Connect with us

Tech

Cloudflare says AI made 1,100 jobs obsolete, even as revenue hit a record high

Cloudflare on Thursday joined a growing list of tech companies — including Meta, Microsoft, and Amazon — that have reported increased revenue alongside massive layoffs, attributing both trends to their use of AI.

Cloudflare, which provides internet security and performance services to millions of websites worldwide, announced it was cutting its workforce by approximately 20%, which equates to 1,100 people, it said as part of its first quarter 2026 earnings report on Thursday.

“We’ve never done something like this in Cloudflare’s history,” co-founder and CEO Matthew Prince said Thursday on the quarterly conference call, marking the first mass layoff in the company’s 16-year history. The company is cutting people from all teams and geographies except for salespeople who carry revenue quotas, CFO Thomas Seifert detailed on the call.

The news of the workforce cuts came as the company reported quarterly revenues of $639.8 million, a 34% year-over-year increase and the highest single quarter in the company’s history. However, this was coupled with a loss of $62.0 million compared with losing $53.2 million in the year-ago quarter.

That widening loss, even as revenue surged, highlights a familiar paradox in Cloudflare’s story: The company is growing fast but has yet to turn a consistent profit. But the loss was a smaller percentage of revenue, and the quarter was coupled with a lot of other positive indicators. For instance, Cloudflare reported that it had over $2.5 billion in “remaining performance obligations,” a year-over-year growth of 34%. RPO is the favorite metric these days to indicate revenue under contract but not yet delivered.

Hence, Prince insisted, the 20% cuts were not to reduce expenses but were strictly because of its use of AI.

“Today’s actions are not a cost-cutting exercise or an assessment of individuals’ performance; they are about Cloudflare defining how a world-class, high-growth company operates and creates value in the agentic AI era,” Prince and Cloudflare co-founder and president, Michelle Zatlyn, wrote in a related blog post about the layoffs.

Techcrunch event

San Francisco, CA
|
October 13-15, 2026

Prince acknowledged on the call that even though Cloudflare has been selling AI-powered products, it was at first cautious about adopting AI itself.

“Internally, the tipping point was last November. At that point, across our teams, we began to see massive productivity gains, team members that were two, 10, even 100 times more productive than they had been before. It was like going from a manual to an electric screwdriver,” he described.

“Cloudflare’s usage of AI has increased by more than 600% in the last three months alone,” he added.

Image Credits:SEC filings; Cloudflare press releases /

Prince highlighted the internal use of AI coding, saying that virtually the entire R&D team is now using the company’s own Workers platform — a tool that lets developers build and run software directly on Cloudflare’s global network — including its vibe coding feature. He also noted that 100% of the code produced this way and deployed for use in Cloudflare’s products is “now reviewed by autonomous AI agents.”

But it’s not just developers who are using AI internally, he said. “Employees across the company from engineering to HR to finance to marketing run thousands of AI agent sessions each day to get their work done.”

As a result, these highly productive, AI-powered employees require fewer support staff, he argued.

“A lot of the support people that provide support behind them, those roles aren’t going to be the roles that, you know, drive companies going forward,” Prince said.

Interestingly, Prince says that Cloudflare “will continue to hire people, and we’ll continue to invest in them because the people that are embracing these tools are just so much more productive than we’d ever seen before. I would guess that in 2027 we’ll have more employees than we did at any point in 2026.”

Cloudflare said it ended its first quarter before layoffs with a headcount of about 5,500.

The pattern Prince described — deploying AI gains as justification for workforce reductions even during a period of strong revenue growth — is fast becoming a familiar script across the tech industry. Whether it reflects true structural transformation or acts as convenient cover for cost discipline is a question that investors and employees will be wrestling with for some time to come.

When asked by an analyst on the call why the company needed to cut so deeply after such a good quarter, Prince said, “Just because you’re fit doesn’t mean you can’t get fitter.”

When you purchase through links in our articles, we may earn a small commission. This doesn’t affect our editorial independence.

source

Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Tech

The fax machine is the bottleneck in US healthcare, and VCs are starting to notice

Like many AI companies automating work that humans currently do, Basata will eventually face a harder question about where the line is between augmenting workers and displacing them. For now, the founders say the administrative staff they work with aren’t worried about that; they’re more worried about drowning.
source

Continue Reading

Tech

US defense contractor who sold hacking tools to Russian broker ordered to pay $10M to former employers

Peter Williams, a veteran cybersecurity executive who was the head of the hacking and surveillance tech division of U.S. defense contractor L3Harris, has been ordered to pay $10 million to his former employer. Williams was the central figure in one of the worst leaks of advanced hacking tools in the history of the United States and its closest allies.

