
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[ The Cloudflare Blog ]]></title>
        <description><![CDATA[ Get the latest news on how products at Cloudflare are built, technologies used, and join the teams helping to build a better Internet. ]]></description>
        <link>https://blog.cloudflare.com</link>
        <atom:link href="https://blog.cloudflare.com/" rel="self" type="application/rss+xml"/>
        <language>en-us</language>
        <image>
            <url>https://blog.cloudflare.com/favicon.png</url>
            <title>The Cloudflare Blog</title>
            <link>https://blog.cloudflare.com</link>
        </image>
        <lastBuildDate>Wed, 08 Apr 2026 23:30:09 GMT</lastBuildDate>
        <item>
            <title><![CDATA[How Cloudy translates complex security into human action]]></title>
            <link>https://blog.cloudflare.com/cloudy-upgrades-for-cloudflare-one/</link>
            <pubDate>Tue, 03 Mar 2026 06:00:00 GMT</pubDate>
            <description><![CDATA[ Cloudy is our LLM-powered explanation layer built directly into Cloudflare One. Its explanations, now part of Phishnet and API CASB, can improve user decisions and SOC efficiency. ]]></description>
            <content:encoded><![CDATA[ <p>Today’s security ecosystem generates a staggering amount of complex telemetry. For instance, processing a single email requires analyzing sender reputation, authentication results, link behavior, infrastructure metadata, and countless other attributes. Simultaneously, <a href="https://www.cloudflare.com/sase/products/casb/"><u>Cloud access security broker (CASB)</u></a> engines continuously scan SaaS environments for signals that detect misconfigurations, risky access, and exposed data.</p><p>But while detections have become more sophisticated, explanations have not always kept pace.</p><p>Security and IT teams are often aware when something is flagged, but they do not always know, at a glance, why. End users are asked to make real-time decisions about emails that may impact the entire organization, yet they are rarely given clear, contextual guidance in the moment that matters.</p><p><a href="https://developers.cloudflare.com/fundamentals/reference/cloudy-ai-agent/"><u>Cloudy</u></a> changes that.</p><p>Cloudy is our LLM-powered explanation layer, built directly into Cloudflare One. It translates complex machine learning outputs into precise, human-readable guidance for security teams and end users alike. Instead of exposing raw technical signals, Cloudy surfaces the reasoning behind a detection in a way that drives informed action.</p><p>For <a href="https://www.cloudflare.com/en-au/sase/products/email-security/"><u>Cloudflare Email Security</u></a>, this means helping users understand why a message was flagged before they escalate it to the security operations center, or SOC. For Cloudflare CASB, it means helping administrators quickly understand the risk and remediation path for SaaS findings without having to manually assess low-level signals.</p><p>This post outlines how we are extending Cloudy across <a href="https://developers.cloudflare.com/cloudflare-one/email-security/settings/phish-submissions/"><u>Phishnet</u></a> and API CASB to improve decision making, reduce unnecessary noise, and turn complex security signals into clear, actionable insight.</p>
    <div>
      <h2>Cloudy for Email Security users</h2>
      <a href="#cloudy-for-email-security-users">
        
      </a>
    </div>
    <p>When an email is analyzed by <a href="https://www.cloudflare.com/sase/products/email-security/"><u>Cloudflare Email Security</u></a>, it is not evaluated by a single signal or model. Instead, a wide range of machine learning models analyze different parts of the message, from sender reputation and message structure to content, links, and behavioral patterns. This model set continues to grow as our machine learning team regularly trains and deploys new detections to keep pace with evolving threats.</p><p>Based on this analysis, messages are labeled with outcomes such as Malicious, Suspicious, Spam, Bulk, or Spoof. While these detections have been effective, we consistently heard feedback from customers that it was not always clear why a message was flagged. The decision was correct, they told us —  but the reasoning behind it was often opaque to both end users and security teams.</p><p>To address this, we introduced the first version of <a href="https://blog.cloudflare.com/cloudy-driven-email-security-summaries/"><b><u>Cloudy</u></b><u>: LLM-powered summaries for detections</u></a>. These summaries translate what our machine learning models are seeing into human readable explanations. Initially, these summaries were available in the Cloudflare dashboard to help SOC teams during investigations. Over the past few months, customer feedback has confirmed that these explanations significantly improve understanding in our detections.</p><p>As we continued speaking with customers, another challenge surfaced. Our <b>Phishnet</b> tool allows users to submit messages to the SOC when they believe an email may be suspicious. While this empowers employees to participate in security, many SOC teams told us their queues were being flooded with submissions that turned out to be clean messages.</p><p>The result was unnecessary backlog and slower response times for emails that actually required investigation.</p><p>At the same time, customers told us that traditional security awareness training was not always enough. Users still struggled to evaluate emails in the moment, when it mattered most. They wanted more contextual guidance directly within the workflow where decisions are made.</p><p>This upgrade is designed to address both of these problems. By bringing clearer explanations and contextual education directly into Phishnet, we aim to help users make better decisions while reducing noise for SOC teams, without sacrificing security.</p>
    <div>
      <h3>The problem: Some users flag too many emails, while some aren’t cautious enough</h3>
      <a href="#the-problem-some-users-flag-too-many-emails-while-some-arent-cautious-enough">
        
      </a>
    </div>
    <p>As organizations and attack techniques have evolved, so has the role of the end user. Modern email threats increasingly rely on social engineering, subtle impersonation, and psychological pressure which places users directly in the decision path.</p><p>In response, users are being asked to act as an additional layer of defense. However, traditional security awareness tools often fall short. Training is typically delivered through periodic sessions or simulated phishing campaigns, disconnected from real messages and real decisions. When users encounter an unfamiliar email, they are left without enough context to confidently assess risk.</p><p>This gap commonly leads to one of two outcomes. Some users submit nearly every questionable message to the SOC, creating excessive noise and slowing down investigations. Others interact with messages they should not, simply because nothing in the moment signals clear risk.</p><p><b>By embedding Cloudy directly into Phishnet, we close this gap. </b></p><p>Users receive immediate, contextual explanations that help them understand what Cloudflare is seeing and why a message may be risky. This enables users to make informed decisions at the point of interaction, reduces unnecessary escalations to the SOC, and allows security teams to focus on the messages that truly require attention.</p><p>Over time, this approach shifts users from being a source of noise to becoming an effective part of the detection and response workflow. The result: stronger email security, without adding friction or burden to security teams.</p>
    <div>
      <h3>Phishnet for Microsoft gets a Cloudy upgrade</h3>
      <a href="#phishnet-for-microsoft-gets-a-cloudy-upgrade">
        
      </a>
    </div>
    <p>In the next month, we will be upgrading our Phishnet reporting button to extend the Cloudy summaries.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6dO9TV4MfE2R0YZ035QQ7/3693156d65a4c8aca4b2b9d57e77ce87/image1.png" />
          </figure><p><sub><i>The new Phishnet screens will show Cloudy summaries.</i></sub></p><p>With this upgrade, end users receive a simplified, user-friendly version of Cloudy summaries at the moment they report a message. These summaries are generated in real time using Cloudflare Workers AI and run directly on Cloudflare’s global Workers platform when a user interacts with a message in Phishnet.</p><p>When a user clicks the Phishnet reporting button, the request triggers a Workers-based workflow that aggregates structured outputs from multiple detection models associated with that message. These model outputs include signals such as sender reputation, domain and infrastructure characteristics, authentication results, link and content analysis, and behavioral indicators collected during message processing.</p><p>The aggregated signals are then passed to Workers AI, where a series of purpose-built prompts generate a natural language explanation. Each prompt is designed to transform low-level detection outputs into a concise and human-readable summary. This process focuses on explanation rather than classification and does not alter the original disposition of the message.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5PSAZclxFkdcvSivalmoCn/b355e9e6cf667e6e8e9587f6946db5c6/image6.png" />
          </figure><p><sub><i>How Cloudy transforms detections into clear explanations.</i></sub></p><p>For this experience, we intentionally redesigned the summaries compared to those shown to administrators in the Cloudflare dashboard. During testing, we found that admin-focused summaries often relied on technical concepts that were difficult for non-technical users to interpret. Terms such as ASNs, IP reputation, or authentication failures required translation. </p><p>To ensure end users can understand the summaries, Phishnet emphasizes plain-language explanations while preserving the meaning of the underlying detections.</p><table><tr><td><p><b>Signal</b></p></td><td><p><b>What it means</b></p></td><td><p><b>Cloudy translation for end users</b></p></td></tr><tr><td><p>SPF Fail</p></td><td><p>Sender explicitly not authorized by SPF</p></td><td><p>This email failed a sender verification check.</p></td></tr><tr><td><p>DKIM Fail</p></td><td><p>Message signature does not validate</p></td><td><p>The message integrity check failed, which can be a sign of tampering.</p></td></tr><tr><td><p>DMARC Fail</p></td><td><p>DMARC policy check failed</p></td><td><p>The sender’s domain could not confirm this email is legitimate.</p></td></tr><tr><td><p>Reply to Mismatch</p></td><td><p>Reply To differs from From</p></td><td><p>Replies may go to a different address than the sender shown.</p></td></tr><tr><td><p>Domain Age</p></td><td><p>Domain recently registered</p></td><td><p>The sender domain is newly created, which is common in phishing.</p></td></tr><tr><td><p>URL Low Reputation</p></td><td><p>Destination URL has poor reputation</p></td><td><p>The link destination has signals associated with risk.</p></td></tr></table><p>Because this workflow runs on the Cloudflare Workers platform, summaries are generated with low latency and at global scale — so users receive immediate feedback at the moment of interaction. This real-time context allows users to better understand why an email may be risky or why it appears safe before deciding whether to escalate it to the SOC.</p><p>We are currently beta testing this experience with Microsoft customers to ensure the summaries are accurate and reliable. <b>Cloudy summaries are not trained on customer data.</b> We are also applying additional validation to ensure the generated explanations do not hallucinate. Accuracy is critical at this stage as incorrect guidance could introduce real security risk.</p><p>Following the beta period, we plan to expand access to all Microsoft users. We will also bring similar upgrades to the Phishnet sidebar for Google Workspace users later in 2026.</p>
    <div>
      <h2>Your CASB findings, explained with Cloudy</h2>
      <a href="#your-casb-findings-explained-with-cloudy">
        
      </a>
    </div>
    <p>But helping end users better understand what makes an email risky is only part of the story. We are also applying Cloudy to the administrative side of security operations, where clarity and speed matter just as much. Beyond Phishnet, Cloudy now translates complex CASB findings into structured explanations that help security and IT teams quickly understand risk, prioritize remediation, and take confident action across their SaaS environments.</p>
    <div>
      <h3>API CASB in the wild</h3>
      <a href="#api-casb-in-the-wild">
        
      </a>
    </div>
    <p>Inside <a href="https://www.cloudflare.com/sase/"><u>Cloudflare One</u></a>, our SASE platform, CASB connects to the SaaS and cloud tools your teams already use. By talking to providers over API, CASB gives security and IT teams:</p><ul><li><p>A consolidated view of misconfigurations, overshared files, and risky access patterns across apps like Microsoft 365, Google Workspace, Slack, Salesforce, Box, GitHub, Jira, and Confluence (<a href="https://developers.cloudflare.com/cloudflare-one/applications/scan-apps/casb-integrations/"><u>CASB Integrations</u></a>).</p></li><li><p>Continuous scanning for new issues as users collaborate, share, and adopt new tools.</p></li><li><p>Findings that are organized, searchable, and exportable for triage and reporting.</p></li></ul>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1CH5fnjMQL3oK5PdF9F1bT/d34abcaa64d536cd8706a407f20ba2a9/image2.png" />
          </figure><p><sub><i>A typical CASB Findings page showing detections for a Microsoft 365 finding.</i></sub></p>
    <div>
      <h3>Making SaaS security straightforward</h3>
      <a href="#making-saas-security-straightforward">
        
      </a>
    </div>
    <p>Until now, understanding what exactly triggered a CASB Finding — the detections that CASB makes across connected SaaS integrations — has been a black box. While the information was there to put together an explanation of why that file, that user, that configuration was triggering a CASB Finding Type, it wasn’t exactly obvious the reason why it was ultimately detected by our system.</p><p>With the introduction of Cloudy summaries in CASB, users receive a short description of the detection rationale with the specific details of the match listed out for easy comprehension.</p><p>Unlike a simple text summary, Cloudy for CASB provides a structured breakdown designed for immediate remediation. As seen in our beta testing across different providers, from Microsoft 365 to Dropbox, the model consistently parses findings into two distinct sections:</p><ul><li><p>Risk: It identifies exactly why the finding matters. For instance, rather than just noting a 'Suspended User,' Cloudy clarifies that this 'may indicate a compromised account or a user who should no longer have access to company data'.</p></li><li><p>Guidance: It offers immediate next steps. Instead of generic advice, it suggests specific actions, such as verifying if a suspension was intentional or reviewing an application's legitimacy before revoking access.</p></li></ul><p>This structure ensures that analysts can understand the gravity of a finding without needing deep expertise in the specific SaaS application involved.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/BkfPI5VWYYaGzjjHsfyEz/16783ef841292ff66972222afda350e9/image4.png" />
          </figure><p><sub><i>An example Cloudy Summary in a CASB Posture Finding.</i></sub></p><table><tr><td><p><b>Finding Type</b></p></td><td><p><b>Technical Signal</b></p></td><td><p><b>Cloudy Translation (Risk &amp; Guidance)</b></p></td></tr><tr><td><p><b>Identity &amp; Access</b></p></td><td><p>Dropbox:</p><p>Suspended User</p></td><td><p>Risk: A suspended user account may indicate a compromised account or a user who should no longer have access to company data.</p><p></p><p>Guidance: Verify that the suspension is intentional and that the user's access has been properly revoked.</p></td></tr><tr><td><p><b>Shadow IT</b></p></td><td><p>Google Workspace:</p><p>Installed 3rd-party app</p></td><td><p>Risk: This installed application with Google Sign In access may pose a risk of unauthorized access to user data.</p><p></p><p>Guidance: Review the application's legitimacy and necessity, and consider revoking access if it is no longer needed.</p></td></tr><tr><td><p><b>Email Security</b></p></td><td><p>Microsoft 365:</p><p>Domain DMARC record not present</p></td><td><p>Risk: The absence of a DMARC record may leave the domain vulnerable to email spoofing and phishing attacks.</p><p></p><p>Guidance: Configure a DMARC record for the domain to specify how to handle unauthenticated emails.</p></td></tr><tr><td><p><b>Data Loss Prevention</b></p></td><td><p>Microsoft 365:</p><p>File publicly accessible + DLP Match</p></td><td><p>Risk: This file being shared publicly with edit access may allow unauthorized modifications... especially given the potential sensitive content indicated by the DLP Profile match.</p><p></p><p>Guidance: Review the file's content... and consider restricting access if necessary.</p></td></tr></table><p>We know that when it comes to our customers getting to the bottom of identified security issues, time is of the essence. We believe that any amount of unnecessary uncertainty or lack of clarity around what’s going wrong just puts more time between an imperfect state and one that is more secure.</p><p>We built this feature on the same privacy-first foundations as all products at Cloudflare. Cloudy summaries in CASB are generated using Cloudflare Workers AI, ensuring that your data remains within our secure infrastructure during analysis. The models are not trained on your SaaS data, and the summaries are generated ephemerally to aid in triage. This allows your team to leverage the speed of AI without exposing sensitive internal documents or configurations to public models.</p>
    <div>
      <h3>What’s next</h3>
      <a href="#whats-next">
        
      </a>
    </div>
    <p>For Email Security, we will continue to expand how Cloudy supports both administrators and end users. Our focus is on delivering clearer explanations, better in context guidance, and deeper integration into daily workflows.</p><p>For CASB, we’re excited to look for opportunities where Cloudy can make it even easier for CASB administrators to understand what’s going on across their cloud and SaaS apps. Keep an eye out as we look to expand Cloudy coverage to allow administrators to query their findings using natural language, further reducing the time it takes to identify and remediate risks.</p><p>Looking ahead, this includes richer explanations for additional detection types, tighter feedback loops between user actions and detections, and continued improvements to how users and SOC teams collaborate through Phishnet. Our goal is to make Cloudy a core part of how organizations understand, trust, and act on email security decisions.</p><p>We provide all organizations (whether a Cloudflare customer or not) with free access to our <a href="https://developers.cloudflare.com/cloudflare-one/email-security/retro-scan/"><u>Retro Scan</u></a> tool, allowing them to use our predictive AI models to scan existing inbox messages in Microsoft 365. </p><p>Retro Scan will detect and highlight any threats found, enabling organizations to remediate them directly in their email accounts. With these insights, organizations can implement further controls, either using <a href="https://www.cloudflare.com/zero-trust/products/email-security/"><u>Cloudflare Email Security</u></a> or their preferred solution, to prevent similar threats from reaching their inboxes in the future.</p><p>If you are interested in how Cloudflare can help secure your inboxes, sign up for a phishing risk assessment <a href="https://www.cloudflare.com/lp/email-security-self-guided-demo-request/?utm_medium=referral&amp;utm_source=blog&amp;utm_campaign=2025-q3-acq-gbl-modernsec-es-ge-general-ai_week_blog"><u>here</u></a>.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/FcaNb9DmTtKE1VbgLfPtT/5824d6eacb9f4ea5fe09c3dbd0843ba1/image3.png" />
          </figure><p></p> ]]></content:encoded>
            <category><![CDATA[Email Security]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Cloudflare One]]></category>
            <category><![CDATA[CASB]]></category>
            <guid isPermaLink="false">6S9GOOoOPdJX0xziMyNShi</guid>
            <dc:creator>Ayush Kumar</dc:creator>
            <dc:creator>Alex Dunbrack</dc:creator>
        </item>
        <item>
            <title><![CDATA[From reactive to proactive: closing the phishing gap with LLMs]]></title>
            <link>https://blog.cloudflare.com/email-security-phishing-gap-llm/</link>
            <pubDate>Tue, 03 Mar 2026 06:00:00 GMT</pubDate>
            <description><![CDATA[ Email security is a constant arms race. Like WWII engineers reinforcing only the planes that returned, survivorship bias hides real gaps. But LLMs can help us find the invisible weaknesses. ]]></description>
            <content:encoded><![CDATA[ <p><a href="https://www.cloudflare.com/learning/email-security/what-is-email-security/"><u>Email security</u></a> has always been defined by impermanence. It is a perpetual call-and-response arms race, where defenses are only as strong as the last bypass discovered and attackers iterate relentlessly for even marginal gains. Every control we deploy eventually becomes yesterday’s solution.</p><p>What makes this challenge especially difficult is that our biggest weaknesses are, by definition, invisible.</p><p>This problem is best illustrated by a classic example from World War II. Mathematician <a href="https://www.historyofdatascience.com/abraham-wald-a-statistical-hero/"><u>Abraham Wald</u></a> was tasked with helping Allied engineers decide where to reinforce bomber aircraft. Engineers initially focused on the bullet holes visible on planes returning from missions. Wald pointed out the flaw: they were reinforcing the areas where planes could already take damage and survive. The true vulnerabilities were on the planes that never came back.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1NxyKOOVeVCGbOz7hY5AFU/c382fc6186bc98fe63a7de35720f3618/image3.png" />
          </figure><p>Email security faces an identical hurdle: our detection gaps are unseen. By integrating LLMs, we advance email phishing protection and move from reactive to proactive detection improvement.</p><p>The limits of reactive defense</p><p>Traditional email security systems improve primarily through user-reported misses. For example, if we marked a spam message as clean, customers can send us the original EML to our pipelines for our analysts to analyze and update our models. This feedback loop is necessary and valuable, but it is inherently reactive. It depends on someone noticing a failure after the fact and taking the time to report it.</p><p>That means detection improvements are often driven by what attackers already succeeded at, rather than by what they are about to exploit next.</p><p>To close this gap, we need a way to systematically observe the “planes that didn’t make it back.”</p>
    <div>
      <h3>Mapping the threat landscape with LLMs</h3>
      <a href="#mapping-the-threat-landscape-with-llms">
        
      </a>
    </div>
    <p><a href="https://www.cloudflare.com/learning/ai/what-is-large-language-model/"><u>Large Language Models (LLMs)</u></a> hit the mainstream market in late 2022 and early 2023, fundamentally changing how we process unstructured data. At their core, LLMs use deep learning and massive datasets to predict the next token in a sequence, allowing them to understand context and nuance. They are particularly well-suited for email security because they can read natural language and characterize complex concepts (like intent, urgency, and deception) across millions of messages.</p><p>Every day, Cloudflare processes millions of unwanted emails. Historically, it was not feasible to deeply characterize each message beyond coarse classifications. Manually mapping emails to nuanced threat vectors simply did not scale. </p><p>Now, Cloudflare has integrated LLMs into our email security tools to identify threats before they strike. By using the power of LLMs, as we’ll describe below, we can finally see a clear and comprehensive picture of the evolving threat landscape.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/510saHtEz5iJRxg9Qp9zEN/8c59e619c6f6d62e8f6ced7e8f8dd401/image2.png" />
          </figure><p><sup><i>Our LLM-driven categorization shows clear spikes and persistent trends across several distinct categories, including "PrizeNotification" and "SalesOutreach".</i></sup></p><p>These LLM-generated tags provide Cloudflare analysts with high-fidelity signals in near real time. Tasks that previously required hours of manual investigation and complex querying can now be surfaced automatically, with relevant context attached. This directly increases the velocity at which we can build new targeted Machine Learning models or retrain existing ones to address emerging behaviors.</p><p>Because Cloudflare operates at global Internet scale, we can gather these insights earlier than ever before, often before a new technique becomes widely visible through customer-reported misses.</p>
    <div>
      <h3>The Sales Outreach threat</h3>
      <a href="#the-sales-outreach-threat">
        
      </a>
    </div>
    <p>One of the clearest patterns we’ve identified using this new intelligence is the continued persistence of malicious messages structured to look like Sales Outreach-style phishing. These emails are designed to mimic legitimate B2B communication, often presenting opportunities to purchase or receive "special deals" on unique items or services, to lure targets into clicking malicious links or providing credentials.</p><p>Once LLM categorization surfaced Sales Outreach as a dominant vector, we moved from broad visibility to targeted data collection. </p><p>Using LLM-generated tags, we began systematically isolating messages that exhibited Sales Outreach characteristics across our global dataset. This produced a continuously growing, high-precision corpus of real-world examples, including confirmed malicious messages as well as borderline cases that traditional systems struggled to classify. From this corpus, we built a dedicated training pipeline.</p><p>First, we curated training data by grouping messages based on shared linguistic and structural traits identified by the LLMs. These traits included persuasive framing, manufactured urgency, transactional language, and subtle forms of social proof.</p><p>Next, we focused feature extraction on sentiment and intent rather than static indicators. The model learns how requests are phrased, how credibility is established, and how calls to action are embedded within otherwise normal business conversations.</p><p>Finally, we trained a purpose-built sentiment analysis model optimized specifically for Sales Outreach behavior. This avoided overloading a general phishing classifier and allowed us to tune precision and recall for this threat class.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1uxwkalxVBOczIXJ1VebIs/ce1197d61c83f9756c3951d4dee77572/image4.png" />
          </figure>
    <div>
      <h4>Turning language into enforcement</h4>
      <a href="#turning-language-into-enforcement">
        
