/certitude.consulting\/blog\/en\/bleepingcomputer-september-30th-2023\/","title":{"rendered":"BLEEPINGCOMPUTER &#8211; September 30th, 2023"},"content":{"rendered":"\n<p>Certitude&#8217;s researchers Florian Schweitzer and Stefan Proksch discovered that Cloudflare setups of many organizations are vulnerable to bypasses resulting from architectural weaknesses. BleepingComputer, one of the largest news portals globally for IT, covered Certitude&#8217;s research. The original article is available <a rel=\"noreferrer noopener\" href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/cloudflare-ddos-protections-ironically-bypassed-using-cloudflare\/\" data-type=\"link\" data-id=\"https:\/\/www.bleepingcomputer.com\/news\/security\/cloudflare-ddos-protections-ironically-bypassed-using-cloudflare\/\" target=\"_blank\">here<\/a>.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"841\" height=\"825\" src=\"https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2023\/10\/Cloudflare_1-1.png\" alt=\"\" class=\"wp-image-2310\" srcset=\"https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2023\/10\/Cloudflare_1-1.png 841w, https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2023\/10\/Cloudflare_1-1-300x294.png 300w, https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2023\/10\/Cloudflare_1-1-768x753.png 768w\" sizes=\"auto, (max-width: 841px) 100vw, 841px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"841\" height=\"862\" src=\"https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2023\/10\/Cloudflare_1.2.png\" alt=\"\" class=\"wp-image-2311\" srcset=\"https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2023\/10\/Cloudflare_1.2.png 841w, https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2023\/10\/Cloudflare_1.2-293x300.png 293w, https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2023\/10\/Cloudflare_1.2-768x787.png 768w\" sizes=\"auto, (max-width: 841px) 100vw, 841px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"841\" height=\"851\" src=\"https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2023\/10\/Cloudflare_2.png\" alt=\"\" class=\"wp-image-2312\" srcset=\"https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2023\/10\/Cloudflare_2.png 841w, https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2023\/10\/Cloudflare_2-296x300.png 296w, https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2023\/10\/Cloudflare_2-768x777.png 768w\" sizes=\"auto, (max-width: 841px) 100vw, 841px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"841\" height=\"916\" src=\"https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2023\/10\/Cloudflare_2.2.png\" alt=\"\" class=\"wp-image-2313\" srcset=\"https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2023\/10\/Cloudflare_2.2.png 841w, https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2023\/10\/Cloudflare_2.2-275x300.png 275w, https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2023\/10\/Cloudflare_2.2-768x836.png 768w\" sizes=\"auto, (max-width: 841px) 100vw, 841px\" \/><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Certitude&#8217;s researchers Florian Schweitzer and Stefan Proksch discovered that Cloudflare setups of many organizations are vulnerable to bypasses resulting from architectural weaknesses. BleepingComputer, one of the largest news portals globally for IT, covered Certitude&#8217;s research. The original article is available here.<\/p>\n","protected":false},"author":12,"featured_media":608,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[128],"tags":[411],"class_list":["post-2307","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-press","tag-press-en"],"_links":{"self":[{"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/posts\/2307","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/comments?post=2307"}],"version-history":[{"count":6,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/posts\/2307\/revisions"}],"predecessor-version":[{"id":2343,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/posts\/2307\/revisions\/2343"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/media\/608"}],"wp:attachment":[{"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/media?parent=2307"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/categories?post=2307"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/tags?post=2307"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}