Cloudflare Suffers Six-Hour Global Outage Disrupting Internet Routing

Related

Cybersecurity Leaders to Watch in Tennessee’s Financial Services Industry

Tennessee's financial services sector spans community banking, regional institutions,...

The CISOs Securing Tennessee’s Healthcare Sector

Tennessee's healthcare sector operates under some of the most...

Tycoon 2FA Loses Phishing Kit Crown Amid Surge in Attacks

What happened A law enforcement operation in early March seized...

Coast Guard’s New Cybersecurity Rules Offer Lessons for CISOs

What happened The US Coast Guard's first mandatory cybersecurity framework...

Ukraine Confirms Suspected APT28 Campaign Targeting Prosecutors and Anti-Corruption Agencies

What happened Ukrainian authorities have confirmed that several government agencies...

Share

What happened

On February 20, 2026, Cloudflare experienced a major global service outage that lasted just over six hours after a configuration change related to its Bring Your Own IP (BYOIP) feature inadvertently caused more than 1,100 IP prefixes to be withdrawn from global routing tables via Border Gateway Protocol (BGP), making those services unreachable from the public internet. 

Who is affected

Thousands of websites and applications that rely on Cloudflare’s content delivery, DNS, and edge network services were affected worldwide. The outage disrupted access to a broad mix of consumer apps, enterprise platforms, and online services, leading to failed connections and timeouts for end users. 

Why CISOs should care

The incident underscores the critical dependency many organizations have on third-party infrastructure providers. A routing misconfiguration at a major network edge provider can cascade rapidly, causing broad service degradation or downtime that impacts availability, user experience, and business operations — even in the absence of malicious activity. Operational resilience and third-party risk management must account for these systemic dependencies.

3 practical actions

  1. Reevaluate third-party risk frameworks: Ensure redundancy, failover plans, and contractual expectations for critical infrastructure providers like CDN and routing services.
  2. Implement multi-path networking: Use multi-CDN configurations and automated traffic steering to mitigate single-provider outages.
  3. Test incident response for external outages: Conduct tabletop exercises and simulations that include third-party service failures to strengthen preparedness and communication.