      </a>
    </div>
    <p>The output of this model is a risk score that reflects how closely a message aligns with known Sales Outreach attack patterns. That score is evaluated alongside existing signals such as sender reputation, link behavior, and historical context to determine whether a message should be blocked, quarantined, or allowed.</p><p>This process is continuous. As attackers adapt their language, newly observed messages are fed back into the pipeline and used to refine the model without waiting for large volumes of user-reported misses. LLMs act as the discovery layer by surfacing new linguistic variants, while the specialized model performs fast and scalable enforcement.</p><p>This is what an all-out offensive looks like in practice. It is a feedback loop where large-scale language understanding drives focused, high-precision detection. The result is earlier intervention against a threat class that thrives on subtlety, and fewer malicious sales emails reaching the inbox.</p>
    <div>
      <h3>Results of the undertaking</h3>
      <a href="#results-of-the-undertaking">
        
      </a>
    </div>
    <p>The visibility unlocked by LLM-driven mapping fundamentally changed how we improve detections. Instead of waiting for attackers to succeed and relying on downstream user reports, we gained the ability to identify systemic gaps earlier and address them at the source. This shift from reactive remediation to proactive reinforcement translated directly into measurable customer impact.</p><p>The most immediate signal of success was a marked reduction in customer friction. Sales Outreach–related phishing has historically generated a high volume of user-reported misses, largely because these messages closely resemble legitimate business communication and often evade traditional rule-based or reputation-driven systems. As our targeted models came online and were continuously refined using LLM-derived insights, fewer of these messages reached end users in the first place.</p><p>The data reflects this change clearly. Average daily Sales Outreach submissions — messages that we labeled as clean but were in fact Sales Outreach phishing emails, flagged by end users — dropped from 965 in Q3 2025 to 769 in Q4 2025, representing a <b>20.4% reduction in reported misses</b> <b>in a single quarter.</b></p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7plV0JarzggZYDPHKcgmya/8762112a2c7f4c1cec70e654a1a6a4ef/image1.png" />
          </figure><p>This reduction is not just a metric improvement; it represents thousands fewer disruptive moments per day for security teams and end users alike. Each avoided submission is a phishing attempt that was stopped before it could erode trust, consume analyst time, or force a user to make a security judgment mid-workflow. We have seen this trend continue in Q1 of 2026 with average daily submissions decreasing by two-thirds.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3Y6v2oNdWrJUmXzR5igzsL/72dc19cc052185f2753adad111ce0afb/image5.png" />
          </figure><p>In effect, LLMs allowed us to “see” the planes that never made it back. By illuminating previously invisible failure modes, we were able to reinforce defenses precisely where attackers were concentrating their efforts. The result is a system that improves not only detection rates, but also the day-to-day experience of the people relying on it.</p>
    <div>
      <h3>The next front in the arms race</h3>
      <a href="#the-next-front-in-the-arms-race">
        
      </a>
    </div>
    <p>Our work with LLMs is just beginning. </p><p>To stay ahead of the next evolution of attacks, we are moving toward a model of total environmental awareness by refining LLM specificity to extract forensic-level detail from every interaction. This granular mapping allows us to identify specific tactical signatures rather than relying on broad labels. </p><p>Simultaneously, we are deploying specialized machine learning models purpose-built to hunt for emerging, high-obfuscation vectors at the "fringes" that traditional defenses miss. By leveraging this real-time LLM data as a strategic compass, we can shift our human expertise away from known noise and toward the critical gaps where the next strike is likely to land.</p><p>By illuminating the "planes that didn't make it back," we are doing more than just reacting to missed email; we are systematically narrowing the battlefield. In the email arms race, the advantage belongs to the side that can see the invisible first.</p>
    <div>
      <h3>Ready to enhance your email security?</h3>
      <a href="#ready-to-enhance-your-email-security">
        
      </a>
    </div>
    <p>We provide all organizations (whether a Cloudflare customer or not) with free access to our <a href="https://developers.cloudflare.com/cloudflare-one/email-security/retro-scan/"><u>Retro Scan</u></a> tool, allowing them to use our predictive AI models to scan existing inbox messages in Microsoft 365. </p><p>Retro Scan will detect and highlight any threats found, enabling organizations to remediate them directly in their email accounts. With these insights, organizations can implement further controls, either using <a href="https://www.cloudflare.com/zero-trust/products/email-security/"><u>Cloudflare Email Security</u></a> or their preferred solution, to prevent similar threats from reaching their inboxes in the future.</p><p>If you are interested in how Cloudflare can help secure your inboxes, sign up for a phishing risk assessment <a href="https://www.cloudflare.com/lp/email-security-self-guided-demo-request/?utm_medium=referral&amp;utm_source=blog&amp;utm_campaign=2025-q3-acq-gbl-modernsec-es-ge-general-ai_week_blog"><u>here</u></a>.</p> ]]></content:encoded>
            <category><![CDATA[Email Security]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Cloudflare One]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <guid isPermaLink="false">6bn8ZofdSYZHfiOOkBl2qq</guid>
            <dc:creator>Sebastian Alovisi</dc:creator>
            <dc:creator>Ayush Kumar</dc:creator>
        </item>
        <item>
            <title><![CDATA[Cloudflare Confidence Scorecards - making AI safer for the Internet]]></title>
            <link>https://blog.cloudflare.com/cloudflare-confidence-scorecards-making-ai-safer-for-the-internet/</link>
            <pubDate>Tue, 23 Sep 2025 14:00:00 GMT</pubDate>
            <description><![CDATA[ Cloudflare Confidence Scorecards are now live in the Application Library. Get transparent risk ratings for SaaS and Gen-AI apps. ]]></description>
            <content:encoded><![CDATA[ <p>Security and IT teams face an impossible balancing act: Employees are adopting AI tools every day, but each tool carries unique risks tied to compliance, data privacy, and security practices. Employees using these tools without seeking prior approval leads to a new type of<a href="https://www.cloudflare.com/learning/access-management/what-is-shadow-it/"><u> Shadow IT</u></a> which is referred to as <a href="https://blog.cloudflare.com/shadow-AI-analytics/"><u>Shadow AI</u></a>. Preventing Shadow AI requires manually vetting each AI application to determine whether it should be approved or disapproved. This isn’t scalable. And blanket bans of AI applications will only drive AI usage deeper underground, making it harder to secure.</p><p>That’s why today we are launching Cloudflare Application Confidence Scorecards. This is part of our new <a href="https://www.cloudflare.com/ai-security/">suite of AI Security features</a> within the Cloudflare One SASE platform. These scores bring scale and automation to the labor- and time-intensive task of evaluating generative AI and SaaS applications one by one. Instead of spending hours trying to find AI applications’ compliance certifications or data-handling practices, evaluators get a clear score that reflects an application’s safety and trustworthiness. With that signal, decision makers within organizations can confidently set policies or apply guardrails where needed, and block risky tools so their organizations can embrace innovation without compromising security.</p><p>Our Cloudflare Application Confidence Scorecards rate both AI-powered applications on a number of factors, including whether they’ve achieved industry-recognized certifications, follow certain data management and security measures, and the maturity level of the company. Meanwhile, amongst other considerations, our Generative AI confidence score awards higher scores to AI models that provide system cards that describe testing for bias, ethics, and safety considerations, and that do not train on user inputs.  We hope our emphasis on privacy, security, and safety helps drive <a href="https://blog.cloudflare.com/best-practices-sase-for-ai/">safer and more secure AI for everyone</a>.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6FQPYW5ZI0vPO950CBJ0Di/3bd6f05703f522c84608882f347f3585/generative-AI-confidence-score.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/opTtg2dkqMc7ZeUevjZjS/77bacb0c4a888622024c7a1b808d41a5/app-confidence-score.png" />
          </figure>
    <div>
      <h2>Rapid increase in Shadow AI</h2>
      <a href="#rapid-increase-in-shadow-ai">
        
      </a>
    </div>
    <p>Over the last decade, SaaS adoption has reshaped how businesses work. Employees can now pick up a new tool in minutes with nothing more than a credit card or free trial link. Now with the growth of generative AI, entire workflows are moving outside corporate oversight. From writing assistants to image generators, employees are relying on these tools daily, without knowing whether they comply with corporate or regulatory requirements. </p><p>The risks of these tools are wide-ranging. Sensitive data can be stored or transmitted outside of company controls. Tools may lack certifications such as SOC2 or ISO 27001. Many providers retain user data indefinitely or use it to train external models. Others face financial or operational instability that could disrupt your business if they go bankrupt or suffer a breach. Models can produce biased outputs that can introduce compliance risks or lead to erroneous business decisions. Security leaders tell us they cannot keep up with auditing every new application.  </p>
    <div>
      <h2>We score them for you, at scale</h2>
      <a href="#we-score-them-for-you-at-scale">
        
      </a>
    </div>
    <p>In order to make this effective, we needed two things: a rubric that could judge AI and SaaS applications, and then a mechanism to scalably score all those applications. Here’s how we did it.</p>
    <div>
      <h3>How the rubric works</h3>
      <a href="#how-the-rubric-works">
        
      </a>
    </div>
    <p>The Application Posture Score (5 points) evaluates a SaaS provider across five major categories:</p><ul><li><p><b>Security and Privacy Compliance (1.2 points):</b> Credit for SOC 2 and ISO 27001 certifications, which signal operational maturity.</p></li><li><p><b>Data Management Practices (1 point):</b> Retention windows and whether the provider shares data with third parties. Shorter retention and no sharing earns the highest marks.</p></li><li><p><b>Security Controls (1 point):</b> Support for MFA, SSO, TLS 1.3, role-based access, and session monitoring. These are the table stakes of modern SaaS security.</p></li><li><p><b>Security Reports and Incident History (1 point):</b> Availability of a trust or security page, bug bounty program, and incident response transparency. A recent material breach results in a full deduction.</p></li><li><p><b>Financial Stability (.8 points):</b> Public companies and heavily capitalized providers score highest, while startups with less funding or firms in distress score lower.</p></li></ul><p>The Gen-AI Posture Score (5 points) evaluates AI-specific risks:</p><ul><li><p><b>Compliance (1 point):</b> Presence of the ISO 42001 certification for AI management systems.</p></li><li><p><b>Deployment Security Model (1 point):</b> Whether access is authenticated and rate-limited or left publicly exposed.</p></li><li><p><b>System Card (1 point):</b> Publication of a model or system card that documents evaluations of safety, bias, and risk.</p></li><li><p><b>Training Data Governance (2 points):</b> Whether user data is explicitly excluded from model training or if there are available controls allowing opt-in/opt-out of training user data.</p></li></ul><p>Together, these scores give a transparent view of how much confidence you can place in a provider.</p>
    <div>
      <h3>How we score at scale</h3>
      <a href="#how-we-score-at-scale">
        
      </a>
    </div>
    <p>In the same way it’s not scalable for you to stay on top of every new AI and SaaS tool being created, our team quickly realized that we too would have the same problem. AI applications are being spun up so quickly that trying to keep pace manually would require a large team of people. </p><p>We knew we had to build a methodology to do it automatically, so we designed infrastructure that can crawl the Internet to answer the rubric questions at scale. We built a system that scrapes public trust centers, privacy policies, security pages, and compliance documents. Large language models parse those documents to identify relevant answers, but we also hardened the process to resist hallucinations by requiring source validation and structured extraction.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6qKD3BGqJ4h4COX4GAYU5S/b0848f940e7c9e7bbdbd78ed09983c0c/image1.png" />
          </figure><p>Every score produced by automation is then reviewed and audited by Cloudflare analysts before it goes live in the Application Library. This combination of automated crawling/extraction and human validation makes sure that the scores are both comprehensive and trustworthy.</p>
    <div>
      <h2>We make it easy to act on it</h2>
      <a href="#we-make-it-easy-to-act-on-it">
        
      </a>
    </div>
    <p>Confidence scores are built directly into the Application Library, making them actionable from day one. When you click on a score in your Cloudflare dashboard, you will see a detailed breakdown of how the app performed across each dimension of the rubric. Scores update as vendors improve their security and compliance, giving you a live view instead of a static report.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6FwChyEBXFyDOHWX3WepFw/13802cc41464cc07ab4ea55f4e4d5caa/BLOG-2961-1.png" />
          </figure><p>This approach makes life easier for every stakeholder. IT and security teams can spot high-risk tools at a glance. Procurement Governance Risk &amp; Compliance teams can accelerate vendor reviews while developers and employees can make smarter choices without waiting weeks for approvals.</p>
    <div>
      <h2>And it’s getting even better</h2>
      <a href="#and-its-getting-even-better">
        
      </a>
    </div>
    <p>Visibility is just the start. Soon, these scores will also drive enforcement across your Cloudflare One environment. You will be able to use Gateway to block or warn employees about low-scoring apps or tie DLP policies directly to confidence scores. That way untrusted AI and SaaS providers never become a backdoor for sensitive information.</p><p>By embedding scores into both visibility and enforcement, we are turning them into a tool for keeping your corporate environment safer.</p>
    <div>
      <h2>Interested in these scores?</h2>
      <a href="#interested-in-these-scores">
        
      </a>
    </div>
    <p>Cloudflare Application Confidence Scorecards are now live in the Application Library. You can explore them today in the Cloudflare dashboard, use them to evaluate the tools your teams rely on, and soon enforce policies across the Cloudflare Zero Trust platform.</p><p>This is one more step in our mission to make the Internet safer, faster, and more reliable not just for networks, but for the applications and AI tools that power modern work.</p><p>If you are a Cloudflare customer you can check out the <a href="https://developers.cloudflare.com/cloudflare-one/applications/app-library/"><u>Application Library</u></a>, explore the confidence scores, and let us know what you think. And if you’re not — fear not! — application scores are freely available to all users, including free. You can <a href="https://dash.cloudflare.com/sign-up/zero-trust"><u>get started</u></a> by simply creating a free account — and seeing these scores yourself. </p><p>Finally, if you want to get involved testing new functionality or sharing insights related to <a href="https://www.cloudflare.com/learning/ai/what-is-ai-security/">AI security</a>, we would love for you to express interest in <a href="https://www.cloudflare.com/lp/ai-security-user-research-program-2025/"><u>joining our user research program</u></a>. </p> ]]></content:encoded>
            <category><![CDATA[Cloudflare One]]></category>
            <category><![CDATA[Birthday Week]]></category>
            <category><![CDATA[Cloudflare Zero Trust]]></category>
            <category><![CDATA[SASE]]></category>
            <category><![CDATA[AI]]></category>
            <category><![CDATA[AI-SPM]]></category>
            <guid isPermaLink="false">Z2wzT0u3Zixm6qdFEYWZo</guid>
            <dc:creator>Ayush Kumar</dc:creator>
            <dc:creator>Sharon Goldberg</dc:creator>
        </item>
        <item>
            <title><![CDATA[Integrating CrowdStrike Falcon Fusion SOAR with Cloudflare’s SASE platform]]></title>
            <link>https://blog.cloudflare.com/integrating-crowdstrike-falcon-fusion-soar-with-cloudflares-sase-platform/</link>
            <pubDate>Mon, 15 Sep 2025 16:17:51 GMT</pubDate>
            <description><![CDATA[ Cloudflare and CrowdStrike have partnered to help SOC teams minimize manual bottlenecks. By combining Cloudflare’s SASE platform with CrowdStrike’s Falcon® Fusion SOAR, security teams can now detect  ]]></description>
            <content:encoded><![CDATA[ 
    <div>
      <h2>The challenge of manual response</h2>
      <a href="#the-challenge-of-manual-response">
        
      </a>
    </div>
    <p>Security teams know all too well the grind of manual investigations and remediation. With the mass adoption of AI and increasingly automated attacks, defenders cannot afford to rely on overly manual, low priority, and complex workflows.</p><p>Heavily burdensome manual response introduces delays as analysts bounce between consoles and high alert volumes, contributing to alert fatigue. Even worse, it prevents security teams from dedicating time to high-priority threats and strategic, innovative work. To keep pace, <a href="https://www.cloudflare.com/learning/security/glossary/what-is-a-security-operations-center-soc/"><u>SOCs</u></a> need automated responses that contain and remediate common threats at machine speed before they become business-impacting incidents.</p>
    <div>
      <h2>Expanding our capabilities with CrowdStrike Falcon® Fusion’ SOAR</h2>
      <a href="#expanding-our-capabilities-with-crowdstrike-falcon-r-fusion-soar">
        
      </a>
    </div>
    <p>That’s why today, we’re excited to announce a new integration between the Cloudflare One platform and CrowdStrike's Falcon® Fusion SOAR.</p><p>As part of our ongoing partnership with CrowdStrike, this integration introduces two out-of-the-box integrations for Zero Trust and <a href="https://www.cloudflare.com/zero-trust/products/email-security/"><u>Email Security</u></a> designed for organizations already leveraging CrowdStrike Falcon® Insight XDR or CrowdStrike Falcon® Next-Gen SIEM.</p><p>This allows SOC teams to gain powerful new capabilities to <a href="https://www.cloudflare.com/learning/email-security/how-to-prevent-phishing/"><u>stop phishing</u></a>, <a href="https://www.cloudflare.com/learning/ddos/glossary/malware/"><u>malware</u></a>, and suspicious behavior faster, with less manual effort.</p>
    <div>
      <h2>Out-of-the-box integrations</h2>
      <a href="#out-of-the-box-integrations">
        
      </a>
    </div>
    <p>Although teams can always create custom automations, we’ve made it simple to get started with two pre-built integrations focused on Zero Trust Access and Email Security. Both follow the same general structure and are available directly in the CrowdStrike Content Library.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3laW9PA2y85HzMIo8n9azl/188a3c5286816e63f99c05c553493b95/Screenshot_2025-09-15_at_10.32.51.png" />
          </figure><p><b>Cloudflare within CrowdStrike Content Library</b></p><p>The actions you can take within CrowdStrike from these integrations are the following:</p><table><tr><td><p><b>Email Security</b></p><p>- Update Allow Policy </p><p>- Search Email Messages</p><p>- List Trusted Domains</p><p>- List Protected Domains</p><p>- List Blocked Senders</p><p>- List Allow Policies </p><p>- Get Trusted Domain</p><p>- Get Message Details</p><p>- Get Detection Details</p><p>- Get Allow Policy </p><p>- Delete Trusted Domain</p><p>- Delete Allow Policy</p><p>       Delete Blocked Sender</p><p>       Create Trusted Domain</p><p>       Create Blocked Sender</p><p>       Create Allow Policy</p><p>       Get Blocked Sender</p></td><td><p><b>Zero Trust Access </b></p><p>- Update Reusable Policy</p><p>- Update Access Group</p><p>- Revoke Application Tokens</p><p>- Read Metadata For A Key</p><p>- List Reusable Policies</p><p>- List Access Groups</p><p>- List Access Applications </p><p>- List Access App Policies </p><p>- Get Access Reusable Policy </p><p>- Get Access Group</p><p>- Get Access Application </p><p>- Get Access App Policy </p><p>- Delete Reusable Policy </p><p>- Delete Access Group </p><p>- Delete Access Application </p><p>- Delete Access App Policy </p><p>- Create Reusable Policy </p><p>- Create Access Group</p><p>- Create Access App Policy </p></td></tr></table><p>Using these signals, customers can create automated workflows that run with minimal to no human intervention. Falcon Fusion SOAR’s drag-and-drop editor makes it easy to chain together Cloudflare actions with other signals (from CrowdStrike or even third-party vendors) to automate large portions of the SOC workflow.</p><p>An example flow that you could create is: </p><ol><li><p>A phishing email is detected by Cloudflare Email Security.</p></li><li><p>Falcon Fusion SOAR automatically retrieves detection details, blocks the sender, and updates allow/deny lists.</p></li><li><p>Cloudflare Zero Trust revokes active session tokens for the impacted account.</p></li><li><p>If Falcon confirms the endpoint is compromised, the device is automatically isolated.</p></li></ol><p>Another example of how a workflow like above would show in the UI is the following:  </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3VAhAcZlZ6UlY7m8akijP6/b723b59a1f7099c2dd41e3c195cbf2ad/image_-_2025-09-15T103707.530.png" />
          </figure><p><b>An example automated flow using Cloudflare</b></p><p>From the Cloudflare UI, customers can navigate to the Logpush section where they can set up a job with CrowdStrike. To do this customers need to create a job with “HTTP destination”: </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4fb3bijbYCmZNVx1x3xNHI/d6c3e7bd28aca05514a3c704058cf1ab/image_-_2025-09-15T103911.429.png" />
          </figure><p>From here, customers can input the HTTP endpoint provided by CrowdStrike in the data connector setup to start sending logs over to Falcon Fusion SOAR. This URL will show up in the following way: <i>ingest.us-2.crowdstrike.com/api/ingest/hec/&lt;CRWDconnectionID&gt;/v1/services/collector/raw</i></p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7dNB9yDkmzsNQhd9vKnZEI/43267cdfec074608410bf316478ca40b/image_-_2025-09-15T104010.825.png" />
          </figure><p><b>CrowdStrike URL Location</b></p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7I9DtSd5yDgcWC9ko7ygNK/1af7ecc2459796284ca354ebb290d25e/image_-_2025-09-15T104048.857.png" />
          </figure><p><b>Working Logpush to CrowdStrike</b></p><p>This end-to-end automation allows teams to reduce mean time-to-response from minutes to seconds.</p>
    <div>
      <h2>How detection and remediation are made possible</h2>
      <a href="#how-detection-and-remediation-are-made-possible">
        
      </a>
    </div>
    <p>At a technical level, the integration relies on webhook and API integrations between <a href="https://www.cloudflare.com/zero-trust/"><u>Cloudflare’s SASE platform </u></a>and CrowdStrike Falcon Fusion SOAR. For example:</p><ul><li><p><b>From endpoint to network:</b> When the CrowdStrike Falcon® platform detects an endpoint compromise, it triggers a workflow to Cloudflare’s API, which enforces step-up authentication or session revocation across SaaS, private apps, or email access. This is done via Cloudflare’s <a href="https://www.cloudflare.com/zero-trust/products/access/"><u>Access</u></a> product. </p></li><li><p><b>From network to endpoint:</b> When Cloudflare flags suspicious behavior (e.g., abnormal login patterns, anomalous traffic, or unsafe email activity), it notifies CrowdStrike Falcon Fusion SOAR, which then isolates the device and launches remediation playbooks.</p></li></ul><p>This bidirectional exchange makes sure threats are contained from both sides, endpoint and network, without requiring manual intervention from analysts.</p>
    <div>
      <h2>How to get started</h2>
      <a href="#how-to-get-started">
        
      </a>
    </div>
    <p>If your organization already uses CrowdStrike Falcon Fusion SOAR with Cloudflare’s <a href="https://www.cloudflare.com/learning/access-management/what-is-sase/">SASE</a> platform, you can enable these workflows today directly from the Cloudflare Dashboard and CrowdStrike Falcon console (<a href="https://falcon.us-2.crowdstrike.com/workflow/fusion/content-library/apps/313f46ae74dd42939cbfd7f519986631"><u>Zero Trust</u></a>, <a href="https://falcon.us-2.crowdstrike.com/workflow/fusion/content-library/apps/dbccb19e577f44b49c561fac70518913"><u>Email Security</u></a>). You can also search for Cloudflare within the content library in CrowdStrike to find the integrations. </p><p>For organizations looking to customize further, both platforms allow extensibility through APIs and custom playbooks so SOC teams can tailor response actions to their unique risk posture.</p><p>To learn more about our integrations, feel free to <a href="https://www.cloudflare.com/zero-trust/trial/"><u>reach out to us</u></a> to get started with a consultation.</p> ]]></content:encoded>
            <category><![CDATA[Cloudflare One]]></category>
            <category><![CDATA[Cloudflare Zero Trust]]></category>
            <category><![CDATA[Email Security]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <guid isPermaLink="false">4pnRemZNUf37u3e5pPlaAV</guid>
            <dc:creator>Ayush Kumar</dc:creator>
            <dc:creator>Andrew Meyer</dc:creator>
            <dc:creator>Michael Mcgrory</dc:creator>
            <dc:creator>Gavin Chen</dc:creator>
        </item>
        <item>
            <title><![CDATA[Cloudy Summarizations of Email Detections: Beta Announcement]]></title>
            <link>https://blog.cloudflare.com/cloudy-driven-email-security-summaries/</link>
            <pubDate>Fri, 29 Aug 2025 14:00:00 GMT</pubDate>
            <description><![CDATA[ We're now leveraging our internal LLM, Cloudy, to generate automated summaries within our Email Security product, helping SOC teams better understand what's happening within flagged messages. ]]></description>
            <content:encoded><![CDATA[ 
    <div>
      <h2>Background</h2>
      <a href="#background">
        