On Wednesday, a judge ordered Williams to pay that amount in restitution on top of the $1.3 million he had already been ordered to pay to L3Harris. Williams, a 39-year-old Australian citizen who previously worked in one of Australia’s intelligence agencies, was until last year the general manager of Trenchant. Born out of the acquisition of two sister startups, Trenchant is L3Harris’ division that develops advanced spyware and hacking tools and sells them to the U.S. government and its allies in the Five Eyes intelligence alliance, a coalition of five English-speaking nations that share classified intelligence with one another. In addition to the U.S., the alliance includes Australia, Canada, New Zealand, and the United Kingdom.

Veteran cybersecurity reporter Kim Zetter first reported the new order to pay restitution in her newsletter. 

Williams’ lawyers did not respond to a request for comment.

Last year, Williams was arrested and accused of stealing seven unspecified trade secrets — almost certainly cyber exploits, which is code that hijacks software vulnerabilities, and surveillance technology — from Trenchant and then selling them to Operation Zero. The Russian firm acts as a broker, buying and selling hacking tools, and it says it works exclusively with the Russian government and local companies.

Williams pleaded guilty and was sentenced to more than seven years in prison. 

Williams made $1.3 million selling the trade secrets, which he used to buy luxury watches, a house near Washington, D.C., and family vacations. Trenchant told prosecutors that it suffered losses of up to $35 million due to Williams’ theft. 

Techcrunch event

San Francisco, CA
|
October 13-15, 2026

U.S. prosecutors said Williams “betrayed” the United States and its allies by giving Operation Zero, which the U.S. government calls “one of the world’s most nefarious exploit brokers,” tools that could have been used to hack “millions of computers and devices around the world.” 

As TechCrunch previously reported, Williams took advantage of his privileged “full access” to Trenchant’s internal network to siphon the tools out of the company’s offices. After Williams sold the hacking tools to Operation Zero, some of them ended up being used by Russian government spies in Ukraine, and later Chinese cybercriminals, according to former L3Harris employees who recognized the stolen code in cybersecurity research that Google published after investigating the cyberattacks in which those tools were deployed.

Williams also tried to frame one of his employees for the theft.

When you purchase through links in our articles, we may earn a small commission. This doesn’t affect our editorial independence.

source

Continue Reading

Tech

Poland says hackers breached water treatment plants, and the US is facing the same threat

Poland’s intelligence service said it detected attacks on five water treatment plants where hackers could have taken control of the industrial equipment inside, including, in the worst case, tampering with the safety of the water supply.

The story is relevant beyond Poland’s borders: U.S. water infrastructure has faced similar threats in recent years. In 2021, a hacker briefly gained access to a water treatment plant in Oldsmar, Florida and attempted to increase the level of sodium hydroxide — a caustic chemical — to dangerous levels. The FBI and the U.S. Cybersecurity and Infrastructure Security Agency have since warned that water utilities remain a soft target for foreign hackers.

On Friday, Poland’s Internal Security Agency, the country’s top intelligence agency, published a report covering the last two years of the agency’s operations and threats the country faced. The report said Polish intelligence thwarted multiple acts of sabotage from Russian government spies and hackers, who targeted military facilities, critical infrastructure (essential systems such as power grids, water supplies, and transportation networks), as well as civilian targets. These attacks, according to the report, may have resulted in fatalities.  

“The most serious challenge remains the sabotage activity against Poland, inspired and organized by Russian intelligence services. This threat was (and is) real and immediate. It requires full mobilization,” read the report.

The report did not specify whether the hackers behind the attacks on the water treatment facilities were Russian government spies. But Poland has recently been the target of several attempts by Russian government hackers to attack its infrastructure, including a failed attempt to bring down the country’s energy grid. That breach was later attributed to poor security controls at the targeted facilities.

Poland’s experience is part of a growing global pattern of attacks on water and energy infrastructure. As recently as last month, a joint advisory from the Cybersecurity and Infrastructure Security Agency, the FBI, the NSA, and several other federal agencies warned that Iranian-backed hackers are actively targeting programmable logic controllers — the industrial computers that run water and energy facilities — at U.S. utilities. The same Iranian hacking group, CyberAv3ngers, previously broke into digital control panels at multiple U.S. water treatment plants in Pennsylvania in 2023, in attacks that federal agencies linked to escalating hostilities in the Middle East.

In other words, the attacks against Poland are not unique, they follow a strategy that the Russian government is applying both in war zones such as Ukraine, as well as against Western countries that it sees as longstanding enemies. The plan, according to Polish intelligence, is to destabilize and weaken the West, and cyberattacks and cyberespionage are just tools in a larger toolkit for Putin’s regime.

Techcrunch event

San Francisco, CA
|
October 13-15, 2026

When you purchase through links in our articles, we may earn a small commission. This doesn’t affect our editorial independence.

source

Continue Reading