      </a>
    </div>
    <p>Organizations face continuous threats from <a href="https://www.cloudflare.com/learning/access-management/phishing-attack/"><u>phishing</u></a>,<a href="https://www.cloudflare.com/learning/email-security/business-email-compromise-bec/"><u> business email compromise (BEC)</u></a>, and other advanced email attacks. Attackers <a href="https://www.cloudflare.com/the-net/multichannel-phishing/"><u>adapt their tactics</u></a> daily, forcing defenders to move just as quickly to keep inboxes safe.</p><p>Cloudflare’s visibility across a large portion of the Internet gives us an unparalleled view of malicious campaigns. We process billions of email threat signals every day, feeding them into multiple AI and machine learning models. This lets our detection team create and deploy new rules at high speed, blocking malicious and unwanted emails before they reach the inbox.</p><p>But rapid protection introduces a new challenge: making sure security teams understand exactly what we blocked — and why.</p>
    <div>
      <h2>The Challenge</h2>
      <a href="#the-challenge">
        
      </a>
    </div>
    <p>Cloudflare’s fast-moving detection pipeline is one of our greatest strengths — but it also creates a communication gap for customers. Every day, our detection analysts publish new rules to block phishing, BEC, and other unwanted messages. These rules often blend signals from multiple AI and machine learning models, each looking at different aspects of a message like its content, headers, links, attachments, and sender reputation.</p><p>While this layered approach catches threats early, SOC teams don’t always have insight into the specific combination of factors that triggered a detection. Instead, they see a rule name in the investigation tab with little explanation of what it means.</p><p>Take the rule <i>BEC.SentimentCM_BEC.SpoofedSender</i> as an example. Internally, we know this indicates:</p><ul><li><p>The email contained no unique links or attachments a common BEC pattern</p></li><li><p>It was flagged as highly likely to be BEC by our Churchmouse sentiment analysis models</p></li><li><p>Spoofing indicators were found, such as anomalies in the envelope_from header</p></li></ul><p>Those details are second nature to our detection team, but without that context, SOC analysts are left to reverse-engineer the logic from opaque labels. They don’t see the nuanced ML outputs (like Churchmouse’s sentiment scoring) or the subtle header anomalies, or the sender IP/domain reputation data that factored into the decision.</p><p>The result is time lost to unclear investigations or the risk of mistakenly releasing malicious emails. For teams operating under pressure, that’s more than just an inconvenience, it's a security liability.</p><p>That’s why we extended Cloudy (our AI-powered agent) to translate complex detection logic into clear explanations, giving SOC teams the context they need without slowing them down.</p>
    <div>
      <h2>Enter Cloudy Summaries</h2>
      <a href="#enter-cloudy-summaries">
        
      </a>
    </div>
    <p>Several weeks ago, we launched Cloudy within our Cloudflare One product suite to help customers understand gateway policies and their impacts (you can read more about the launch here: https://blog.cloudflare.com/introducing-ai-agent/).</p><p>We began testing Cloudy's ability to explain the detections and updates we continuously deploy. Our first attempt revealed significant challenges.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/63bsCRl2hKUyECh1vJND5k/a033fce3c95a635ede07e1fd03a9edf5/image3.png" />
          </figure>
    <div>
      <h3>The Hallucination Problem</h3>
      <a href="#the-hallucination-problem">
        
      </a>
    </div>
    <p>We observed frequent LLM <a href="https://www.cloudflare.com/learning/ai/what-are-ai-hallucinations/"><u>hallucinations</u></a>, the model generating inaccurate information about messages. While this might be acceptable when analyzing logs, it's dangerous for email security detections. A hallucination claiming a malicious message is clean could lead SOC analysts to release it from quarantine, potentially causing a security breach.</p><p>These hallucinations occurred because email detections involve numerous and complex inputs. Our scanning process runs messages through multiple ML algorithms examining different components: body content, attachments, links, IP reputation, and more. The same complexity that makes manual detection explanation difficult also caused our initial LLM implementation to produce inconsistent and sometimes inaccurate outputs.</p>
    <div>
      <h3>Building Guardrails</h3>
      <a href="#building-guardrails">
        
      </a>
    </div>
    <p>To minimize hallucination risk while maintaining inbox security, we implemented several manual safeguards:</p><p><b>Step 1: RAG Implementation</b></p><p>We ensured Cloudy only accessed information from our detection dataset corpus, creating a <a href="https://www.cloudflare.com/learning/ai/retrieval-augmented-generation-rag/"><u>Retrieval-Augmented Generation (RAG)</u></a> system. This significantly reduced hallucinations by grounding the LLM's assessments in actual detection data.</p><p><b>Step 2: Model Context Enhancement</b></p><p>We added crucial context about our internal models. For example, the "Churchmouse" designation refers to a group of sentiment detection models, not a single algorithm. Without this context, Cloudy attempted to define "churchmouse" using the common idiom "poor as a church mouse" referencing starving church mice because holy bread never falls to the floor. While historically interesting, this was completely irrelevant to our security context.</p>
    <div>
      <h3>Current Results</h3>
      <a href="#current-results">
        
      </a>
    </div>
    <p>Our testing shows Cloudy now produces more stable explanations with minimal hallucinations. For example, the detection <i>SPAM.ASNReputation.IPReputation_Scuttle.Anomalous_HC</i> now generates this summary:</p><p>"This rule flags email messages as spam if they come from a sender with poor Internet reputation, have been identified as suspicious by a blocklist, and have unusual email server setup, indicating potential malicious activity."</p><p>This strikes the right balance. Customers can quickly understand what the detection found and why we classified the message accordingly.</p>
    <div>
      <h2>Beta Program</h2>
      <a href="#beta-program">
        
      </a>
    </div>
    <p>We're opening Cloudy email detection summaries to a select group of beta users. Our primary goal is ensuring our guardrails prevent hallucinations that could lead to security compromises. During this beta phase, we'll rigorously test outputs and verify their quality before expanding access to all customers.</p>
    <div>
      <h2>Ready to enhance your email security?</h2>
      <a href="#ready-to-enhance-your-email-security">
        
      </a>
    </div>
    <p>We provide all organizations (whether a Cloudflare customer or not) with free access to our Retro Scan tool, allowing them to use our predictive AI models to scan existing inbox messages. Retro Scan will detect and highlight any threats found, enabling organizations to remediate them directly in their email accounts. With these insights, organizations can implement further controls, either using <a href="https://www.cloudflare.com/zero-trust/products/email-security/"><u>Cloudflare Email Security</u></a> or their preferred solution, to prevent similar threats from reaching their inboxes in the future.</p><p>If you are interested in how Cloudflare can help secure your inboxes, sign up for a phishing risk assessment <a href="https://www.cloudflare.com/lp/email-security-self-guided-demo-request/?utm_medium=referral&amp;utm_source=blog&amp;utm_campaign=2025-q3-acq-gbl-modernsec-es-ge-general-ai_week_blog"><u>here</u></a>. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/lV6mxQTYwaS6j0n0e8arE/fd62cf8032b15780690f4ed48578d3fc/image2.png" />
          </figure><div>
  
</div><p></p> ]]></content:encoded>
            <category><![CDATA[AI Week]]></category>
            <category><![CDATA[Cloud Email Security]]></category>
            <category><![CDATA[LLM]]></category>
            <guid isPermaLink="false">hzXLKdI5wqNlvwd0JKzXS</guid>
            <dc:creator>Ayush Kumar</dc:creator>
            <dc:creator>Nick Blazier</dc:creator>
            <dc:creator>Phil Syme</dc:creator>
        </item>
        <item>
            <title><![CDATA[Introducing Cloudflare Application Confidence Score For AI Applications]]></title>
            <link>https://blog.cloudflare.com/confidence-score-rubric/</link>
            <pubDate>Tue, 26 Aug 2025 14:00:00 GMT</pubDate>
            <description><![CDATA[ Cloudflare will provide confidence scores within our application library for Gen AI applications, allowing customers to assess their risk for employees using shadow IT.  ]]></description>
            <content:encoded><![CDATA[ 
    <div>
      <h2>Introduction</h2>
      <a href="#introduction">
        
      </a>
    </div>
    <p>The availability of SaaS and <a href="https://www.cloudflare.com/learning/ai/what-is-generative-ai/"><u>Gen AI</u></a> applications is transforming how businesses operate, boosting collaboration and productivity across teams. However, with increased productivity comes increased risk, as employees turn to unapproved SaaS and Gen AI applications, often dumping sensitive data into them for quick productivity wins. </p><p>The prevalence of “Shadow IT” and “Shadow AI” creates multiple problems for security, IT, GRC and legal teams. For example:</p><ul><li><p>Gen AI applications may train their models on user inputs, which could expose proprietary corporate information to third parties, competitors, or even through clever attacks like <a href="https://genai.owasp.org/llmrisk/llm01-prompt-injection/"><u>prompt injection</u></a>. </p></li><li><p>Applications may retain user data for long periods, share data with <a href="https://www.malwarebytes.com/blog/news/2025/02/deepseek-found-to-be-sharing-user-data-with-tiktok-parent-company-bytedance#:~:text=PIPC%20said%20that%20DeepSeek%E2%80%94an,without%20disclosure%20or%20explicit%20consent."><u>third parties</u></a>, have <a href="https://www.wiz.io/blog/38-terabytes-of-private-data-accidentally-exposed-by-microsoft-ai-researchers"><u>lax security practices</u></a>, suffer a <a href="https://www.wired.com/story/mcdonalds-ai-hiring-chat-bot-paradoxai/"><u>data breach</u></a>, or even go <a href="https://www.npr.org/2025/03/24/nx-s1-5338622/23andme-bankruptcy-genetic-data-privacy"><u>bankrupt</u></a>, leaving sensitive data exposed to the highest bidder.  </p></li><li><p>Gen AI applications may produce outputs that are biased, unsafe or incorrect, leading to <a href="https://www.europarl.europa.eu/thinktank/en/document/EPRS_ATA(2025)769509"><u>compliance violations</u></a> or <a href="https://www.bbc.com/news/world-us-canada-65735769"><u>bad</u></a> <a href="https://www.theguardian.com/media/2023/oct/31/microsoft-accused-of-damaging-guardians-reputation-with-ai-generated-poll"><u>business</u></a> <a href="https://www.reuters.com/article/world/insight-amazon-scraps-secret-ai-recruiting-tool-that-showed-bias-against-women-idUSKCN1MK0AG/"><u>decisions</u></a>.</p></li></ul><p>In spite of these problems, <a href="https://www.cloudflare.com/the-net/banning-ai/"><u>blanket bans of Gen AI</u></a> don't work. They stifle innovation and push employee usage underground. Instead, organizations need smarter controls.</p><p>Security, IT, legal and GRC teams therefore face a difficult challenge: how can you appropriately assess each third-party application, without auditing and crafting individual policies for every single one of them that your employees might decide to interact with? And with the rate at which they’re proliferating — how could you possibly hope to keep abreast of them all?</p><p>Today, we’re excited to announce that we’re helping these teams automate assessment of SaaS and Gen AI applications at scale with the introduction of our new <b>Cloudflare Application Confidence Scores. </b>Scores will soon be available as part of our new suite of <a href="https://blog.cloudflare.com/best-practices-sase-for-ai/"><u>AI Security Posture Management (AI-SPM)</u></a> features in the Cloudflare One SASE platform, enabling IT and Security administrators to identify confidence levels associated with third-party SaaS and AI applications, and ultimately write policies informed by those confidence scores. We’re starting by scoring AI applications, because that’s where the need is most urgent.</p><p>In this blog, we’ll be covering the design of our Cloudflare Application Confidence Score, focusing specifically about the features of the score and our scoring rubric.  Our current goal is to reveal the details of our scoring rubric, which is designed to be as transparent and objective as possible — while simultaneously <a href="https://www.cloudflare.com/ai-security/">helping organizations of all sizes safely adopt AI</a>, and encouraging the industry and AI providers to adopt <a href="https://www.cloudflare.com/learning/ai/what-is-ai-security/">best practices for AI safety and security</a>.  </p><p>In the future, as part of our mission to help build a better Internet, we also plan to make Cloudflare Application Confidence Scores available for free to all our customer tiers. And even if you aren’t a Cloudflare customer, you will easily be able to browse through these Scores by creating a free account on the Cloudflare <a href="https://dash.cloudflare.com/"><u>dashboard</u></a> and navigating to our new <a href="https://developers.cloudflare.com/changelog/2025-07-07-dashboard-app-library/"><u>Application Library</u></a>.  </p>
    <div>
      <h2>Transparency, not vibes</h2>
      <a href="#transparency-not-vibes">
        
      </a>
    </div>
    <p>Cloudflare Application Confidence Scores is a transparent, understandable, and accountable metric that measures app safety, security, and data protection. It’s designed to give Security, IT, legal and GRC teams a rapid way of assessing the rapidly burgeoning space of AI applications.</p><p>Scores are not based on vibes or black-box “learning algorithms” or “artificial intelligence engines”.  We avoid subjective judgments or large-scale red-teaming as those can be tough to execute reliably and consistently over time. Instead, scores will be computed against an objective rubric that we describe in detail in this blog. Our rubric will be publicly maintained and kept up to date in the Cloudflare developer docs. </p><p>Many providers of the applications that we score are also our customers and partners, so our overarching goal is to be as fair and accountable as possible. We believe that transparency will build trust in our scoring rubric and guide the industry to adopt the best practices that our scoring rubric encourages. </p>
    <div>
      <h2>Principles behind our rubric</h2>
      <a href="#principles-behind-our-rubric">
        
      </a>
    </div>
    <p>Each component of our rubric requires a simple answer based on publicly available data like privacy policies, security documentation, compliance certifications, model cards and incident reports. If something isn't publicly disclosed, we assign zero points to that component of the rubric, with no further assumptions or guesswork.  Scores are computed according to our rubric via an automated system that incorporates human oversight for accuracy.  We use crawlers to collect public information (e.g. privacy policies, compliance documents), process it using AI for extraction and to compute the resulting scores, and then send them to human analysts for a final review.   </p><p>Scores are reviewed on a periodic basis. If a vendor believes that we have mis-scored their application, they can submit supporting documentation via <a><u>app-confidence-scores@cloudflare.com</u></a>, and we will update their score if appropriate.</p><p>Scores are on a scale from 1 to 5, with 5 being the highest confidence and 1 being the most risky. We decided to use a <b>"confidence score"</b> instead of a <b>"risk score"</b> because we can express confidence in an application when it provides clear positive evidence of good security, compliance and safety practices. An application may have good practices internally, but we cannot express confidence in these practices if they are not publicly documented. Moreover, a confidence score allows us to give customers transparent information, so they can make their own informed decisions. For example, an application might get a low confidence score because it lacks a documented data retention policy. While that might be a concern for some, your organization might find it acceptable and decide to allow the application anyway.</p><p>We separately evaluate different account tiers for the same application provider, because different account tiers can provide very different levels of enterprise risk. For instance, consumer plans (e.g. ChatGPT Free) may involve training on user prompts and score lower, whereas enterprise plans (e.g. ChatGPT Enterprise) do not train on user prompts and thus score higher. </p><p>That said, we are quite opinionated about components we selected in our rubric, drawing from deep experience of our own internal product, engineering, legal, GRC, and security teams. We prioritize factors like data retention policies and encryption standards because we believe they are foundational to protecting sensitive information in an AI-driven world. We included certifications, security frameworks and model cards because they provide evidence of maturity, stability, safety and adherence with industry best practices.</p>
    <div>
      <h2>Actually, it’s really two Scores</h2>
      <a href="#actually-its-really-two-scores">
        
      </a>
    </div>
    <p>As AI applications emerge at an unprecedented pace, the problem of "Shadow AI" intensifies traditional risks associated with Shadow IT. Shadow IT applications create risk when they retain user data for long periods, have lax security practices, are financially unstable, or widely share data with third parties.  Meanwhile, AI tools create new risks when they retain and train on user prompts, or generate responses that are biased, toxic, inaccurate or unsafe. </p><p>To separate out these different risks, we provide two different Scores: </p><ul><li><p><b>Application Confidence Score</b> (5 points) covers general SaaS maturity, and</p></li><li><p><b>Gen-AI Confidence Score</b> (5 points) focused on Gen AI-specific risks.</p></li></ul><p>We chose to focus on two separate areas to make our metric extensible (so that, in the future, we can apply it to applications that are not focused on Gen AI) and to make the Scores easier to understand and reason about.   </p><p>Each Score is applied to each account tier of a given Gen AI provider. For example, here’s how we scored OpenAI's ChatGPT:</p><ul><li><p><b>ChatGPT Free (App Confidence 3.3, GenAI Confidence 1)</b> received a low score due to limited enterprise controls and higher data exposure risk since by default, input data is used for model training.</p></li><li><p><b>ChatGPT Plus (App Confidence 3.3, GenAI Confidence 3)</b> scored slightly higher as it allows users to opt out of training on their input data.</p></li><li><p><b>ChatGPT Team (App Confidence 4.3, GenAI Confidence 3)</b> improved further with added collaboration safeguards and configurable data retention windows.</p></li><li><p><b>ChatGPT Enterprise (App Confidence 4.3, GenAI Confidence 4)</b> achieved the highest score, as training on input data is disabled by default while retaining the enhanced controls from the Team tier.</p></li></ul>
    <div>
      <h2>A detailed look at our rubric</h2>
      <a href="#a-detailed-look-at-our-rubric">
        
      </a>
    </div>
    <p>We now walk through the details of the rubric behind each of our Scores.</p>
    <div>
      <h3>Application Confidence Score (5.0 Points Total)</h3>
      <a href="#application-confidence-score-5-0-points-total">
        
      </a>
    </div>
    <p>This half evaluates the app's overall maturity as a SaaS service, drawing from enterprise best practices.</p><p><b>Regulatory Compliance:</b> Checks for key certifications that signal operational maturity. We selected these because they represent proven frameworks that demonstrate a commitment to widely-adopted security and data protection best practices.</p><ul><li><p><a href="https://www.aicpa-cima.com/topic/audit-assurance/audit-and-assurance-greater-than-soc-2"><u>SOC 2</u></a>: .4 points </p></li><li><p><a href="https://eur-lex.europa.eu/eli/reg/2016/679/oj/eng"><u>GDPR</u></a>: .4 points </p></li><li><p><a href="https://www.iso.org/standard/27001"><u>ISO 27001</u></a>: .4 points </p></li></ul><p><b>Data Management Practices: </b>Focuses on how data is retained and shared to minimize exposure. These criteria were chosen as they directly impact the risk of data leaks or misuse, based on common vulnerabilities we've observed in SaaS environments and our own legal/GRC team’s experience assessing third-party SaaS applications at Cloudflare.</p><ul><li><p><b>Documented data retention window:</b>  Shorter retention limits risk.</p><ul><li><p>0 day retention: .5 points</p></li><li><p>30 day retention: .4 points</p></li><li><p>60 day retention: .3 points</p></li><li><p>90 day retention: .1 point</p></li><li><p>No documented retention window: 0 points</p></li></ul></li><li><p><b>Third-party sharing:</b> No sharing means less external exposure of enterprise data. Sharing for advertising purposes means high risk of third parties mining and using the data.</p><ul><li><p>No third-party sharing: .5 points.</p></li><li><p>Sharing only for troubleshooting/support: .25 points</p></li><li><p>Sharing for other reasons like advertising or end user targeting: 0 points</p></li></ul></li></ul><p><b>Security Controls:</b> We prioritized these because they form the foundational defenses against unauthorized access, drawing from best practices that have prevented incidents in cloud services.</p><ul><li><p>MFA support: .2 points.</p></li><li><p>Role-based access: .2 points.</p></li><li><p>Session monitoring: .2 points.</p></li><li><p>TLS 1.3: .2 points.</p></li><li><p>SSO support: .2 points.</p></li></ul><p><b>Security reports and incident history:</b> Rewards transparency and deducts for recent issues. This was included to emphasize accountability, as a history of breaches or proactive transparency often indicates how seriously a provider takes security.</p><ul><li><p>Published safety framework and bug bounty: 1 point.</p><ul><li><p>To get full points the company needs to have <b>both</b> of the following: </p><ul><li><p>A publicly accessible page (e.g., security, trust, or safety) that includes a comprehensive whitepaper, framework overview, OR detailed security documentation that covers:</p><ul><li><p>Encryption in transit and at rest</p></li><li><p>Authentication and authorization mechanisms</p></li><li><p>Network or infrastructure security design</p></li></ul></li><li><p>Incident Response Transparency - Published vulnerability disclosure or bug bounty policy OR a documented incident response process and security advisory archive.</p></li></ul></li><li><p>Example: Google has a <a href="https://bughunters.google.com/"><u>bug bounty program</u></a>, a whitepaper providing an overview of their <a href="https://cloud.google.com/docs/security/overview/whitepaper"><u>security posture</u></a>, as well as a <a href="https://transparencyreport.google.com/"><u>transparency report</u></a>. </p></li></ul></li><li><p>No commitments or weak security framework with the lack of any of the above criteria. If the company only has one of the criteria above but lacks the other they will also receive no credit: 0 points.</p><ul><li><p>Example: Lovable who has a security page but seems to lack many other parts of the criteria: https://lovable.dev/security</p></li></ul></li><li><p>If there has been a material breach in the last two years. If the company has experienced a material cybersecurity incident that resulted in the unauthorized disclosure of customer data to external parties (e.g., data posted, sold, or otherwise made accessible outside the organization). Incident must be publicly acknowledged by the company through a trust center update, press release, incident notification page, or an official regulatory filing: Full deduction to 0.</p><ul><li><p>Example: <a href="https://blog.23andme.com/articles/addressing-data-security-concerns"><u>23andMe </u></a>suffered credential stuffing attack in 2023 that resulted in the exposure of user data.</p></li></ul></li></ul><p><b>Financial Stability:</b> Gauges long-term viability of the company behind the application. We added this because a company’s financial health affects its ability to invest in ongoing security and support, and reduces the risk of sudden disruptions, corner-cutting, bankruptcy or sudden sale of user data to unknown third parties.</p><ul><li><p>Public company or private with &gt;$300M raised: .8 points.</p></li><li><p>Private with &gt;$100M raised: .5 points.</p></li><li><p>Private with &lt;$100M raised: .2 point.</p></li><li><p>Recent bankruptcy/distress (e.g. recent bankruptcy filings, major layoffs tied to funding shortfalls, failure to meet debt obligations): 0 points.</p></li></ul>
    <div>
      <h3>Gen-AI Confidence Score (5.0 Points Total)</h3>
      <a href="#gen-ai-confidence-score-5-0-points-total">
        
      </a>
    </div>
    <p>This Score zooms in on AI-specific risks, like data usage in training and input vulnerabilities.</p><p><b>Regulatory Compliance,  </b><a href="https://www.iso.org/standard/42001"><b><u>ISO 42001</u></b></a><b>:</b> ISO 42001 is a new certification for AI management systems. We chose this emerging standard because it specifically addresses <a href="https://www.cloudflare.com/the-net/building-cyber-resilience/ai-data-governance/"><u>AI governance</u></a>, filling a gap in traditional certifications and signaling forward-thinking risk management.</p><ul><li><p>ISO 42001 Compliant: 1 point.</p></li><li><p>Not ISO 42001 Compliant: 0 points.</p></li></ul><p><b>Deployment Security Model:</b> Stronger access controls get higher points. Authentication not only controls access but also enables monitoring and logging. This makes it easier to detect misuse and investigate incidents. Public, unauthenticated access is a red flag for shadow IT risk.</p><ul><li><p>Authenticated web portal or key-protected API with rate limiting: 1 point.</p></li><li><p>Unprotected public access: 0 points.</p></li></ul><p><b>Model Card:</b>  A model card is a concise document that provides essential information about an AI model, similar to a nutrition label for a food product. It is crucial for AI safety and security because it offers transparency into a model's design, training data, limitations, and potential biases, enabling developers and users to understand its risks and use it responsibly. Some leading AI providers have committed to providing model cards as public documentation of safety evaluations. We included this in our rubric to encourage the industry to broadly adopt model cards as a best practice. As the practice of model cards is further developed and standardized across the industry, we hope to incorporate more fine-grained details from model cards into our own risk scores. But for now, we only include the existence (or lack thereof) of a model card in our score.</p><ul><li><p>Has its own model card: 1 point.</p></li><li><p>Uses a model with a model card: .5 points.</p></li><li><p>None: 0 points.</p></li></ul><p><b>Training on user prompts:</b> This is one of the most important components of our score.  Models that train on user prompts are very risky because users might share sensitive corporate information in user prompts. We weighted this heavily because <a href="https://www.cloudflare.com/learning/ai/how-to-secure-training-data-against-ai-data-leaks/">control over training data</a> is central to preventing unintended data exposure, a core <a href="https://www.cloudflare.com/the-net/generative-ai-zero-trust/"><u>risk in generative AI</u></a> that can lead to major incidents.</p><ul><li><p>Explicit opt-in is required for training on user prompts: 2 points.</p></li><li><p>Opt-out of training on user prompts is explicitly available to users: 1 point.</p></li><li><p>No way to opt out of training on user prompts: 0 points.</p></li></ul><p>Here's an example of these Scores applied to a few popular AI providers.  As expected, enterprise tiers typically earn higher Confidence Scores than consumer tiers of the same AI provider.</p>
<table><thead>
  <tr>
    <th><span>Company</span></th>
    <th><span>Application Score</span></th>
    <th><span>Gen AI Score</span></th>
  </tr>
  <tr>
  </tr></thead>
<tbody>
  <tr>
    <td><span>Gemini Free</span></td>
    <td><span>3.8</span></td>
    <td><span>4.0</span></td>
  </tr>
  <tr>
    <td><span>Gemini Pro</span></td>
    <td><span>3.8</span></td>
    <td><span>5.0</span></td>
  </tr>
  <tr>
    <td><span>Gemini Ultra</span></td>
    <td><span>4.1</span></td>
    <td><span>5.0</span></td>
  </tr>
  <tr>
    <td><span>Gemini Business</span></td>
    <td><span>4.7</span></td>
    <td><span>5.0</span></td>
  </tr>
  <tr>
    <td><span>Gemini Enterprise</span></td>
    <td><span>4.7</span></td>
    <td><span>5.0</span></td>
  </tr>
  <tr>
    <td></td>
    <td></td>
    <td></td>
  </tr>
  <tr>
    <td><span>OpenAI Free</span></td>
    <td><span>3.3</span></td>
    <td><span>1.0</span></td>
  </tr>
  <tr>
    <td><span>OpenAI Plus</span></td>
    <td><span>3.3</span></td>
    <td><span>3.0</span></td>
  </tr>
  <tr>
    <td><span>OpenAI Pro</span></td>
    <td><span>3.3</span></td>
    <td><span>3.0</span></td>
  </tr>
  <tr>
    <td><span>OpenAI Team</span></td>
    <td><span>4.3</span></td>
    <td><span>3.0</span></td>
  </tr>
  <tr>
    <td><span>OpenAI Enterprise</span></td>
    <td><span>4.3</span></td>
    <td><span>4.0</span></td>
  </tr>
  <tr>
    <td></td>
    <td></td>
    <td></td>
  </tr>
  <tr>
    <td><span>Anthropic Free</span></td>
    <td><span>3.9</span></td>
    <td><span>5.0</span></td>
  </tr>
  <tr>
    <td><span>Anthropic Pro</span></td>
    <td><span>3.9</span></td>
    <td><span>5.0</span></td>
  </tr>
  <tr>
    <td><span>Anthropic Max</span></td>
    <td><span>3.9</span></td>
    <td><span>5.0</span></td>
  </tr>
  <tr>
    <td><span>Anthropic Team</span></td>
    <td><span>4.9</span></td>
    <td><span>5.0</span></td>
  </tr>
  <tr>
    <td><span>Anthropic Enterprise</span></td>
    <td><span>4.9</span></td>
    <td><span>5.0</span></td>
  </tr>
</tbody></table><p><i>Note: Confidence scores are provided "as is” for informational purposes only and should not be considered a substitute for independent analysis or decision-making. All actions taken based on the scores are the sole responsibility of the user.</i></p>
    <div>
      <h2>We’re just getting started…</h2>
      <a href="#were-just-getting-started">
        
      </a>
    </div>
    <p>We're actively refining our scoring methodology. To that end, we're collaborating with a diverse group of experts in the AI ecosystem (including researchers, legal professionals, SOC teams, and more) to fine-tune our scores, optimize for transparency, accountability and extensibility. If you have insights, suggestions, or want to get involved testing new functionality, we’d love for you to <a href="https://www.cloudflare.com/lp/ai-security-user-research-program-2025"><u>express interest in our user research program</u></a>. We'd very much welcome your feedback on this scoring rubric. </p><p>Today, we’re just releasing our scoring rubric in order to solicit feedback from the community. But soon, you'll start seeing these Cloudflare Application Confidence Scores integrated into the Application Library in our SASE platform. Customers can simply click or hover over any score to reveal a detailed breakdown of the rubric and underlying components of the score. Again, if you see any issues with our scoring, please submit your feedback to <a><u>app-confidence-scores@cloudflare.com</u></a>, and our team will review it and make adjustments if appropriate. </p><p>Looking even further ahead, we plan to enable integration of these scores directly into <a href="https://developers.cloudflare.com/cloudflare-one/policies/gateway/"><u>Cloudflare Gateway</u></a> and <a href="https://developers.cloudflare.com/cloudflare-one/policies/access/"><u>Access</u></a>, allowing our customers to write policies that block or redirect traffic, apply <a href="https://developers.cloudflare.com/cloudflare-one/policies/data-loss-prevention/"><u>data loss prevention (DLP)</u></a> or <a href="https://developers.cloudflare.com/cloudflare-one/policies/browser-isolation/"><u>remote browser isolation (RBI)</u></a> or otherwise control access to sites based directly on their Cloudflare Application Confidence Score. </p><p>This is just the beginning. By prioritizing transparency in our approach, we're not only bridging a critical gap in <a href="https://www.cloudflare.com/learning/access-management/what-is-sase/">SASE capabilities</a> but also driving the industry toward stronger AI safety practices. Let us know what you think!</p><p>If you’re ready to manage risk more effectively with these Confidence Scores, <a href="https://www.cloudflare.com/products/zero-trust/plans/enterprise/?utm_medium=referral&amp;utm_source=blog&amp;utm_campaign=2025-q3-acq-gbl-connectivity-ge-ge-general-ai_week_blog"><u>reach out to Cloudflare experts for a conversation</u></a>.</p> ]]></content:encoded>
            <category><![CDATA[AI Week]]></category>
            <category><![CDATA[Cloudflare One]]></category>
            <category><![CDATA[Cloudflare Zero Trust]]></category>
            <category><![CDATA[SASE]]></category>
            <category><![CDATA[AI]]></category>
            <category><![CDATA[AI-SPM]]></category>
            <guid isPermaLink="false">4U0WvN8BMpHUPypHmF1Xun</guid>
            <dc:creator>Ayush Kumar</dc:creator>
            <dc:creator>Sharon Goldberg</dc:creator>
        </item>
        <item>
            <title><![CDATA[Cloudflare named a Strong Performer in Email Security by Forrester]]></title>
            <link>https://blog.cloudflare.com/cloudflare-named-a-strong-performer-in-email-security-by-forrester/</link>
            <pubDate>Fri, 30 May 2025 14:30:00 GMT</pubDate>
            <description><![CDATA[ Forrester has recognized Cloudflare Email Security as a Strong Performer in the ‘current offering’ category in “The Forrester Wave™: Email, Messaging, And Collaboration Security Solutions. ]]></description>
            <content:encoded><![CDATA[ <p>Today, we are excited to announce that Forrester has recognized <a href="https://www.cloudflare.com/zero-trust/products/email-security/"><u>Cloudflare Email Security</u></a> as a Strong Performer and among the top three providers in the ‘current offering’ category in “The Forrester Wave™: Email, Messaging, And Collaboration Security Solutions, Q2 2025” report. Get a complimentary copy of the report <a href="https://www.cloudflare.com/lp/forrester-wave-email-security-2025/"><u>here</u></a>. </p><p>According to Forrester:</p><blockquote><p><i>“Cloudflare is a solid choice for organizations looking to augment current email, messaging, and collaboration security tooling with deep content analysis and processing and malware detection capabilities.”</i></p></blockquote>
    <div>
      <h2>Cloudflare’s top-ranked criteria</h2>
      <a href="#cloudflares-top-ranked-criteria">
        
      </a>
    </div>
    <p>In this evaluation, Forrester analyzed 10 Email Security vendors across 27 different criteria. Cloudflare received the highest scores possible in nine key evaluation criteria, and also scored among the top three in the current offering category. We believe this recognition is due to our ability to deliver stronger security outcomes across email and collaboration tools. These highlights showcase the strength and maturity of our <a href="https://www.cloudflare.com/zero-trust/products/email-security/"><u>Email Security</u></a> solution:</p>
    <div>
      <h4><b>Antimalware &amp; sandboxing</b></h4>
      <a href="#antimalware-sandboxing">
        
      </a>
    </div>
    <p>Cloudflare’s advanced sandboxing engine analyzes files, whether directly attached or linked via cloud storage, using both static and dynamic analysis. Our AI-powered detectors evaluate attachment structure and behavior in real time, enabling protection not only against known <a href="https://www.cloudflare.com/learning/ddos/glossary/malware/">malware</a> but also emerging threats.</p>
    <div>
      <h4><b>Malicious URL detection &amp; web security</b></h4>
      <a href="#malicious-url-detection-web-security">
        
      </a>
    </div>
    <p>URLs are analyzed at delivery and again at click-time using Cloudflare’s global network. Our OCR and machine learning models extract and analyze metadata and page behavior to determine the maliciousness of a URL. Customers can also isolate suspicious links in remote browser sessions preventing user compromise. We continuously monitor URLs and retroactively remediate messages if the risk changes.</p>
    <div>
      <h4><b>Threat intelligence</b></h4>
      <a href="#threat-intelligence">
        
      </a>
    </div>
    <p>With over 4.4 trillion signals ingested daily across <a href="https://www.cloudflare.com/learning/dns/what-is-dns/">DNS</a>, <a href="https://www.cloudflare.com/learning/ddos/glossary/hypertext-transfer-protocol-http/">HTTP</a>, and email layers, Cloudflare operates one of the most comprehensive real-time threat intelligence ecosystems. Campaigns observed via our DNS or HTTP layers are used to preemptively block related email threats well before traditional feeds.</p>
    <div>
      <h4><b>Content analysis &amp; processing</b></h4>
      <a href="#content-analysis-processing">
        
      </a>
    </div>
    <p>Cloudflare uses an ensemble of <a href="https://www.cloudflare.com/learning/ai/what-is-large-language-model/">large language models (LLMs)</a>, <a href="https://www.cloudflare.com/learning/ai/natural-language-processing-nlp/">natural language processing (NLP)</a> techniques, and <a href="https://www.cloudflare.com/learning/ai/what-is-machine-learning/">machine learning (ML)</a> classifiers to analyze message tone, thread behavior, QR codes, and invoice language. These models detect indicators of fraud, <a href="https://www.cloudflare.com/learning/email-security/business-email-compromise-bec/">business email compromise (BEC)</a>, and social engineering that legacy engines often miss.</p>
    <div>
      <h4><b>Reporting &amp; dashboards</b></h4>
      <a href="#reporting-dashboards">
        
      </a>
    </div>
    <p>Cloudflare’s unified <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust</a> dashboard gives SOC teams full visibility across email, web, cloud, data events. Analysts can pivot across user activity in just a few clicks and export data when needed. </p>
    <div>
      <h4><b>User quarantine</b></h4>
      <a href="#user-quarantine">
        
      </a>
    </div>
    <p>Our quarantine workflow is designed to minimize disruption. Customers can choose several ways to get notifications to users about messages that have been quarantined. </p>
    <div>
      <h4><b>Email authentication</b></h4>
      <a href="#email-authentication">
        
      </a>
    </div>
    <p>Cloudflare enforces <a href="https://developers.cloudflare.com/radar/glossary/#authentication-methods"><u>SPF, DKIM, and DMARC</u></a> alignment automatically. We also offer a <a href="https://developers.cloudflare.com/dmarc-management/"><u>free DMARC reporting tool </u></a>that gives customers visibility into email authentication failures and helps them take control of email brand protection.</p>
    <div>
      <h4><b>Product security</b></h4>
      <a href="#product-security">
        
      </a>
    </div>
    <p>Security is core to Cloudflare’s DNA. All services undergo continuous penetration testing, adhere to <a href="https://www.cloudflare.com/trust-hub/compliance-resources/"><u>SOC 2 Type II and ISO 27001 standards</u></a>, and operate on Cloudflare’s own infrastructure.</p>
    <div>
      <h4><b>Partner ecosystem</b></h4>
      <a href="#partner-ecosystem">
        
      </a>
    </div>
    <p>Cloudflare integrates natively with Splunk, Microsoft Sentinel, Palo Alto XSOAR, and ServiceNow, making it easy to bring Cloudflare Email Security into existing SOC workflows. We also partner with leading human risk and awareness platforms to give organizations a more user-centric view of risk and behavior.</p><p>These strengths reflect Cloudflare’s commitment to building a comprehensive email security platform, one that’s designed to protect email inboxes and workspaces. </p>
    <div>
      <h2>Our email vision</h2>
      <a href="#our-email-vision">
        
      </a>
    </div>
    <p>We agree with Forrester’s perspective on where the email security market is headed. Across our customer base, from Fortune 100 enterprises to fast-growing startups, we’ve seen a clear evolution:</p><p><b><i><u>Phishing is no longer confined to the inbox.</u></i></b></p><p>Attackers are increasingly luring users into external apps, unaudited chat platforms, or legitimate third-party services, bypassing traditional security controls. This shift is forcing SOC teams to think beyond just email and adopt a more holistic approach to workspace security.</p><p>Cloudflare was one of the first vendors to position email security as part of a broader <a href="https://www.cloudflare.com/zero-trust/products/"><u>SASE and Zero Trust</u></a> strategy, securing not just messages, but the entire user surface. Looking ahead, we’re doubling down on this integrated vision of workspace security to give SOC teams simpler investigations and faster response.</p>
    <div>
      <h3>What’s next: our strategic focus</h3>
      <a href="#whats-next-our-strategic-focus">
        
      </a>
    </div>
    <p>We will continue to:</p><ul><li><p><b>Build AI-driven automation
</b>Reduce alert fatigue and manual triage by using LLMs to summarize incidents, auto-label threats, and recommend next steps, allowing junior analysts to act with senior-level confidence.</p></li><li><p><b>Deepen integrations across the Cloudflare ecosystem
</b>Continue to unify signals across email, web, cloud, and data to give security teams a single view of user behavior driving faster remediations.</p></li><li><p><b>Enhance real-time user coaching
</b>Deliver contextual guidance at the moment of risk, whether via banners, isolation flows, or in-app warnings, to help users make safer and more informed decisions.</p></li><li><p><b>Develop best-in-class detections
</b>Continue investing in advanced models detecting new and novel phishing campaigns by leveraging global telemetry from our network edge to stop novel threats faster.</p></li></ul><p>Cloudflare has always approached email security not as a standalone point solution, but as a core pillar of unified threat protection, deeply integrated across the modern enterprise security stack.</p>
    <div>
      <h2>Ready to enhance your email security?</h2>
      <a href="#ready-to-enhance-your-email-security">
        
      </a>
    </div>
    <p>We provide all organizations (whether a Cloudflare customer or not) with free access to our <a href="https://blog.cloudflare.com/threats-lurking-office-365-cloudflare-email-retro-scan/"><u>Retro Scan</u></a> tool, allowing them to use our predictive AI models to scan existing inbox messages. Retro Scan will detect and highlight any threats found, enabling organizations to remediate them directly in their email accounts. With these insights, organizations can implement further controls, either using Cloudflare Email Security or their preferred solution, to prevent similar threats from reaching their inboxes in the future.</p><p>If you are interested in how Cloudflare can help secure your inboxes, sign up for a phishing risk assessment <a href="https://www.cloudflare.com/lp/email-security-self-guided-demo-request/"><u>here</u></a>. </p><p><sub><i>Forrester does not endorse any company, product, brand, or service included in its research publications and does not advise any person to select the products or services of any company or brand based on the ratings included in such publications. Information is based on the best available resources. Opinions reflect judgment at the time and are subject to change. For more information, read about Forrester’s objectivity </i></sub><a href="https://www.forrester.com/about-us/objectivity/"><sub><i>here.</i></sub></a><sub></sub></p> ]]></content:encoded>
            <category><![CDATA[Forrester]]></category>
            <category><![CDATA[Email Security]]></category>
            <guid isPermaLink="false">1V8L0Y4ySPeme0LzUNSodX</guid>
            <dc:creator>Ayush Kumar</dc:creator>
        </item>
        <item>
            <title><![CDATA[Enhance data protection in Microsoft Outlook with Cloudflare One’s new DLP Assist]]></title>
            <link>https://blog.cloudflare.com/enhance-data-protection-in-microsoft-outlook-with-cloudflare-ones-new-dlp/</link>
            <pubDate>Fri, 21 Mar 2025 13:00:00 GMT</pubDate>
            <description><![CDATA[ Customers can now easily safeguard sensitive data in Microsoft Outlook with our new DLP Assist feature. ]]></description>
            <content:encoded><![CDATA[ <p><a href="https://developers.cloudflare.com/cloudflare-one/email-security/"><u>Cloudflare Email Security</u></a> customers using Microsoft Outlook can now enhance their data protection using our new <a href="https://developers.cloudflare.com/cloudflare-one/email-security/outbound-dlp/"><u>DLP Assist</u></a> capability. This application scans emails in real time as users compose them, identifying potential <a href="https://www.cloudflare.com/learning/access-management/what-is-dlp/"><u>data loss prevention (DLP)</u></a> violations, such as Social Security or credit card numbers. Administrators can instantly alert users of violations and take action downstream, whether by blocking or encrypting messages, to prevent sensitive information from leaking. DLP Assist is lightweight, easy to deploy, and helps organizations maintain compliance without disrupting workflow.</p>
    <div>
      <h3>Making DLP more accessible</h3>
      <a href="#making-dlp-more-accessible">
        
      </a>
    </div>
    <p>After speaking with our customers, we discovered a common challenge: many wanted to implement a data loss prevention policy for Outlook, but found existing solutions either too complex to set up or too costly to adopt.</p><p>That’s why we created DLP Assist to be a lightweight application that can be installed in minutes. Unlike other solutions, it doesn’t require changes to outbound email connectors or provide concerns about IP reputation to customers. By fully leveraging the Microsoft ecosystem, DLP Assist makes email DLP accessible to all organizations, whether they have dedicated IT teams or none at all.</p><p>We also recognized that traditional DLP solutions often demand significant financial investment in not just software but also in team members to configure and monitor them. DLP Assist aims to eliminate these barriers. Customers can use the application as part of our Email Security product, avoiding the need for additional purchases. Plus, with our DLP engine powered by optical character recognition (OCR), confidence levels, and other detection mechanisms, organizations don’t need a dedicated team to constantly oversee it. </p><p>By eliminating the complexities of legacy DLP and email systems, we allow customers to quickly begin preventing the unauthorized egress of sensitive data. With DLP Assist, organizations can be confident in controlling and protecting the information that leaves their environment.</p>
    <div>
      <h3>How does it work?</h3>
      <a href="#how-does-it-work">
        
      </a>
    </div>
    <p>Our DLP Assist is an application that integrates with the Desktop (Mac and Windows) and Web Outlook clients, passively scanning emails as they are composed. Running in the background within Microsoft Outlook, DLP Assist continuously monitors new text and attachments added to emails that users are drafting. </p><p>When a customer downloads and installs the application, Cloudflare creates a unique client ID specifically for emails read from the DLP Assist application, which serves as an identifier solely for use by DLP Assist within Cloudflare’s backend. When a user begins drafting a message, the DLP Assist application invokes several Microsoft Outlook APIs to gather information about how the message is changing. These APIs let the Cloudflare application continuously access different parts of the message like subject, body, attachments, etc. While the application is reading the changes within the message, it also establishes a secure, encrypted connection with a Cloudflare Worker. </p><p>As raw data about the email and attachments is sent to the Worker, the Worker relays the information to our DLP engine, which is at the heart of our scanning process. It leverages OCR technology to analyze attachments, extract text from images, and detect DLP violations across both email content and embedded data. It also examines raw text to ensure a comprehensive analysis of every part of the email and its attachments. While our engine supports most attachment types, it currently does not process video or audio files.</p><p>The DLP engine runs on all of our servers, and we also store the customer DLP profile configuration data on all of our servers. By keeping DLP policy configuration data on all servers alongside our analysis engine, we eliminate the need to reroute requests across our network allowing for low-latency, real-time DLP checks. The customer's client ID enables us to find and apply their defined DLP profiles and accurately determine policy violations, delivering results directly to the Cloudflare Worker. If a violation is found, the Worker responds to the application to take action within Outlook. </p><p>Our architecture ensures real-time scanning with minimal latency, as end users are always near a Cloudflare Worker, regardless of their location. Additionally, this design provides built-in resilience — if a Cloudflare Worker becomes unavailable, another can take over, allowing for uninterrupted DLP enforcement. By scanning in real time, this allows us to provide immediate feedback to the user about any DLP violations that they have within their email, rather than the user having to wait till the message has been sent. </p><p>If a violation is detected, the application first displays an insight message — a ribbon notification at the top of the email — alerting the user to the issue. Administrators have full control over this message and can customize it to provide specific guidance or warnings. We find that most of our customers point users to documentation reminding them what is allowed to be sent outside of the organization. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4X9uiCNNus3Y9t1hNNK1vi/d6782435b13f06719f7d75cb306b2231/image3.png" />
          </figure><p>When a DLP violation occurs, DLP Assist also injects a header into the <a href="https://www.adobe.com/acrobat/resources/document-files/eml.html"><u>EML file</u></a> to indicate the violation. If the user removes the content that is in violation, the header is automatically removed as well.</p><p>If the violation remains unchanged, DLP Assist invokes a Microsoft Outlook API which prompts the user with a final warning, giving them another opportunity to revise the message before sending.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2If0U9oDTYW5j5mbm4Gt5r/e7297064f8f1e7e820c962c1bfd7e673/image6.png" />
          </figure><p>If the user proceeds without making changes, the email will be sent from the client with headers embedded into the EML showing that message contains a DLP violation. Organizations can configure their outbound <a href="https://www.cloudflare.com/learning/email-security/what-is-a-mail-server/"><u>mail transfer agent (MTA)</u></a> to take appropriate action based on these headers. For those with Microsoft as their outbound MTA, Cloudflare’s DLP Assist integrates with <a href="https://learn.microsoft.com/en-us/purview/purview"><u>Microsoft Purview</u></a>, enabling organizations to block, encrypt, or require approval before sending.</p><p>For example, if an organization configures Purview to block the email, users will receive a notification similar to this one.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1FIuUhcuMC0kQPivQRIA5V/459a4acbaaa04bc007dc3829c4ed8d14/image5.png" />
          </figure><p>Violations detected by the DLP Assist application can also be sent externally through our <a href="https://developers.cloudflare.com/logs/about/"><u>Logpush</u></a> feature. Customers have the flexibility to integrate this data with SIEM or SOAR platforms for deeper analysis, or store it in bucket storage solutions like Cloudflare <a href="https://developers.cloudflare.com/r2/"><u>R2</u></a>. Additionally, customers can enhance their reporting capabilities by viewing block data directly within their outbound gateway.</p><p>As we continue to improve our DLP engine, we're introducing more advanced ways to analyze messages. During Security Week 2025, we’re unveiling new AI methodologies that automatically fine-tune DLP confidence levels using machine learning models. Initially, these enhancements will be rolled out for Gateway violations, but we plan to extend them to email scanning in the near future. For more details, see the associated <a href="https://blog.cloudflare.com/improving-data-loss-prevention-accuracy-with-ai-context-analysis/"><u>blog post</u></a>. </p><p>Cloudflare One’s DLP Assist is designed for quick deployment, enabling organizations to implement a data loss prevention solution with minimal effort. It allows customers to immediately begin scanning emails for sensitive data and take action to prevent unauthorized sharing, ensuring compliance and security from day one.</p>
    <div>
      <h3>How can I start using it?</h3>
      <a href="#how-can-i-start-using-it">
        
      </a>
    </div>
    <p>To get started, navigate to the Zero Trust dashboard and click on the Email Security tab. From there, select the Outbound DLP tab.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1FMrBrIsDS15sdUU9HUW56/1b25031717fde5411c286e27f2836f6a/image2.png" />
          </figure><p>To install DLP Assist, organizations can download the manifest file, which provides Microsoft with the necessary instructions to install the application within Outlook. Administrators can then upload this manifest file by going to Integrated Apps within the Microsoft 365 Admin Center and selecting Upload Custom Apps:</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3twUf3WW6eb7GsNdxNG6w6/f5244c2c9d801bd78a33537abd5fd9c4/image4.png" />
          </figure><p><i><sup>This application is best suited for use with OWA (Outlook Web Access) and the desktop (Mac and Windows) Outlook client. Due to Microsoft limitations, a stable experience on mobile devices is not yet available.</sup></i></p><p>More information can be found within our <a href="https://developers.cloudflare.com/cloudflare-one/email-security/outbound-dlp/"><u>developer documentation</u></a>. </p>
    <div>
      <h3>What's next?</h3>
      <a href="#whats-next">
        
      </a>
    </div>
    <p>We’re continuously expanding our solutions to help organizations protect their data. Exciting new DLP and Email Security features are on the way throughout 2025, so stay tuned for upcoming announcements.</p><p>To learn more about our DLP and Email Security solutions, reach out to your Cloudflare representative. Want to see our detections in action? Run a free <a href="https://blog.cloudflare.com/threats-lurking-office-365-cloudflare-email-retro-scan/"><u>Retro Scan</u></a> to uncover any potentially malicious messages hiding in your inbox.</p> ]]></content:encoded>
            <category><![CDATA[Security Week]]></category>
            <category><![CDATA[Email Security]]></category>
            <category><![CDATA[Data Loss]]></category>
            <category><![CDATA[Data Loss Prevention]]></category>
            <guid isPermaLink="false">tNeYTGhykKxYbzGItvS5M</guid>
            <dc:creator>Ayush Kumar</dc:creator>
            <dc:creator>Noelle Kagan</dc:creator>
            <dc:creator>Warnessa Weaver</dc:creator>
        </item>
        <item>
            <title><![CDATA[Email Security now available for free for political parties and campaigns through Cloudflare for Campaigns]]></title>
            <link>https://blog.cloudflare.com/email-security-now-available-for-free-for-political-parties-and-campaigns/</link>
            <pubDate>Mon, 17 Mar 2025 13:00:00 GMT</pubDate>
            <description><![CDATA[ We’re excited to announce that Cloudflare for Campaigns now includes Email Security, adding an extra layer of protection to email systems that power political campaigns. ]]></description>
            <content:encoded><![CDATA[ <p>At Cloudflare, we believe that every political candidate — regardless of their affiliation — should be able to run their campaign without the constant worry of cyber attacks. Unfortunately, malicious actors, such as nation-states, financially motivated attackers, and hackers, are often looking to disrupt campaign operations and messaging. These threats have the potential to interfere with the democratic process, weaken public confidence, and cause operational challenges for campaigns of all scales.</p><p>In 2020, in partnership with the non-profit, non-partisan <a href="https://defendcampaigns.org/"><u>Defending Digital Campaigns</u> </a>(DDC), we launched <a href="https://www.cloudflare.com/campaigns/usa/"><u>Cloudflare for Campaigns</u></a> to offer a free package of cybersecurity tools to political campaigns, especially smaller ones with limited resources. Since then, we have helped over 250 political campaigns and parties across the US, regardless of affiliation.</p><p>This is why we are excited to announce that we have extended our Cloudflare for Campaigns product suite to include <a href="https://www.cloudflare.com/zero-trust/products/email-security/"><u>Email Security</u></a>, to secure email systems that are essential to safeguarding the integrity and success of a political campaign. By preventing phishing, spoofing, and other email threats, it helps protect candidates, staff, and supporters from cyberattacks that could compromise sensitive data.</p>
    <div>
      <h3>The front line of protection is email security  </h3>
      <a href="#the-front-line-of-protection-is-email-security">
        
      </a>
    </div>
    <p><a href="https://www.cloudflare.com/learning/access-management/phishing-attack/"><u>Phishing attacks</u></a> on political campaigns have been a major cybersecurity threat in recent years, often leading to data breaches, leaks, and misinformation. In 2016,<a href="https://www.washingtonpost.com/world/national-security/how-the-russians-hacked-the-dnc-and-passed-its-emails-to-wikileaks/2018/07/13/af19a828-86c3-11e8-8553-a3ce89036c78_story.html"> <u>attackers targeted</u></a> Democratic National Committee (DNC) staff with <a href="https://www.cloudflare.com/learning/access-management/spear-phishing/"><u>spear phishing emails</u></a> disguised as Google security alerts, allowing hackers to access thousands of emails. In 2018, Russian intelligence agents<a href="https://www.npr.org/2018/07/26/632897181/russian-agents-unsuccessfully-tried-to-hack-sen-claire-mccaskills-campaign"> <u>attempted to infiltrate</u></a> Senator Claire McCaskill's re-election campaign by sending emails to her staff, urging them to change their passwords. </p><p>This unsettling trend has affected political parties as well. In 2020, the Republican Party of Wisconsin fell <a href="https://cyberscoop.com/wisconsin-gop-alleges-late-race-hack-cost-party-2-3-million-from-fund-to-reelect-trump/"><u>victim to a phishing attack</u></a> that resulted in hackers stealing $2.3 million. </p><p>During the<a href="https://blog.cloudflare.com/securing-the-inboxes-of-democracy/"> <u>2022 US midterm elections</u></a>, Cloudflare safeguarded the email inboxes of more than 100 campaigns, election officials, and public organizations involved in the election process. These ranged from first-time candidates in local races to seasoned incumbents at the national level. In the three months leading up to the 2022 midterms, Cloudflare processed over 20 million emails and successfully blocked around 150,000 phishing attempts targeting campaign staff. </p><p>During the <a href="https://blog.cloudflare.com/exploring-internet-traffic-shifts-and-cyber-attacks-during-the-2024-us-election/"><u>2024 US election</u></a>, we actively protected state and local election offices, political campaigns, state parties, independent media, and voting rights organizations. In addition, we safeguarded the inboxes of hundreds of political campaigns, ensuring secure and uninterrupted communications to help campaigns focus on their message and outreach without the fear of cyberattack derailing their efforts. Over the course of the year, Cloudflare:</p><ul><li><p>Scanned 5.7 million emails for campaigns and political parties </p></li><li><p>Blocked 400,000 malicious messages before they reached campaign staff and teams</p></li><li><p>Detected and blocked 21,000 suspicious emails</p></li><li><p>Prevented 14,000 unique spoofing attempts</p></li></ul>
    <div>
      <h3>Providing tools to help political campaigns and parties stay secure online </h3>
      <a href="#providing-tools-to-help-political-campaigns-and-parties-stay-secure-online">
        
      </a>
    </div>
    <p>We launched <a href="https://blog.cloudflare.com/introducing-cloudflare-for-campaigns/"><u>Cloudflare for Campaigns in 2020</u></a> to help political campaigns stay online amid cyber attacks. US campaign finance laws prohibit corporations from donating money or services to federal candidates or parties. However, we partner with Defending Digital Campaigns (DDC), approved by the Federal Election Commission, to offer free and discounted cybersecurity services. Through DDC, we provide tailored security solutions for resource-limited campaigns and parties facing heightened cyber threats.</p><blockquote><p><i>"DDC is thrilled that Cloudflare is expanding their product offerings to campaigns with the addition of Email Security. This will expedite robust protections from the real and serious threats posed by phishing. Now campaigns, in concert with the DDoS protection Cloudflare provides via Cloudflare for Campaigns, will be able to easily enable a suite of core protections. This new offering further exemplifies Cloudflare's extraordinary and generous commitment to protecting campaigns. Cloudflare has been one of DDC’s core partners since we were founded."</i><i><b>  </b></i><b>– Michael Kaiser, President &amp; CEO of Defending Digital Campaigns</b></p></blockquote><p>Over five years, our partnership has strengthened protections against DDoS attacks and web vulnerabilities. However, campaigns have frequently asked for help combating malicious emails that target campaign staff. </p><p><a href="https://www.cloudflare.com/press-releases/2022/cloudflare-to-acquire-area-1-security/"><u>Cloudflare acquired Area 1 Security in 2022</u></a> to enhance its Zero Trust platform by integrating an email security solution that proactively identifies and blocks phishing threats before they reach users' inboxes. Before the acquisition, Area 1 provided low-cost email security to political campaigns with direct FEC approval. </p><p>Fast-forward to 2025, and we are excited to officially integrate Email Security into our full Cloudflare for Campaigns portfolio to better protect US political parties and campaigns.</p>
    <div>
      <h3>Access free Email Security for your political campaign or party with Cloudflare for Campaigns </h3>
      <a href="#access-free-email-security-for-your-political-campaign-or-party-with-cloudflare-for-campaigns">
        
      </a>
    </div>
    <p>Under this program, <a href="https://www.cloudflare.com/zero-trust/products/email-security/"><u>Cloudflare Email Security</u></a> is available starting today and includes: </p><ul><li><p><b>Phishing protection</b>: AI-powered threat detection that automatically identifies and blocks malicious emails before they reach their target</p></li><li><p><b>Email authentication</b>: Built-in support for <a href="https://www.cloudflare.com/learning/email-security/dmarc-dkim-spf/"><u>DMARC, DKIM, and SPF</u></a> to prevent email spoofing</p></li><li><p><b>Real-time monitoring</b>: Continuous scanning for suspicious activities and anomalies</p></li><li><p><b>Seamless integration</b>: Easily integrates with existing email providers without disrupting workflows</p></li><li><p><b>Insightful reporting</b>: Actionable analytics and reports to track security events and improve defenses</p></li></ul><p>At Cloudflare, we are committed to helping build a better Internet — one where election campaigns can operate securely, free from the threat of cyber attacks. </p><p>Current campaigns and political parties that are protected under Cloudflare for Campaigns will receive an email with information on how to enable Email Security. If you are a campaign or a political party interested in applying for the project to get access to the full suite of products, please visit <a href="https://www.cloudflare.com/campaigns/usa/"><u>https://www.cloudflare.com/campaigns/usa</u></a>.</p> ]]></content:encoded>
            <category><![CDATA[Security Week]]></category>
            <category><![CDATA[Impact]]></category>
            <category><![CDATA[Email Security]]></category>
            <category><![CDATA[Policy & Legal]]></category>
            <guid isPermaLink="false">1vrjPL7SVTINpzIEqARhsx</guid>
            <dc:creator>Jocelyn Woolbright</dc:creator>
            <dc:creator>Ayush Kumar</dc:creator>
        </item>
        <item>
            <title><![CDATA[The role of email security in reducing user risk amid rising threats]]></title>
            <link>https://blog.cloudflare.com/the-role-of-email-security-in-reducing-user-risk-amid-rising-threats/</link>
            <pubDate>Thu, 19 Dec 2024 14:00:00 GMT</pubDate>
            <description><![CDATA[ As threats evolve, SOC teams must adapt their operations. With Cloudflare’s holistic approach to managing user-based risk, SOC teams can operate more efficiently and reduce the likelihood of a breach. ]]></description>
            <content:encoded><![CDATA[ <p>Phishing remains one of the most dangerous and persistent cyber threats for individuals and organizations. Modern attacks use a growing arsenal of deceptive techniques that bypass traditional <a href="https://www.cloudflare.com/en-gb/learning/email-security/secure-email-gateway-seg/"><u>secure email gateways (SEGs)</u></a> and email authentication measures, targeting organizations, employees, and vendors. From <a href="https://www.cloudflare.com/learning/email-security/business-email-compromise-bec/"><u>business email compromise (BEC)</u></a> to <a href="https://www.cloudflare.com/en-gb/learning/security/what-is-quishing/"><u>QR phishing</u></a> and <a href="https://www.cloudflare.com/en-gb/learning/access-management/account-takeover/"><u>account takeovers</u></a>, these threats are designed to exploit weaknesses across multiple communication channels, including email, Slack, Teams, SMS, and cloud drives.</p><p>Phishing remains the most popular attack vector for bad actors looking to gain unauthorized access or extract fraudulent payment, and it is <a href="https://blog.cloudflare.com/2023-phishing-report/"><u>estimated</u></a> that 90% of all attacks <a href="https://www.cisa.gov/shields-guidance-families"><u>start</u></a> with a <a href="https://www.cloudflare.com/learning/access-management/phishing-attack/"><u>phishing</u></a> email. However, as companies have shifted to using a multitude of apps to support communication and collaboration, attackers too have evolved their approach. Attackers now engage employees across a combination of channels in an attempt to build trust and pivot targeted users to less-secure apps and devices. Cloudflare is uniquely positioned to address this trend thanks to our integrated <a href="https://www.cloudflare.com/zero-trust/"><u>Zero Trust</u></a> services, extensive visibility from protecting <a href="https://w3techs.com/technologies/overview/proxy/all"><u>approximately 20% of all websites</u></a>, and signals derived from processing billions of email messages a year.</p><p>Cloudflare recognizes that combating phishing requires an integrated approach and a more complete view of user-based risk. That’s why we’ve designed our email security solution to protect organizations before, during, and after message delivery, while also extending protection beyond email into the broader security ecosystem. Phishing is no longer just an email problem — it’s a multi-channel, cross-application threat.</p>
    <div>
      <h2>Assessing holistic user risk</h2>
      <a href="#assessing-holistic-user-risk">
        
      </a>
    </div>
    <p>When it comes to protecting against user-based threats, Cloudflare employs a platform approach to security. Instead of forcing customers to rely on an array of fragmented tools that create unnecessary complexity and blind spots, we treat email security as part of an overall strategy for assessing and responding to user-related risk. Our email security solution works in tandem with our network solutions so that SOC teams can quickly assert what actions their users are performing outside of email. Given our extensive network visibility, our platform is not limited by API integrations, and can provide SOC teams with the best visibility and protection. This helps SOC teams not only combat phishing, but begin to identify and take action against a wider range of insider threats.</p><p>Within a single, unified dashboard, SOC teams can quickly review detailed information regarding the following questions, which we discuss in more detail below: </p><ol><li><p>Who in the organization is being targeted?</p></li><li><p>Who are the attackers impersonating?</p></li><li><p>What risky behaviors are my users performing?</p></li></ol>
    <div>
      <h3>Who in the organization is being targeted?</h3>
      <a href="#who-in-the-organization-is-being-targeted">
        
      </a>
    </div>
    
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7hCZ0UXnPA7Wx5iBHxkfjE/47a143332f6c22c7e11b568b43dfdd74/BLOG-2645_2.png" />
          </figure><p>Within the Cloudflare dashboard, SOC teams can view which users are the most targeted. This can help them determine which accounts should be hardened (e.g. MFA enforced), and identify risky users that should be monitored more closely for significant deviations in behavior. One way organizations can use this information is to require high-risk users to connect from a managed device. For instance, if they use Crowdstrike, <a href="https://developers.cloudflare.com/cloudflare-one/identity/devices/service-providers/crowdstrike/"><u>we can require that these users be on a managed device</u></a> and force a posture check before letting them access sensitive applications. </p><p>SOC teams can also dive into what types of attacks are hitting their users and at what frequency.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2nVgW0EXy3qzC2hDBeJRAx/5cf8408ec72339fe8985019629912cbb/BLOG-2645_3.png" />
          </figure><p>Customers can use these insights to adjust various platform policies, effectively blocking malicious content and securing sensitive resources. Above, we can see that attackers are frequently leveraging links to try to compromise users. Based on the link analysis we are seeing in email, SOC teams can use our gateway to block similar attacks, so that when attackers try to use other communication methods (LinkedIn, Teams, Slack, etc.) users will not be able to interact with those links.</p><p>To learn more about stopping these types of multichannel phishing attacks, please see our blog post, <a href="https://blog.cloudflare.com/a-wild-week-in-phishing-and-what-it-means-for-you/"><i><u>A wild week in phishing, and what it means for you</u></i></a><i>.</i></p>
    <div>
      <h3>Who are the attackers impersonating?</h3>
      <a href="#who-are-the-attackers-impersonating">
        
      </a>
    </div>
    
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/16lvS6lNsi4TuSgtMFqBtk/b093ecb444def1bd06fb84566b5eb05a/BLOG-2645_4.png" />
          </figure><p>SOC teams can also get visibility into impersonation attempts within their email environment. Customers can see which users are being impersonated the most, and can use this information to build policies within our email security solution and broader set of Zero Trust services.</p><p>A list of frequently impersonated users can be added to the <a href="https://developers.cloudflare.com/cloudflare-one/email-security/detection-settings/impersonation-registry/"><u>impersonation registry</u></a>, which changes the sensitivity of our models to apply more scrutiny on messages coming from those users. </p><p>Given our unique position as a <a href="https://www.cloudflare.com/products/registrar/"><u>domain name registrar</u></a>, customers can also report lookalike domains to Cloudflare for action to be taken against them. This helps prevent attackers from being able to impersonate our customers and negatively impact their reputation. </p><p>Finally, customers can also use our free <a href="https://developers.cloudflare.com/dmarc-management/"><u>DMARC management</u></a> to track who is sending emails on their behalf. This information can be used to update <a href="https://www.cloudflare.com/en-gb/learning/dns/dns-records/dns-spf-record/"><u>SPF records</u></a> and get customers to <code>p=quarantine</code> or <code>p=reject</code> so that their brand is more resistant to being spoofed. </p>
    <div>
      <h3>What risky behaviors are my users performing?</h3>
      <a href="#what-risky-behaviors-are-my-users-performing">
        
      </a>
    </div>
    <p>Cloudflare provides visibility into user actions in several ways. </p><p>Within the email security solution, we can track internal messages and alert if we see any malicious or suspicious behaviors. This can be enhanced with our managed service offering, <a href="https://developers.cloudflare.com/cloudflare-one/email-security/phish-guard/"><u>Phishguard</u></a>, which can alert admins when they see any type of behavior that indicates fraud (like Business Email Compromise), account takeover, or insider threats.</p><p>SOC teams can also take advantage of our <a href="https://www.cloudflare.com/en-gb/zero-trust/products/casb/"><u>CASB solution</u></a> to view the different actions that users have performed. Actions are labeled with different risk levels to let teams know which findings are critical and require remediation. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7aiDl5Qo2PGsGYF7NfYcDT/dc49eb88beffc7b9df099d71244489c9/BLOG-2645_5.png" />
          </figure><p>Customers are also able to view data loss prevention (<a href="https://www.cloudflare.com/en-gb/zero-trust/products/dlp/"><u>DLP</u></a>) violations that users have incurred to see if there is any unauthorized egress of data. We provide the ability to automatically block this egress based on different policies within our platform, making sure there is no exfiltration of sensitive data.</p><p>We also enable organizations to put internal applications behind our <a href="https://www.cloudflare.com/en-gb/zero-trust/products/access/"><u>Access</u></a> solution. This prevents any users with improper permissions or a high risk level from accessing critical applications. Our dashboard then provides metrics on these logins to see how many failures we observed, so that SOC teams can investigate the user further. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/34LnlEK1lkpbeW5mYLSl8m/5d51092b134bfd7e2d6093a04fcfdc60/BLOG-2645_6.png" />
          </figure><p>These signals feed into our <a href="https://blog.cloudflare.com/unified-risk-posture/"><u>Unified Risk Score</u></a>, which can be exported if needed to take automated actions within other platforms.</p>
    <div>
      <h2>Increasing SOC productivity</h2>
      <a href="#increasing-soc-productivity">
        
      </a>
    </div>
    <p>With all of our functionality unified within a single interface and fed by one data lake, we see an increase in SOC productivity because teams no longer have to spend time building rules or flipping between disparate interfaces and workflows. </p>
    <div>
      <h3>AI-driven email security</h3>
      <a href="#ai-driven-email-security">
        
      </a>
    </div>
    <p>Unlike legacy secure email gateways, our email security solution is driven by predictive AI models which eliminate the need for creating and updating rules. These models are also more effective than reactive measures because they are fed by a massive volume of diverse data from across Cloudflare’s network. This means models are trained on emerging threats earlier and can identify new tactics with a higher accuracy than legacy systems. </p>
    <div>
      <h3>Automated isolation</h3>
      <a href="#automated-isolation">
        
      </a>
    </div>
    <p>To further reduce the risk posed by users visiting potentially malicious websites, customers can isolate browser sessions using our natively integrated, clientless remote browser that runs on our <a href="https://www.cloudflare.com/network"><u>global network</u></a>. Within an isolated browsing session, SOC teams can prohibit various behaviors such as copy/paste, upload/download, keyboard inputs, and more. This decreases the risk of users accessing a website and performing an action which could compromise the organization.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/65YXZvV78mjzNXvV4YLJRD/b0ef76d80edd7769a23d877ffdc25696/BLOG-2645_7.png" />
          </figure><p>Our browser isolation solution also decreases the time SOC teams need to maintain policies. Rather than adding domains and applications one by one, teams can choose to isolate based on content categories. These categories are based on our threat intelligence, and are constantly updated. This means that as new websites emerge, SOC teams do not have to spend the time to chase down and update the proper policy — rather, it is done automatically. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2aCMZRmIRp33YbGTU5Vxt6/44ca92e4e3cde07b1424b9875311dd59/BLOG-2645_8.png" />
          </figure>
    <div>
      <h3>Automated blocking</h3>
      <a href="#automated-blocking">
        
      </a>
    </div>
    <p>While some websites might require running in an isolated browser to mitigate the risk of users encountering malicious content, others may need to be fully blocked altogether. Customers can use the same process listed above to block any website that could be risky for users based on tags. However, we allow admins to also provide feedback to users to increase awareness. This can be done via a <a href="https://developers.cloudflare.com/cloudflare-one/policies/gateway/block-page/"><u>custom block page</u></a> that allows SOC teams to communicate with users about their risky behaviors, so that they take actions to curb this behavior in the future and alert their SOC teams to attacks that might be occurring. </p>
    <div>
      <h2>What's on the horizon for 2025</h2>
      <a href="#whats-on-the-horizon-for-2025">
        
      </a>
    </div>
    <p>In 2024, our email security team focused on refining the user interface and improving the incident investigation experience. Looking ahead to 2025, we plan to introduce additional capabilities that deepen the integration of our email security solution with our <a href="https://www.cloudflare.com/learning/access-management/what-is-sase/">SASE</a> platform, delivering enhanced insight and protection against user-based threats. </p>
    <div>
      <h3>Configurable browser isolation for email</h3>
      <a href="#configurable-browser-isolation-for-email">
        
      </a>
    </div>
    <p>Our Email Link Isolation feature currently applies to links we consider suspicious. However, we intend to allow customers to add customized configurations to meet their internal policies. This enhancement will provide more granular control over which websites users can access from an email message without using an isolated browser. </p>
    <div>
      <h3>Outbound DLP for email</h3>
      <a href="#outbound-dlp-for-email">
        
      </a>
    </div>
    <p>We will be releasing an add-in for Microsoft Outlook that will allow customers to use our DLP engine for inspecting outbound email messages. This client-side application enables customers to configure downstream policies that trigger action when a DLP policy is violated, all while minimizing disruption to existing email infrastructure. </p>
    <div>
      <h3>Expanded user risk scoring</h3>
      <a href="#expanded-user-risk-scoring">
        
      </a>
    </div>
    <p>Cloudflare will be increasing the signals that feed into our user risk scores. This will enable SOC teams to create more policies within Cloudflare or to take automated actions externally based on the level of risk observed. </p><p>These are just a few examples of significant releases that will be coming in 2025. Please stay tuned to the Cloudflare blog where we will be announcing these releases as they happen. </p>
    <div>
      <h2>Try Cloudflare Email Security today</h2>
      <a href="#try-cloudflare-email-security-today">
        
      </a>
    </div>
    <p>We provide all organizations (whether a Cloudflare customer or not) with free access to our <a href="https://blog.cloudflare.com/threats-lurking-office-365-cloudflare-email-retro-scan/"><u>Retro Scan</u></a> tool, allowing them to use our predictive AI models to scan existing inbox messages. Retro Scan will detect and highlight any threats found, enabling organizations to remediate them directly in their email accounts. With these insights, organizations can implement further controls, either using Cloudflare Email Security or their preferred solution, to prevent similar threats from reaching their inboxes in the future.</p> ]]></content:encoded>
            <category><![CDATA[Cloud Email Security]]></category>
            <category><![CDATA[SASE]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[Email Security]]></category>
            <guid isPermaLink="false">4fVFiDpaCJhYAFUvAocDDC</guid>
            <dc:creator>Ayush Kumar</dc:creator>
            <dc:creator>Justin Knapp</dc:creator>
        </item>
        <item>
            <title><![CDATA[Customers get increased integration with Cloudflare Email Security and Zero Trust through expanded partnership with CrowdStrike]]></title>
            <link>https://blog.cloudflare.com/customers-get-increased-integration-with-cloudflare-email-security-and-zero-trust/</link>
            <pubDate>Wed, 11 Sep 2024 13:00:00 GMT</pubDate>
            <description><![CDATA[ This post explains how our integrations with CrowdStrike Falcon® Next-Gen SIEM allow customers to identify and investigate risky user behavior and analyze data combined with other log sources to uncover hidden threats. ]]></description>
            <content:encoded><![CDATA[ <p>Today, we’re excited to expand <a href="https://blog.cloudflare.com/unified-risk-posture"><u>our recent Unified Risk Posture announcement</u></a> with more information on our latest integrations with <a href="https://www.crowdstrike.com/"><u>CrowdStrike</u></a>. We <a href="https://blog.cloudflare.com/unified-risk-posture"><u>previously shared</u></a> that our CrowdStrike Falcon Next-Gen SIEM integration allows for deeper analysis and further investigations by unifying first- and third-party data, native threat intelligence, AI, and workflow automation to allow your security teams to focus on work that matters.</p><p>This post explains how Falcon Next-Gen SIEM allows customers to identify and investigate risky user behavior and analyze data combined with other log sources to uncover hidden threats. By combining Cloudflare and CrowdStrike, organizations are better equipped to manage risk and decisively take action to stop cyberattacks.</p><p>By leveraging the combined capabilities of Cloudflare and CrowdStrike, organizations combine Cloudflare’s email security and <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">zero trust </a>logging capabilities with CrowdStrike’s dashboards and custom workflows to get better visibility into their environments and remediate potential threats. <a href="https://www.happycog.com/">Happy Cog</a>, a full-service digital agency, currently leverages the integration. Co-Founder and President Matthew Weinberg said: </p><blockquote><p>'The integration of Cloudflare’s robust Zero Trust capabilities with CrowdStrike Falcon Next-Gen SIEM enables organizations to gain a more comprehensive view of the threat landscape and take action to mitigate both internal and external risks posed by today’s security challenges.'</p></blockquote>
    <div>
      <h3>Cloudflare Email Security with Falcon Next-Gen SIEM</h3>
      <a href="#cloudflare-email-security-with-falcon-next-gen-siem">
        
      </a>
    </div>
    <p>With <a href="https://developers.cloudflare.com/email-security/"><u>Cloudflare Email Security’s</u></a> configurable policies, organizations can now push indicators of compromise (IoC) alerts to Falcon Next-Gen SIEM, notifying analysts about suspicious activity, such as a user engaging with a phishing email. By proactively alerting analysts when suspicious activity is detected, Cloudflare and CrowdStrike can provide early detection of account compromises or insider threats.</p>
    <div>
      <h3>Cloudflare Zero Trust Logs with Falcon Next-Gen SIEM</h3>
      <a href="#cloudflare-zero-trust-logs-with-falcon-next-gen-siem">
        
      </a>
    </div>
    <p>We are also integrating <a href="https://developers.cloudflare.com/cloudflare-one/"><u>Cloudflare’s Zero Trust</u></a> platform with Falcon Next-Gen SIEM. This allows our mutual customers to push Cloudflare Zero Trust logs from Cloudflare Access and Cloudflare Gateway to Falcon Next-Gen SIEM for better visualization, analysis, and remediation. This integration allows Cloudflare logs to be used to customize and enhance Falcon Next-Gen SIEM detections and trigger CrowdStrike workflows to automatically configure a response action. An example workflow: based on a new detection of a user’s access request being deemed fraudulent, or if a user is engaging with risky websites, the Falcon platform can trigger Cloudflare to move users to affected user groups and apply adaptive access control policies, such as access isolating or quarantining the user.</p>
    <div>
      <h3>How To Get Started</h3>
      <a href="#how-to-get-started">
        
      </a>
    </div>
    <p>To connect Cloudflare Zero Trust logs, start with the Falcon Next-Gen SIEM module. Navigate to the Data Connectors tab of your Falcon Next-Gen SIEM dashboard and select the Cloudflare Data Connector.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/68WBQjl9Y4v8FFZQ8GD7gd/9e2bfa370303f1a3ccfe7a858089b195/image3.png" />
          </figure><p>Give the connector a name and select “Save”, and you will receive two pieces of information: an API key and an API URL. Be sure to make note of the key, as it will only be shown once.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6VqTqVgB9mf3CHeYomnfkP/6ae503472ca78969f2a8e26201b5b276/image1.png" />
          </figure><p>Next, in Cloudflare, create an <a href="https://developers.cloudflare.com/logs/get-started/enable-destinations/http/"><u>HTTP logpush job via API</u></a>, and format the "destination_conf" field as follows:</p><p><code>"destination_conf": "&lt;API URL&gt;?header_Authorization=Bearer%20&lt;API KEY&gt;&amp;tags=&lt;ZONE&gt;,dataset:&lt;DATASET&gt;"</code></p><p>Note: </p><ul><li><p>&lt;ZONE&gt; is optional for account-level logpush jobs </p></li><li><p>&lt;DATASET&gt; follows a dot delimited syntax, so <code>http_requests</code> becomes <code>http.requests</code></p></li></ul>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6hWaxWcelja9tY4q6ZSRwT/659bd80980cba2b5988279209fe6fdff/image2.png" />
          </figure><p>Once the job is created and active, you will start to see events populating in the My Connectors section of your Falcon dashboard. Once Cloudflare data is populated in Falcon Next-Gen SIEM, you can now search events and create Falcon Fusion SOAR automation workflows and correlation rules, all based on Cloudflare log events.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7g7PFWfKkHyT8gtKjROCbB/7a09065ff88e2cae7b905b8cc30f6442/image5.png" />
          </figure>
    <div>
      <h3>In Summary</h3>
      <a href="#in-summary">
        
      </a>
    </div>
    <p>Together, CrowdStrike and Cloudflare’s shared telemetry will further decrease the mean time to containment and expedite any organization’s ability to decisively respond to risks within their environment. The two platforms work together as one, allowing organizations to block suspicious activity and deliver high-fidelity alerts to security analysts for further investigation.</p><p>To learn more about these integrations, feel free to <a href="https://www.cloudflare.com/zero-trust/trial/"><u>reach out to us</u></a> to get started with a consultation. We can discuss your existing environment and ensure that you are best equipped to achieve better visibility and remediation in the face of emerging threats.</p> ]]></content:encoded>
            <category><![CDATA[Partners]]></category>
            <category><![CDATA[CrowdStrike]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <guid isPermaLink="false">2oxT0UhMM8loVoSuUom7W8</guid>
            <dc:creator>Corey Mahan</dc:creator>
            <dc:creator>Andrew Meyer</dc:creator>
            <dc:creator>Ayush Kumar</dc:creator>
            <dc:creator>Michael Mcgrory</dc:creator>
            <dc:creator>Gavin Chen</dc:creator>
        </item>
        <item>
            <title><![CDATA[Dispelling the Generative AI fear: how Cloudflare secures inboxes against AI-enhanced phishing]]></title>
            <link>https://blog.cloudflare.com/dispelling-the-generative-ai-fear-how-cloudflare-secures-inboxes-against-ai-enhanced-phishing/</link>
            <pubDate>Mon, 04 Mar 2024 14:00:53 GMT</pubDate>
            <description><![CDATA[ Generative AI is being used by malicious actors to make phishing attacks much more convincing. Learn how Cloudflare’s email security systems are able to see past the deception using advanced machine learning models ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7wtkrE4GWst9TZnOc65wDQ/e4c58520a99d30f5156e43bb4f460057/Dispelling-the-Generative-AI-Fear_-Cloudflare-Introduces-New-Way-to-Secure-Inbox.png" />
            
            </figure><p><a href="https://www.cloudflare.com/learning/email-security/what-is-email/">Email</a> continues to be the largest attack vector that attackers use to try to compromise or extort organizations. Given the frequency with which email is used for business communication, <a href="https://www.cloudflare.com/learning/access-management/phishing-attack/">phishing attacks</a> have remained ubiquitous. As tools available to attackers have evolved, so have the ways in which attackers have targeted users while skirting security protections. The release of several <a href="https://www.cloudflare.com/learning/ai/what-is-artificial-intelligence/">artificial intelligence</a> (AI) <a href="https://www.cloudflare.com/learning/ai/what-is-large-language-model/">large language models</a> (LLMs) has created a mad scramble to discover novel applications of <a href="https://www.cloudflare.com/learning/ai/what-is-generative-ai/">generative AI</a> capabilities and has consumed the minds of security researchers. One application of this capability is creating phishing attack content.</p><p>Phishing relies on the attacker seeming authentic. Over the years, we’ve observed that there are two distinct forms of authenticity: visual and organizational. Visually authentic attacks use logos, images, and the like to establish trust, while organizationally authentic campaigns use business dynamics and social relationships to drive their success. LLMs can be employed by attackers to make their emails seem more authentic in several ways. A common technique is for attackers to use LLMs to translate and revise emails they’ve written into messages that are more superficially convincing. More sophisticated attacks pair LLMs with personal data harvested from compromised accounts to write personalized, organizationally-authentic messages.</p><p>For example, WormGPT has the ability to take a poorly written email and recreate it to have better use of grammar, flow, and voice. The output is a fluent, well-written message that can more easily pass as authentic. Threat actors within discussion forums are encouraged to create rough drafts in their native language and let the LLM do its work.</p><p>One form of phishing attack that benefits from LLMs, which can have devastating financial impact, are <a href="https://www.cloudflare.com/learning/email-security/business-email-compromise-bec/">Business Email Compromise</a> (BEC) attacks. During these attacks, malicious actors attempt to dupe their victims into sending payment for fraudulent invoices; LLMs can help make these messages sound more organizationally authentic. And while BEC attacks are top of mind for organizations who wish to stop the unauthorized egress of funds from their organization, LLMs can be used to craft other types of phishing messages as well.</p><p>Yet these LLM-crafted messages still rely on the user performing an action, like reading a fraudulent invoice or interacting with a link, which can’t be spoofed so easily. And every LLM-written email is still an email, containing an array of other signals like sender reputation, correspondence patterns, and metadata bundled with each message. With the right mitigation strategy and tools in place, LLM-enhanced attacks can be reliably stopped.</p><p>While the popularity of ChatGPT has thrust LLMs into the recent spotlight, these kinds of models are not new; Cloudflare has been training its models to defend against LLM-enhanced attacks for years. Our models’ ability to look at all components of an email ensures that Cloudflare customers are already protected and will continue to be in the future — because the machine learning systems our threat research teams have developed through analyzing billions of messages aren't deceived by nicely-worded emails.</p>
    <div>
      <h2>Generative AI threats and trade offs</h2>
      <a href="#generative-ai-threats-and-trade-offs">
        
      </a>
    </div>
    <p>The riskiest of AI generated attacks are personalized based on data harvested prior to the attack. Threat actors collect this information during more traditional account compromise operations against their victims and iterate through this process. Once they have sufficient information to conduct their attack they proceed. It’s highly targeted and highly specific. The benefit of AI is scale of operations; however, mass data collection is necessary to create messages that accurately impersonate who the attacker is pretending to be.</p><p>While AI-generated attacks can have advantages in personalization and scalability, their effectiveness hinges on having sufficient samples for authenticity. Traditional threat actors can also employ social engineering tactics to achieve similar results, albeit without the efficiency and scalability of AI. The fundamental limitations of opportunity and timing, as we will discuss in the next section, still apply to all attackers — regardless of the technology used.</p><p>To defend against such attacks, organizations must adopt a multi-layer approach to cybersecurity. This includes employee awareness training, employing advanced threat detection systems that utilize AI and traditional techniques, and constantly updating security practices to protect against both AI and traditional phishing attacks.</p><p>Threat actors can utilize AI to generate attacks, but they come with tradeoffs. The bottleneck in the number of attacks they can successfully conduct is directly proportional to the number of opportunities they have at their disposal, and the data they have available to craft convincing messages. They require access and opportunity, and without both the attacks are not very likely to succeed.</p>
    <div>
      <h2>BEC attacks and LLMs</h2>
      <a href="#bec-attacks-and-llms">
        
      </a>
    </div>
    <p>BEC attacks are top of mind for organizations because they can allow attackers to steal a significant amount of funds from the target. Since BEC attacks are primarily based on text, it may seem like LLMs are about to open the floodgates. However, the reality is much different. The major obstacle limiting this proposition is opportunity. We define opportunity as a window in time when events align to allow for an exploitable condition and for that condition to be exploited — for example, an attacker might use data from a breach to identify an opportunity in a company’s vendor payment schedule. A threat actor can have motive, means, and resources to pull off an authentic looking BEC attack, but without opportunity their attacks will fall flat. While we have observed threat actors attempt a volumetric attack by essentially cold calling on targets, such attacks are unsuccessful the vast majority of the time. This is in line with the premise of BECs, as there is some component of social engineering at play for these attacks.</p><p>As an analogy, if someone were to walk into your business’ front door and demand you pay them \$20,000 without any context, a reasonable, logical person would not pay. A successful BEC attack would need to bypass this step of validation and verification, which LLMs can offer little assistance in. While LLMs can generate text that appears convincingly authentic, they cannot establish a business relationship with a company or manufacture an invoice that is authentic in appearance and style, matching those in use. The largest BEC payments are a product of not only account compromise, but invoice compromise, the latter of which are necessary for the attacker in order to provide convincing, fraudulent invoices to victims.</p><p>At Cloudflare, we are uniquely situated to provide this analysis, as our <a href="https://www.cloudflare.com/zero-trust/solutions/email-security-services/">email security products</a> scrutinize hundreds of millions of messages every month. In analyzing these attacks, we have found that there are other trends besides text which constitute a BEC attack, with our data suggesting that the vast majority of BEC attacks use compromised accounts. Attackers with access to a compromised account can harvest data to craft more authentic messages that can bypass most security checks because they are coming from a valid email address. Over the last year, 80% of BEC attacks involving \$10K or more involved compromised accounts. Out of that, 75% conducted thread hijacking and redirected the thread to newly registered domains. This is in keeping with observations that the vast majority of “successful” attacks, meaning the threat actor successfully compromised their target, leverages a lookalike domain. This fraudulent domain is almost always recently registered. We also see that 55% of these messages involving over $10K in payment attempted to change ACH payment details.</p><p>We can see an example of how this may accumulate in a BEC attack below.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6vcLTmUrZ0XIigZFP1VyHu/13eba49f49a6e7500b42a444c8d1f073/N4rK4QS9njr9X1tUAEHvZjqCDwlzt6pDMrrB7sFhq1kiKaFvPygxLQWI6wczYXbV6LGzo6CkUWvV2QbcycxSHIrIEQKPr4o1PksVZ6C_qZaZzNDpJMjfOnpGLHoO.png" />
            
            </figure><p>The text within the message does not contain any grammatical errors and is easily readable, yet our sentiment models triggered on the text, detecting that there was a sense of urgency in the sentiment in combination with an invoice — a common pattern employed by attackers. However, there are many other things in this message that triggered different models. For example, the attacker is pretending to be from PricewaterhouseCoopers, but there is a mismatch in the domain from which this email was sent. We also noticed that the sending domain was recently registered, alerting us that this message may not be legitimate. Finally, one of our models generates a social graph unique to each customer based on their communication patterns. This graph provides information about whom each user communicates with and about what. This model flagged that, given the fresh history of this communication, this message was not business as usual. All the signals above plus the outputs of our sentiment models led our analysis engine to conclude that this was a malicious message and to not allow the recipient of this message to interact with it.</p><p>Generative AI is continuing to change and improve, so there’s still a lot to be discovered in this arena. While the advent of AI-created BEC attacks may cause an ultimate increase in the number of attacks seen in the wild, we do not expect their success rate to rise for organizations with robust security solutions and processes in place.</p>
    <div>
      <h2>Phishing attack trends</h2>
      <a href="#phishing-attack-trends">
        
      </a>
    </div>
    <p>In August of last year, we published our <a href="/2023-phishing-report">2023 Phishing Report</a>. That year, Cloudflare processed approximately 13 billion emails, which included blocking approximately 250 million malicious messages from reaching customers’ inboxes. Even though it was the year of ChatGPT, our analysis saw that attacks still revolved around long-standing vectors like malicious links.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6thpMQK5FCqIx3XJ7ftFln/41f86784a5a942f9355cb4e6a5d92255/FI0gnVZuDEtqX3MbSB7pZpaduv6XAwkCqLgeVWWAHlMtc-cSqIPwR1QVFk5YOcc-F8egyqEC2zXJAeeBlJjoXtWojJfWW-2kR3Qu_btdXRUXpD_Kct1TIKiqvEET.png" />
            
            </figure><p>Most attackers were still trying to get users to either click on a link or download a malicious file. And as discussed earlier, while Generative AI can help with making a readable and convincing message, it cannot help attackers with obfuscating these aspects of their attack.</p><p>Cloudflare’s <a href="https://www.cloudflare.com/learning/email-security/what-is-email-security/">email security models</a> take a sophisticated approach to examining each link and attachment they encounter. Links are crawled and scrutinized based on information about the domain itself as well as on–page elements and branding. Our crawlers also check for input fields in order to see if the link is a potential credential harvester. And for attackers who put their weaponized links behind redirects or geographical locks, our crawlers can leverage the Cloudflare network to bypass any roadblocks thrown our way.</p><p>Our detection systems are similarly rigorous in handling attachments. For example, our systems know that some parts of an attachment can be easily faked, while others are not. So our systems deconstruct attachments into their primitive components and check for abnormalities there. This allows us to scan for malicious files more accurately than traditional sandboxes which can be bypassed by <a href="https://attack.mitre.org/techniques/T1497/">attackers</a>.</p><p>Attackers can use LLMs to craft a more convincing message to get users to take certain actions, but our scanning abilities catch malicious content and prevent the user from interacting with it.</p>
    <div>
      <h3>Anatomy of an email</h3>
      <a href="#anatomy-of-an-email">
        
      </a>
    </div>
    <p>Emails contain information beyond the body and subject of the message. When building detections, we like to think of emails as having both mutable and immutable properties. Mutable properties like the body text can be easily faked while other mutable properties like sender IP address require more effort to fake. However, there are immutable properties like domain age of the sender and similarity of the domain to known brands that cannot be altered at all. For example, let's take a look at a message that I received.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5I546B8TyjfcPUJFgvs5VS/18151cd55044af1b0a6efefe18b962cc/BhpSr8GQMige78JJ3Y6n3XqzowH5L8H3y-I3Mi_x7yStxeA3wZQBdPyw7pesWnbp1i_bE8miC64GaCMVGj27jjQEPzCFDm-e2mv0fKjMXjCu8-bCuCWltwN-U6a-.png" />
            
            </figure><p><i>Example email content</i></p><p>While the message above is what the user sees, it is a small part of the larger content of the email. Below is a snippet of the message headers. This information is typically useless to a recipient (and most of it isn’t displayed by default) but it contains a treasure trove of information for us as defenders. For example, our detections can see all the preliminary checks for <a href="https://www.cloudflare.com/learning/email-security/dmarc-dkim-spf/">DMARC, SPF, and DKIM</a>. These let us know whether this email was allowed to be sent on behalf of the purported sender and if it was altered before reaching our inbox. Our models can also see the client IP address of the sender and use this to check their reputation. We can also see which domain the email was sent from and check if it matches the branding included in the message.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/10BXP1mHum6zQgJwxFLEat/bedc8c306a4570af9c69114eb20ac5b4/u_E1OhipYsXS1787X0rP22F4fk1uvu8f1uwm-5MhEpDN0MuHBmwSrERNQK-BQdeLbP-f0P-imKcSfBrYZu3LAcMdlRsE9uFko_8veh6IQEBS3FfNkqV6NeByFU_f.png" />
            
            </figure><p><i>Example email headers</i></p><p>As you can see, the body and subject of a message are a small portion of what makes an email to be an email. When performing analysis on emails, our models holistically look at every aspect of a message to make an assessment of its safety. Some of our models do focus their analysis on the body of the message for indicators like sentiment, but the ultimate assessment of the message’s risk is performed in concert with models evaluating every aspect of the email. All this information is surfaced to the security practitioners that are using our products.</p>
    <div>
      <h3>Cloudflare’s email security models</h3>
      <a href="#cloudflares-email-security-models">
        
      </a>
    </div>
    <p>Our philosophy of using multiple models trained on different properties of messages culminates in what we call our SPARSE engine. In the <a href="https://www.cloudflare.com/lp/forrester-wave-email-security-2023/">2023 Forrester Wave™ for Enterprise Email Security report</a>, the analysts mentioned our ability to catch phishing emails using our SPARSE engine saying “Cloudflare uses its preemptive crawling approach to discover phishing campaign infrastructure as it’s being built. Its Small Pattern Analytics Engine (SPARSE) combines multiple <a href="https://www.cloudflare.com/learning/ai/what-is-machine-learning/">machine learning</a> models, including <a href="https://www.cloudflare.com/learning/ai/natural-language-processing-nlp">natural language modeling</a>, sentiment and structural analysis, and trust graphs”. <sup>1</sup></p><p>Our SPARSE engine is continually updated using messages we observe. Given our ability to analyze billions of messages a year, we are able to detect trends earlier and feed these into our models to improve their efficacy. A recent example of this is when we noticed in late 2023 a rise in <a href="https://www.cloudflare.com/learning/security/what-is-quishing/">QR code attacks</a>. Attackers deployed different techniques to obfuscate the QR code so that OCR scanners could not scan the image but cellphone cameras would direct the user to the malicious link. These techniques included making the image incredibly small so that it was not clear for scanners or pixel shifting images. However, feeding these messages into our models trained them to look at all the qualities about the emails sent from those campaigns. With this combination of data, we were able to create detections to catch these campaigns before they hit customers’ inboxes.</p><p>Our approach to preemptive scanning makes us resistant to oscillations of threat actor behavior. Even though the use of LLMs is a tool that attackers are deploying more frequently today, there will be others in the future, and we will be able to defend our customers from those threats as well.</p>
    <div>
      <h3>Future of email phishing</h3>
      <a href="#future-of-email-phishing">
        
      </a>
    </div>
    <p>Securing email inboxes is a difficult task given the creative ways attackers try to phish users. This field is ever evolving and will continue to change dramatically as new technologies become accessible to the public. Trends like the use of generative AI will continue to change, but our methodology and approach to building email detections keeps our customers protected.</p><p>If you are interested in how Cloudflare’s Cloud Email Security works to protect your organization against phishing threats please reach out to your Cloudflare contact and set up a free Phishing Risk Assessment. For Microsoft 365 customers, you can also run our complementary <a href="https://www.cloudflare.com/lp/phishing-retro-scan">retro scan</a> to see what phishing emails your current solution has missed. More information on that can be found in our recent <a href="/threats-lurking-office-365-cloudflare-email-retro-scan/">blog post</a>.</p><p>Want to learn more about our solution? <a href="https://www.cloudflare.com/lp/emailsecurity/">Sign up for a complementary Phish Risk Assessment</a>.</p><hr /><p>[1] Source: The Forrester Wave™: Enterprise Email Security, Q2, 2023</p><p></p><p>The Forrester Wave™ is copyrighted by Forrester Research, Inc. Forrester and Forrester Wave are trademarks of Forrester Research, Inc. The Forrester Wave is a graphical representation of Forrester's call on a market and is plotted using a detailed spreadsheet with exposed scores, weightings, and comments. Forrester does not endorse any vendor, product, or service depicted in the Forrester Wave. Information is based on best available resources. Opinions reflect judgment at the time and are subject to change.</p> ]]></content:encoded>
            <category><![CDATA[Security Week]]></category>
            <category><![CDATA[AI]]></category>
            <category><![CDATA[API Security]]></category>
            <category><![CDATA[Developer Platform]]></category>
            <guid isPermaLink="false">uLYN5emOslBbym3SVJTvE</guid>
            <dc:creator>Ayush Kumar</dc:creator>
            <dc:creator>Bryan Allen</dc:creator>
        </item>
        <item>
            <title><![CDATA[Defensive AI: Cloudflare’s framework for defending against next-gen threats]]></title>
            <link>https://blog.cloudflare.com/defensive-ai/</link>
            <pubDate>Mon, 04 Mar 2024 14:00:24 GMT</pubDate>
            <description><![CDATA[ From identifying phishing attempts to protect applications and APIs, Cloudflare uses AI to improve the effectiveness of its security solutions to fight against new and more sophisticated attacks ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/xVD4cmhSUcJddNAFw2AJc/6fb1537ad293d5d4eee9059aae0eec9b/Personalized-defensive-AI.png" />
            
            </figure><p>Generative AI has captured the imagination of the world by being able to produce poetry, screenplays, or imagery. These tools can be used to improve human productivity for good causes, but they can also be employed by malicious actors to carry out sophisticated attacks.</p><p>We are witnessing phishing attacks and social engineering becoming more sophisticated as attackers tap into powerful new tools to generate credible content or interact with humans as if it was a real person. Attackers can use AI to build boutique tooling made for attacking specific sites with the intent of harvesting proprietary data and taking over user accounts.</p><p>To protect against these new challenges, we need new and more sophisticated security tools: this is how Defensive AI was born. Defensive AI is the framework Cloudflare uses when thinking about how intelligent systems can improve the effectiveness of our security solutions. The key to Defensive AI is data generated by Cloudflare’s vast network, whether generally across our entire network or specific to individual customer traffic.</p><p>At Cloudflare, we use AI to increase the level of protection across all security areas, ranging from <a href="https://www.cloudflare.com/application-services/solutions/">application security</a> to email security and our <a href="https://www.cloudflare.com/zero-trust/solutions/">Zero Trust platform</a>. This includes creating customized protection for every customer for API or email security, or using our huge amount of attack data to train models to detect application attacks that haven’t been discovered yet.</p><p>In the following sections, we will provide examples of how we designed the latest generation of security products that leverage AI to secure against AI-powered attacks.</p>
    <div>
      <h3>Protecting APIs with anomaly detection</h3>
      <a href="#protecting-apis-with-anomaly-detection">
        
      </a>
    </div>
    <p>APIs power the modern Web, comprising <a href="/2024-api-security-report/">57% of dynamic traffic</a> across the Cloudflare network, up from 52% in 2021. While APIs aren’t a new technology, securing them differs from securing a traditional web application. Because APIs offer easy programmatic access by design and are growing in popularity, fraudsters and threat actors have pivoted to targeting APIs. Security teams must now counter this rising threat. Importantly, each API is usually unique in its purpose and usage, and therefore <a href="https://www.cloudflare.com/application-services/solutions/api-security/">securing APIs</a> can take an inordinate amount of time.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5ojHc36uSFsnCBr870kK38/f4b7df6df5c60ffb087255ffb442e5e3/Screenshot-2024-03-01-at-1.39.29-PM.png" />
            
            </figure><p>Cloudflare is announcing the development of API Anomaly Detection for <a href="/api-gateway/">API Gateway</a> to protect APIs from attacks designed to damage applications, take over accounts, or <a href="https://www.cloudflare.com/learning/security/what-is-data-exfiltration/">exfiltrate data</a>. API Gateway provides a layer of protection between your hosted APIs and every device that interfaces with them, giving you the visibility, control, and security tools you need to manage your APIs.</p><p>API Anomaly Detection is an upcoming, ML-powered feature in our API Gateway product suite and a natural successor to <a href="/api-sequence-analytics">Sequence Analytics</a>. In order to protect APIs at scale, API Anomaly Detection learns an application’s business logic by analyzing client API request sequences. It then builds a model of what a sequence of expected requests looks like for that application. The resulting traffic model is used to identify attacks that deviate from the expected client behavior. As a result, API Gateway can use its <a href="https://developers.cloudflare.com/api-shield/security/sequence-mitigation/">Sequence Mitigation</a> functionality to enforce the learned model of the application’s intended business logic, stopping attacks.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/edeVw346MG6dZbjaDt97L/263e9c18c51f5320ce6e0c1d9ab957df/Screenshot-2024-03-01-at-2.01.25-PM-1.png" />
            
            </figure><p>While we’re still developing API Anomaly Detection, API Gateway customers can sign up <a href="https://www.cloudflare.com/lp/api-anomaly-detection/">here</a> to be included in the beta for API Anomaly Detection. Today, customers can get started with Sequence Analytics and Sequence Mitigation by reviewing the <a href="https://developers.cloudflare.com/api-shield/security/">docs</a>. Enterprise customers that haven’t purchased API Gateway can <a href="http://dash.cloudflare.com/?to=/:account/:zone/security/api-shield">self-start a trial</a> in the Cloudflare Dashboard, or contact their account manager for more information.</p>
    <div>
      <h3>Identifying unknown application vulnerabilities</h3>
      <a href="#identifying-unknown-application-vulnerabilities">
        
      </a>
    </div>
    <p>Another area where AI improves security is in our <a href="https://www.cloudflare.com/en-gb/learning/ddos/glossary/web-application-firewall-waf/">Web Application Firewall (WAF)</a>. Cloudflare processes 55 million HTTP requests per second on average and has an unparalleled visibility into attacks and exploits across the world targeting a wide range of applications.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3oTIWUwe5Em3tD4ACksp6b/0036dcdf5af715f4095ffb14ae9b3769/Screenshot-2024-03-01-at-1.41.23-PM.png" />
            
            </figure><p>One of the big challenges with the WAF is adding protections for new vulnerabilities and false positives. A WAF is a collection of rules designed to identify attacks directed at web applications. New vulnerabilities are discovered daily and at Cloudflare we have a team of security analysts that create new rules when vulnerabilities are discovered. However, manually creating rules takes time — usually hours — leaving applications potentially vulnerable until a protection is in place. The other problem is that attackers continuously evolve and mutate existing attack payloads that can potentially bypass existing rules.</p><p>This is why Cloudflare has, for years, leveraged machine learning models that constantly learn from the latest attacks, deploying mitigations without the need for manual rule creation. This can be seen, for example, in our <a href="/stop-attacks-before-they-are-known-making-the-cloudflare-waf-smarter/">WAF Attack Score</a> solution. WAF Attack Score is based on an ML model trained on attack traffic identified on the Cloudflare network. The resulting classifier allows us to identify variations and bypasses of existing attacks as well as extending the protection to <a href="/how-cloudflares-ai-waf-proactively-detected-ivanti-connect-secure-critical-zero-day-vulnerability">new and undiscovered attacks</a>. Recently, we have made Attack Score <a href="/waf-attack-score-for-business-plan">available to all Enterprise and Business plans</a>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/25Jw91tB0o7lKhsgzvbqPV/748a7365c126ba03e2382b3eff988c37/Screenshot-2024-03-01-at-18.16.22.png" />
            
            </figure><p><i>Attack Score uses AI to classify each HTTP request based on the likelihood that it’s malicious</i></p><p>While the contribution of security analysts is indispensable, in the era of AI and rapidly evolving attack payloads, a <a href="https://www.cloudflare.com/cybersecurity-risk-management/">robust security posture</a> demands solutions that do not rely on human operators to write rules for each novel threat. Combining Attack Score with traditional signature-based rules is an example of how intelligent systems can support tasks carried out by humans. Attack Score identifies new malicious payloads which can be used by analysts to optimize rules that, in turn, provide better training data for our AI models. This creates a reinforcing positive feedback loop improving the overall protection and response time of our WAF.</p><p>Long term, we will adapt the AI model to account for customer-specific traffic characteristics to better identify deviations from normal and benign traffic.</p>
    <div>
      <h3>Using AI to fight phishing</h3>
      <a href="#using-ai-to-fight-phishing">
        
      </a>
    </div>
    <p>Email is one of the most effective vectors leveraged by bad actors with the US Cybersecurity and Infrastructure Security Agency (<a href="https://www.cisa.gov/stopransomware/general-information">CISA</a>) reporting that 90% of cyber attacks start with phishing and Cloudflare Email Security <a href="https://radar.cloudflare.com/year-in-review/2023#malicious-emails">marking 2.6% of 2023's emails as malicious</a>. The rise of AI-enhanced attacks are making traditional email security providers obsolete, as threat actors can now craft phishing emails that are more credible than ever with little to no language errors.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/27B73JPLutOrg6shC9gZnh/3e49607d69ce330333204c3d061d9fa5/Screenshot-2024-03-01-at-1.41.30-PM.png" />
            
            </figure><p>Cloudflare <a href="https://developers.cloudflare.com/email-security/">Email Security</a> is a cloud-native service that stops phishing attacks across all threat vectors. Cloudflare’s email security product continues to protect customers with its AI models, even as trends like Generative AI continue to evolve. Cloudflare’s models analyze all parts of a phishing attack to determine the risk posed to the end user. Some of our AI models are personalized for each customer while others are trained holistically. Privacy is paramount at Cloudflare, so only non-personally identifiable information is used by our tools for training. In 2023, <a href="/2023-phishing-report">Cloudflare processed approximately 13 billion</a>, and blocked 3.4 billion, emails, providing the email security product a rich dataset that can be used to train AI models.</p><p>Two detections that are part of our portfolio are Honeycomb and Labyrinth.</p><ul><li><p><i>Honeycomb</i> is a patented email sender domain reputation model. This service builds a graph of who is sending messages and builds a model to determine risk. Models are trained on specific customer traffic patterns, so every customer has AI models trained on what their good traffic looks like.</p></li><li><p><i>Labyrinth</i> uses ML to protect on a per-customer basis. Actors attempt to spoof emails from our clients’ valid partner companies.  We can gather a list with statistics of known &amp; good email senders for each of our clients. We can then detect the spoof attempts when the email is sent by someone from an unverified domain, but the domain mentioned in the email itself is a reference/verified domain.</p></li></ul><p>AI remains at the core of our email security product, and we are constantly improving the ways we leverage it within our product. If you want to get more information about how we are using our AI models to stop AI enhanced phishing attacks check out our blog post here.</p>
    <div>
      <h3>Zero-Trust security protected and powered by AI</h3>
      <a href="#zero-trust-security-protected-and-powered-by-ai">
        
      </a>
    </div>
    <p>Cloudflare <a href="https://www.cloudflare.com/en-gb/learning/security/glossary/what-is-zero-trust/">Zero Trust</a> provides administrators the tools to protect access to their IT infrastructure by enforcing strict identity verification for every person and device regardless of whether they are sitting within or outside the network perimeter.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/qpOOjCeP6yqWtYrSgJdCu/4693906c9faf833a57db45672472f23d/Cloudflare-One-User-Risk-Scores_b.png" />
            
            </figure><p>One of the big challenges is to enforce strict access control while reducing the friction introduced by frequent verifications. Existing solutions also put pressure on IT teams that need to analyze log data to track how risk is evolving within their infrastructure. Sifting through a huge amount of data to find rare attacks requires large teams and substantial budgets.</p><p>Cloudflare simplifies this process by introducing behavior-based user risk scoring. Leveraging AI, we analyze real-time data to identify anomalies in the users’ behavior and signals that could lead to harms to the organization. This provides administrators with recommendations on how to tailor the security posture based on user behavior.</p><p>Zero Trust user risk scoring detects user activity and behaviors that could introduce risk to your organizations, systems, and data and assigns a score of Low, Medium, or High to the user involved. This approach is sometimes referred to as <a href="https://www.cloudflare.com/learning/security/what-is-ueba/">user and entity behavior analytics (UEBA)</a> and enables teams to detect and remediate possible account compromise, company policy violations, and other risky activity.</p><p>The first contextual behavior we are launching is “impossible travel”, which helps identify if a user’s credentials are being used in two locations that the user could not have traveled to in that period of time. These risk scores can be further extended in the future to highlight personalized behavior risks based on contextual information such as time of day usage patterns and access patterns to flag any anomalous behavior. Since all traffic would be proxying through your SWG, this can also be extended to resources which are being accessed, like an internal company repo.</p><p>We have an exciting launch during security week. <a href="/cf1-user-risk-score/">Check out this blog to learn more</a>.</p>
    <div>
      <h3>Conclusion</h3>
      <a href="#conclusion">
        
      </a>
    </div>
    <p>From application and email security to <a href="https://www.cloudflare.com/network-security/">network security</a> and Zero Trust, we are witnessing attackers leveraging new technologies to be more effective in achieving their goals. In the last few years, multiple Cloudflare product and engineering teams have adopted intelligent systems to better identify abuses and <a href="https://www.cloudflare.com/products/zero-trust/threat-defense/">increase protection</a>.</p><p>Besides the generative AI craze, AI is already a crucial part of how we defend digital assets against attacks and how we discourage bad actors.</p> ]]></content:encoded>
            <category><![CDATA[Security Week]]></category>
            <category><![CDATA[AI]]></category>
            <category><![CDATA[Machine Learning]]></category>
            <category><![CDATA[Phishing]]></category>
            <category><![CDATA[Cloud Email Security]]></category>
            <category><![CDATA[API Security]]></category>
            <category><![CDATA[SASE]]></category>
            <guid isPermaLink="false">76ClOKhWKWuLLPML351f39</guid>
            <dc:creator>Daniele Molteni</dc:creator>
            <dc:creator>John Cosgrove</dc:creator>
            <dc:creator>Ayush Kumar</dc:creator>
            <dc:creator>Ankur Aggarwal</dc:creator>
        </item>
        <item>
            <title><![CDATA[See what threats are lurking in your Office 365 with Cloudflare Email Retro Scan]]></title>
            <link>https://blog.cloudflare.com/threats-lurking-office-365-cloudflare-email-retro-scan/</link>
            <pubDate>Fri, 29 Sep 2023 13:00:17 GMT</pubDate>
            <description><![CDATA[ We are now announcing the ability for Cloudflare customers to scan old messages within their Office 365 Inboxes for threats. This Retro Scan will let you look back seven days and see what threats your current email security tool has missed ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2ev0RiZp3HLU82CLkO5CFW/d91c85faf8cccb3040fc99cbc70c90e2/image6-9.png" />
            
            </figure><p>We are now announcing the ability for Cloudflare customers to scan old messages within their Office 365 Inboxes for threats. This Retro Scan will let you look back seven fourteen days and see what threats your current email security tool has missed.</p>
    <div>
      <h2>Why run a Retro Scan</h2>
      <a href="#why-run-a-retro-scan">
        
      </a>
    </div>
    <p>Speaking with customers, we often hear that they do not know the condition of their organization’s mailboxes. Organizations have an <a href="https://www.cloudflare.com/zero-trust/products/email-security/">email security tool</a> or use Microsoft’s built-in protection but do not understand how effective their current solution is. We find that these tools often let malicious emails through their filters increasing the risk of compromise within the company.</p><p>In our pursuit to help build a better Internet, we are enabling Cloudflare customers to use Retro Scan to scan messages within their inboxes using our advanced machine learning models for free. Our Retro Scan will detect and highlight any threats we find so that customers can clean up their inboxes by addressing them within their email accounts. With this information, customers can also implement additional controls, such as using Cloudflare or their preferred <a href="https://www.cloudflare.com/zero-trust/solutions/email-security-services/">solution</a>, to prevent similar threats from reaching their mailbox in the future.</p>
    <div>
      <h2>Running a Retro Scan</h2>
      <a href="#running-a-retro-scan">
        
      </a>
    </div>
    <p>Customers can navigate to the Cloudflare dashboard where they will see under the Area 1 tab the Retro Scan option:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2Ts8XaDTCCbeQnXHaLcDvB/f14d668e9c7f3b2350fc8daf41d0f902/image4-20.png" />
            
            </figure><p>To be able to access the messages to scan, Cloudflare needs authorization to be able to scan messages. You start this process by providing Cloudflare with the appropriate permissions to scan messages. The second authorization will allow the Cloudflare application  to access Active Directory. This is needed to understand which users are within the organization along with which groups they belong to which helps our algorithms better assess if a message is malicious.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5Jy3hy3WT81WeaLMs5hXpv/d359be11ce51116fc2fdaef3c1876f95/image1-43.png" />
            
            </figure><p>Once all the authorizations are given, you have one final step which is to pick which domains we want to scan as well as providing us information about the other email security vendors who are protecting your inboxes.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4Cw3b6VsrjNmVnE22P7YwY/772455c6d46e0816bc99718cffa51c78/image5-12.png" />
            
            </figure><p>Finally, customers can click “Generate Retro Scan” which will prompt Cloudflare Area 1 Email Security to start scanning older messages. Since this process takes time, we provide customers with an email alert when the scan is done.</p>
    <div>
      <h2>Analyzing The Results</h2>
      <a href="#analyzing-the-results">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2bqwVJ4a0Pp3bwc4tSeCoI/9b7e128161f2327595430f01dea10172/Screenshot-2023-09-28-at-8.59.52-PM.png" />
            
            </figure><p>What you will be presented with is a quick breakdown of what threats we found within your organization’s email inboxes. The top section breaks down all of our detections by type. Here you can find the count of Malicious, Suspicious, Spoof, Spam, and Bulk messages. We also highlight the most important ones to look at under phish emails. At any point you can click the Search button to get more information about the emails with those labels.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2qYK2pXMDnaoZqPvidj3oP/d7459545d59847c80ff16d5b9a73d364/Screenshot-2023-09-28-at-9.01.37-PM.png" />
            
            </figure><p>The report also showcases the top targeted employees as well as the most common places where threats originate from. All these statistics are meant to provide a better understanding of what is going on within your company inbox.</p>
    <div>
      <h2>How to sign up</h2>
      <a href="#how-to-sign-up">
        
      </a>
    </div>
    <p>The retro scan is currently in a closed beta. If you are interested in running a retro scan on your Office 365 email domains please reach out to your Cloudflare contact and we will get it added to your account.</p><p>After running a Retro Scan and seeing the results you can either choose to purchase Cloudflare Area 1 to prevent future threats from making it into your inbox or choose to set up a phishing risk assessment which is a 30 day free trial of the Area 1 product. Whereas the Retro Scan is a great tool to see what latent threats exist, a phishing risk assessment can help you gain better visibility on all the tools we have to keep mailboxes clean.</p><p>To get started you can click the “Request Trial” button at the bottom of the Retro Scan Report, fill out the corresponding form and someone from Cloudflare will reach out or you can reach out directly to your Cloudflare contact.</p> ]]></content:encoded>
            <category><![CDATA[Birthday Week]]></category>
            <guid isPermaLink="false">512esV7C32YzDiW71oe6ze</guid>
            <dc:creator>Ayush Kumar</dc:creator>
        </item>
        <item>
            <title><![CDATA[Cloudflare Email Security now works with CrowdStrike Falcon LogScale]]></title>
            <link>https://blog.cloudflare.com/cloudflare-email-security-now-works-with-crowdstrike-falcon-logscale/</link>
            <pubDate>Thu, 21 Sep 2023 13:00:27 GMT</pubDate>
            <description><![CDATA[ With this integration, joint customers who have both Falcon LogScale and Cloudflare Email Security can now send detection data to be ingested and displayed within their Falcon LogScale dashboard ]]></description>
            <content:encoded><![CDATA[ 
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/FquuHyDPsMcYwbXrqCMn8/0c5b2fec070a0ddf8eb8df42fdcc668a/image5-1.png" />
            
            </figure><p>We are excited to announce an extended partnership between CrowdStrike and Cloudflare to bring together <a href="https://www.cloudflare.com/zero-trust/products/email-security/">Cloudflare Email Security</a> and CrowdStrike Falcon® LogScale. With this integration, joint customers who have both Falcon LogScale and Cloudflare Email Security can now send detection data to be ingested and displayed within their Falcon LogScale dashboard.</p>
    <div>
      <h3>What is CrowdStrike Falcon LogScale?</h3>
      <a href="#what-is-crowdstrike-falcon-logscale">
        
      </a>
    </div>
    <p>CrowdStrike Falcon LogScale enables organizations to ingest, aggregate and analyze massive volumes of streaming log data from a wide array of sources at petabyte scale. It offers search and visualization capabilities, enabling users to easily query and explore their log data to gain valuable insights and identify security threats or anomalies.</p><p>Falcon LogScale helps customers by providing:</p><p><b>Log Ingestion</b> It supports the collection of logs from diverse sources and can handle high volumes of log data in real time.</p><p><b>Real-Time Search</b> Users can perform fast searches across their log data, enabling quick detection and investigation of security incidents or operational issues.</p><p><b>Dashboards and Visualizations</b> Falcon LogScale offers customizable dashboards and visualizations to help teams gain insights from their log data.</p><p>All of these capabilities enable proactive threat hunting by leveraging advanced analytics. It helps security teams identify potential threats, detect anomalies, and quickly remediate security incidents. Falcon LogScale is designed to handle large-scale log data ingestion and analysis. It can scale to accommodate <a href="https://www.cloudflare.com/learning/performance/log-retention-best-practices/">growing log volumes</a> and provide consistent performance.</p><p>Falcon LogScale is the solution for organizations that are looking to consolidate their log management and analysis efforts. It makes monitoring and securing their environments effective and efficient.</p>
    <div>
      <h3>How Cloudflare Email works with Falcon LogScale</h3>
      <a href="#how-cloudflare-email-works-with-falcon-logscale">
        
      </a>
    </div>
    <p>Customers who have both Cloudflare Email Security and CrowdStrike Falcon LogScale can now send detection data to Falcon LogScale. Within Falcon LogScale, this detection information can be visualized and queried.</p><p>To set up Cloudflare Email Security detections to flow into Falcon LogScale, navigate to the Settings section and choose the Marketplace tab in the lefthand toolbar, as shown in the screenshot below.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4WABmFgLPIpepczMvGOlFh/69ac599cc39729cad37b28430a446070/image2.png" />
            
            </figure><p>After installing the package, an ingest token needs to be generated. Navigate to the “Ingest Tokens” tab under Settings and create one.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5gV4sogmc8QmbhHzFsrYCO/23d16e335db132bacabd9bb7b735ddd0/image4-1.png" />
            
            </figure><p>Copy the ingest token to save it for later. From here, customers can navigate to the Cloudflare Email Security dashboard, go to the Settings section, select the Alert Webhooks tab and choose “+ New Webhook”. Then click the SIEM option, choose Other from the dropdown, and input the following information:</p><p><b>Auth Token:</b> Bearer [INGEST TOKEN]<b>Target:</b> <a href="https://cloud.community.humio.com/api/v1/ingest/hec/raw">https://cloud.community.humio.com/api/v1/ingest/hec/raw</a></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/gXAcCOsoN71yC2Kn9DJwV/8d1bdf8c1cf7c85b8b7bc90003dd8fbf/Screenshot-2023-09-08-at-10.31.26.png" />
            
            </figure><p>Customers can choose which events to send to Falcon LogScale by selecting the expanded option. In the screenshot above, the user has chosen to only send malicious and suspicious detections.</p><p>A few minutes after creating a new webhook, Cloudflare Email Security will start sending detection data to the Falcon LogScale instance.</p><p>When the Cloudflare Email Security package from the Falcon LogScale marketplace is installed, customers are provided with a parser for field extraction and out-of-box content through a dashboard. The parser allows the Falcon LogScale product to be able to query the detection data while the dashboard allows organizations to quickly get the relevant information about their email security. Below is what the dashboard looks like:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4uDCtxex6GqQIyBWncKjZp/4fc41be69ec551d11f0c766d8b4f94a3/image3-2.png" />
            
            </figure><p>As you can see, we have included visualizations and queries to get teams up and running quickly, but it is meant to be a starting point for customers to build on. Customers can write their own queries and use them to create their own widgets. From there, they can create their own rendition of this dashboard to fit their needs.</p><p>More information about setting up this integration can be found here: <a href="https://library.humio.com/integrations/integrations-cloudflare-package-area1.html">https://library.humio.com/integrations/integrations-cloudflare-package-area1.html</a></p>
    <div>
      <h3>What’s next</h3>
      <a href="#whats-next">
        
      </a>
    </div>
    <p>We are currently looking to expand the integration of Cloudflare products with Falcon LogScale. Our plan is to extend the integration to the remaining components of the Zero Trust Suite, enabling the relaying of logs and detection data to Falcon LogScale. This will allow customers to visualize and analyze data from these products, similar to the existing Cloudflare Email Security integration. If you are interested and would like to learn more, please reach out to your Cloudflare account contact.</p> ]]></content:encoded>
            <category><![CDATA[Email Security]]></category>
            <category><![CDATA[CrowdStrike]]></category>
            <category><![CDATA[Partners]]></category>
            <category><![CDATA[Product News]]></category>
            <guid isPermaLink="false">5AP5vOnMtPTlQoO8ixyJNs</guid>
            <dc:creator>Ayush Kumar</dc:creator>
            <dc:creator>John Smith (Guest Author)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Cloudflare partners with KnowBe4 to equip organizations with real-time security coaching to avoid phishing attacks]]></title>
            <link>https://blog.cloudflare.com/knowbe4-emailsecurity-integration/</link>
            <pubDate>Fri, 17 Mar 2023 13:00:00 GMT</pubDate>
            <description><![CDATA[ Cloudflare’s Area 1 Solution works with Knowbe4 to provide customers with security and awareness training ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Today, we are very excited to announce that Cloudflare’s <a href="https://www.cloudflare.com/zero-trust/products/email-security/">cloud email security solution</a>, Area 1, now integrates with KnowBe4, a leading security awareness training and simulated phishing platform. This integration allows mutual customers to offer real-time coaching to their employees when a phishing campaign is detected by Cloudflare’s email security solution.</p><p>We are all aware that phishing attacks often use email as a vector to deliver the <a href="https://www.cloudflare.com/learning/email-security/what-is-email-fraud/">fraudulent message</a>. Cybercriminals use a range of tactics, such as posing as a trustworthy organization, using urgent or threatening language, or creating a sense of urgency to entice the recipient to click on a link or download an attachment.</p><p>Despite the increasing sophistication of these attacks and the solutions to stop them, human error remains the weakest link in this chain of events. This is because humans can be easily manipulated or deceived, especially when they are distracted or rushed. For example, an employee might accidentally click on a link in an email that looks legitimate but is actually a phishing attempt, or they might enter their password into a fake login page without realizing it. According to the 2021 Verizon Data Breach Investigations Report, phishing was the most common form of social engineering attack, accounting for 36% of all breaches. The report also noted that 85% of all breaches involved a human element, such as human error or social engineering.</p><p>Therefore, it is essential to educate and train individuals on how to recognize and avoid phishing attacks. This includes raising awareness of common phishing tactics and training individuals to scrutinize emails carefully before clicking on any links or downloading attachments.</p>
    <div>
      <h2>Area1 integrates with KnowBe4</h2>
      <a href="#area1-integrates-with-knowbe4">
        
      </a>
    </div>
    <p>Our integration allows for the seamless integration of Cloudflare’s advanced email security capabilities with KnowBe4's Security Awareness Training platform, KSMAT, and its real-time coaching product, SecurityCoach. This means that organizations using both products can now benefit from an added layer of security that detects and prevents email-based threats in real-time while also training employees to recognize and avoid such threats.</p><p>Organizations can offer real-time security coaching to their employees whenever our <a href="https://www.cloudflare.com/zero-trust/solutions/email-security-services/">email security solution</a> detects four types of events: <b>malicious attachments, malicious links, spoofed emails, and suspicious emails</b>. IT or security professionals can configure their real-time coaching campaigns to immediately deliver relevant training to their users related to a detected event.</p><blockquote><p>“KnowBe4 is proud to partner with Cloudflare to provide a seamless integration with our new SecurityCoach product, which aims to deliver real-time security coaching and advice to help end users enhance their cybersecurity knowledge and strengthen their role in contributing to a strong security culture. KnowBe4 is actively working with Cloudflare to provide an API-based integration to connect our platform with systems that IT/security professionals already utilize, making rolling out new products to their teams an easy and unified process.”- <b>Stu Sjouwerman</b>, CEO, KnowBe4</p></blockquote><p>By using the integration, organizations can ensure that their employees are not only protected by advanced security technology that detects and blocks malicious emails, but are also educated on how to identify and avoid these threats. This has been a commonly demanded feature from our customers and we have made it simple for them to implement it.</p>
    <div>
      <h2>How it works</h2>
      <a href="#how-it-works">
        
      </a>
    </div>
    
    <div>
      <h3>Create private key and public key in the Area 1 dashboard</h3>
      <a href="#create-private-key-and-public-key-in-the-area-1-dashboard">
        
      </a>
    </div>
    <p>Before you can set up this integration in your KnowBe4 (KMSAT) console, you will need to create a private key and public key with Cloudflare.</p><ul><li><p>Log in to your Cloudflare Area 1 email security console as an admin.</p></li><li><p>Click the gear icon in the top-right corner of the page, and then navigate to the Service Accounts tab.</p></li></ul>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2ey4jNQI1pauKRiKZdISs3/a4b3eb87ba6a20cf3b23b49ac4f597f1/image6-9.png" />
            
            </figure><ul><li><p>Click + Add Service Account.</p></li></ul>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/467yKdAIBCimqDsTP8zKAl/4233d948c28b71f5dc2439f35e45dc9b/image8-1.png" />
            
            </figure><ul><li><p>In the NAME field, enter a name for your new service account.</p></li></ul>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4H0CPpuEfrWdymJ2FPFIc5/6e49f1c54cfb70a515e738e9eb1a5a20/image2-21.png" />
            
            </figure><ul><li><p>Click + Create Service Account.</p></li><li><p>In the pop-up window that opens, copy and save the private key somewhere that you can easily access. You will need this key to complete the setup process in the Set Up the Integration in your KnowBe4 (KMSAT) Console section below.</p></li></ul>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4NaqxVtLLs9rKZQNliM7A4/7f8a4b304dde7dd1e87807ef59888398/image4-12.png" />
            
            </figure>
    <div>
      <h3>Set up the integration in your KnowBe4 (KMSAT) Console</h3>
      <a href="#set-up-the-integration-in-your-knowbe4-kmsat-console">
        
      </a>
    </div>
    <p>Once you have created a private key and public key in your Cloudflare Area 1 email security console, you can set up the integration in your KMSAT console. To register Cloudflare Area 1 email security with SecurityCoach in your KMSAT console, follow the steps below:</p><ul><li><p>Log in to your KMSAT console and navigate to SecurityCoach &gt; Setup &gt; Security Vendor Integrations.</p></li><li><p>Locate Cloudflare Area 1 Email Security and click Configure.</p></li></ul>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3D1GlwJNh9qoOcZJR6oi3h/cfd4141a8633f294f185625ad701de09/Screenshot-2023-03-17-at-10.41.52.png" />
            
            </figure><ul><li><p>Enter the Public Key and Private Key that you saved in the ‘Create your private Key and public key’ section above.</p></li></ul>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2MvTlzLSse244i6zX7BEfR/bb4f252f7999163c709684d5b1144ec9/image1-39.png" />
            
            </figure><ul><li><p>Click authorize. Once you’ve successfully authorized this integration, you can manage detection rules for Cloudflare Area 1 on the ‘Detection rules subtab’ of SecurityCoach.</p></li></ul>
    <div>
      <h3>SecurityCoach in action</h3>
      <a href="#securitycoach-in-action">
        
      </a>
    </div>
    <p>Now that the SecurityCoach is set up, users within your organization will receive messages if Area 1 finds that a malicious email was sent to them. An example one can be seen below.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4FZKUgGyVx5CfraGBSWhVM/656d9ebae8714fb95de60ae8c62db045/image9-4.png" />
            
            </figure><p>This message not only alerts the user to be more scrutinous about emails they are receiving, since they now know they are being actively targeted, but also provides them with followup steps that they can take to ensure their account is as safe as possible. The image and text that shows up in the email can be configured from the KnowBe4 console giving customers full flexibility on what to communicate with their employees.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/srYnIoutzlBVaeY9Hs0gr/71c69507db0906c18b1c49c15a7d6fb7/image5-4.png" />
            
            </figure>
    <div>
      <h2>What’s next</h2>
      <a href="#whats-next">
        
      </a>
    </div>
    <p>We’ll be expanding this integration with KnowBe4 to our other <a href="https://www.cloudflare.com/zero-trust/solutions/">Zero Trust products</a> in the coming months. If you have any questions or feedback on this integration, please contact your account team at Cloudflare. We’re excited to continue closely working with technology partners to expand existing and create new integrations that help customers on their <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust</a> journey.</p> ]]></content:encoded>
            <category><![CDATA[Security Week]]></category>
            <category><![CDATA[Email Security]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[Area 1 Security]]></category>
            <guid isPermaLink="false">1v0nId9KOX5TFKER9wsKnM</guid>
            <dc:creator>Ayush Kumar</dc:creator>
            <dc:creator>Deeksha Lamba</dc:creator>
        </item>
        <item>
            <title><![CDATA[API-based email scanning]]></title>
            <link>https://blog.cloudflare.com/api-based-email-scanning/</link>
            <pubDate>Thu, 12 Jan 2023 14:00:00 GMT</pubDate>
            <description><![CDATA[ Customers can now onboard O365 domains to Area 1, adding more flexibility on deployment methods. ]]></description>
            <content:encoded><![CDATA[ <p><i></i></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3fRadJRFI9bBWzFvq9Q7q0/6df53ce80bc35f5b42c186298b5f9190/image1-32.png" />
            
            </figure><p>The landscape of <a href="https://www.cloudflare.com/zero-trust/products/email-security/">email security</a> is constantly changing. One aspect that remains consistent is the reliance of email as the beginning for the majority of threat campaigns. Attackers often start with a phishing campaign to gather employee credentials which, if successful, are used to exfiltrate data, siphon money, or perform other malicious activities. This threat remains ever present even as companies transition to moving their email to the cloud using providers like Microsoft 365 or Google Workspace.</p><p>In our pursuit to help build a better Internet and tackle online threats, Cloudflare offers email security via our Area 1 product to protect all types of email inboxes - from cloud to on premise. The Area 1 product analyzes every email an organization receives and uses our threat models to assess if the message poses risk to the customer. For messages that are deemed malicious, the Area 1 platform will even prevent the email from landing in the recipient's inbox, ensuring that there is no chance for the attempted attack to be successful.</p><p>We try to provide customers with the flexibility to deploy our <a href="https://www.cloudflare.com/zero-trust/solutions/email-security-services/">solution</a> in whatever way they find easiest. Continuing in this pursuit to make our solution as turnkey as possible, we are excited to announce our open beta for Microsoft 365 domain onboarding via the Microsoft Graph API. We know that domains onboarded via <a href="https://www.cloudflare.com/learning/security/api/what-is-an-api/">API</a> offer quicker deployment times and more flexibility. This onboarding method is one of many, so customers can now deploy domains how they see fit without losing Area 1 protection.</p>
    <div>
      <h3>Onboarding Microsoft 365 Domains via API</h3>
      <a href="#onboarding-microsoft-365-domains-via-api">
        
      </a>
    </div>
    <p>Cloudflare Area 1 provides customers with many <a href="https://developers.cloudflare.com/email-security/deployment/">deployment options</a>. Whether it is Journaling + BCC (where customers send a copy of each email to Area 1), Inline/MX records (where another hop is added via MX records), or Secure Email Gateway Connectors (where Area 1 directly interacts with a SEG), Area 1 provides customers with flexibility with how they want to deploy our solution. However, we have always recommended customers to deploy using MX records.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/27WhZHBE17nRxuXOdNVFYD/883e3726e201af66e452f11c53f3fe2b/image2-21.png" />
            
            </figure><p>Adding this extra hop and having domains be pointed to Area 1 allows the service to provide protection with sinkholing, making sure that malicious emails don't reach the destination email inbox. However, we recognized that configuring Area 1 as the first hop (i.e. changing the MX records) may require sign-offs from other teams inside organizations and can lead to additional cycles. Organizations are also caught in waiting for this inline change to reflect in DNS (known as DNS propagation time). We know our customers want to be protected ASAP while they make these necessary adjustments.</p><p>With Microsoft 365 onboarding, the process of adding protection requires less configuration steps and waiting time. We now use the Microsoft Graph API to evaluate all messages associated with a domain. This allows for greater flexibility for operation teams to deploy Area 1.</p><p>For example, a customer of Area 1 who is heavily involved in M&amp;A transactions due to the nature of their industry benefit from being able to deploy Area 1 quickly using the Microsoft API. Before API onboarding, IT teams spent time juggling the handover of various acquisition assets. Assigning new access rights, handing over ownership, and other tasks took time to execute leaving mailboxes unsecured. However, now when the customer acquires a new entity, they can use the API onboarding to quickly add protection for the domains they just acquired. This allows them to have protection on the email addresses associated with the new domain while they work on completing the other tasks on hand. How our API onboarding process works can be seen below.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6aDQVkfjyA7XhTEREVsQdl/d5fbd0ce4fd4a37eeb632e4a3a9ae890/image4-16.png" />
            
            </figure><p>Once we are authorized to read incoming messages from Microsoft 365, we will start processing emails and firing detections on suspected emails. This new onboarding process is significantly faster and only requires a few clicks to get started.</p><p>To start the process, choose which domain you would like to onboard via API. Then within the UI, you can navigate to “Domains &amp; Routing” within the settings. After adding a new domain and choosing API scan, you can follow our setup wizard to authorize Area 1 to start reading messages.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1hQK1E7Ixpq6aFUyVYxNCQ/44e3767916583a12294dc8f6751cc507/image5-12.png" />
            
            </figure><p>API scan</p><p>Within a few minutes of authorization, your organization will now be protected by Area 1.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2yOicmQz0n4vvNTy58MIPD/103938baee0a9c0948aff6a4421337d7/image3-20.png" />
            
            </figure><p>Ready to scan ‌‌</p>
    <div>
      <h3>Looking Ahead</h3>
      <a href="#looking-ahead">
        
      </a>
    </div>
    <p>This onboarding process is part of our continual efforts to provide customers with best of class email protection. With our API onboarding we provide customers with increased flexibility to deploy our solution. As we look forward, our Microsoft 365 API onboarding opens the door for other capabilities.</p><p>Our team is now looking to add the ability to retroactively scan emails that were sent before Area 1 was installed. This provides the opportunity for new customers to clean up any old emails that could still pose a risk for the organization. We are also looking to provide more levers for organizations who want to have more control on which mailboxes are scanned with Area 1. Soon customers will be able to designate within the UI which mailboxes will have their incoming email scanned by Area 1.</p><p>We also currently limit the deployment type of each domain to one type (i.e. a domain can either be onboarded using MX records or API). However, we are now looking at providing customers with the ability to do hybrid deployments, using both API + MX records. This combinatorial approach not only provides the greatest flexibility but also provides the maximum coverage.</p><p>There are many things in the pipeline that the Area 1 team is looking to bring to customers in 2023 and this open beta lets us build these new capabilities.</p><p>All customers can join the open beta so if you are interested in onboarding a new domain using this method, follow the steps above and get Area 1 protection on your Microsoft 365 Domains.</p> ]]></content:encoded>
            <category><![CDATA[CIO Week]]></category>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <guid isPermaLink="false">53YarcYx9mwYRZbY8eUbSX</guid>
            <dc:creator>Ayush Kumar</dc:creator>
        </item>
        <item>
            <title><![CDATA[How Cloudflare Area 1 and DLP work together to protect data in email]]></title>
            <link>https://blog.cloudflare.com/dlp-area1-to-protect-data-in-email/</link>
            <pubDate>Wed, 11 Jan 2023 13:00:00 GMT</pubDate>
            <description><![CDATA[ Customers can leverage the power of Email Security and Cloudflare One to prevent data loss in their corporate network. ]]></description>
            <content:encoded><![CDATA[ <p><i></i></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/8ppqP7NHeQkrw9i8XBKHC/1fdda896628f727afdd52d474b503fed/image6-3.png" />
            
            </figure><p>Threat prevention is not limited to keeping external actors out, but also keeping sensitive data in. Most organizations do not realize how much confidential information resides within their email inboxes. Employees handle vast amounts of sensitive data on a daily basis, such as intellectual property, internal documentation, PII, or payment information and often share this information internally via email making email one of the largest locations confidential information is stored within a company. It comes as no shock that organizations worry about protecting the accidental or malicious egress of sensitive data and often address these concerns by instituting strong Data Loss Prevention policies. Cloudflare makes it easy for customers to manage the data in their email inboxes with <a href="https://www.cloudflare.com/products/zero-trust/email-security/">Area 1</a> Email Security and <a href="https://www.cloudflare.com/cloudflare-one">Cloudflare One</a>.</p><p>Cloudflare One, our <a href="https://www.cloudflare.com/learning/access-management/what-is-sase/">SASE</a> platform that delivers <a href="https://www.cloudflare.com/learning/network-layer/network-as-a-service-naas/">network-as-a-service (NaaS)</a> with <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust security</a> natively built-in, connects users to enterprise resources, and offers a wide variety of opportunities to secure corporate traffic, including the inspection of data transferred to your corporate email. Area 1 email security, as part of our composable Cloudflare One platform, delivers the most complete data protection for your inbox and offers a cohesive solution when including additional services, such as Data Loss Prevention (DLP). With the ability to easily adopt and <a href="https://www.cloudflare.com/learning/access-management/how-to-implement-zero-trust/">implement Zero Trust services</a> as needed, customers have the flexibility to layer on defenses based on their most critical use cases. In the case of Area 1 + DLP, the combination can collectively and preemptively address the most pressing use cases that represent high-risk areas of exposure for organizations. Combining these products provides the in-depth defense of your corporate data.</p>
    <div>
      <h3>Preventing egress of cloud email data via HTTPs</h3>
      <a href="#preventing-egress-of-cloud-email-data-via-https">
        
      </a>
    </div>
    <p>Email provides a readily available outlet for corporate data, so why let sensitive data reach email in the first place? An employee can accidentally attach an internal file rather than a public white paper in a customer email, or worse, attach a document with the wrong customers’ information to an email.</p><p>With Cloudflare Data Loss Prevention (DLP) you can prevent the upload of sensitive information, such as PII or intellectual property, to your corporate email. DLP is offered as part of Cloudflare One, which runs traffic from data centers, offices, and remote users through the Cloudflare network.  As traffic traverses Cloudflare, we offer protections including validating identity and device posture and filtering corporate traffic.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1SaBAFDdzHwvmrs84LkvKJ/1a0e5a81ba41b791921b2a7df8f5b9d0/image5-7.png" />
            
            </figure><p>Cloudflare One offers HTTP(s) filtering, enabling you to inspect and route the traffic to your corporate applications. Cloudflare Data Loss Prevention (DLP) leverages the HTTP filtering abilities of Cloudflare One. You can apply rules to your corporate traffic and route traffic based on information in an HTTP request. There are a wide variety of <a href="https://developers.cloudflare.com/cloudflare-one/policies/filtering/http-policies/data-loss-prevention/">options for filtering</a>, such as domain, URL, application, HTTP method, and many more. You can use these options to segment the traffic you wish to DLP scan. All of this is done with the performance of our global network and managed with one control plane.</p><p>You can apply DLP policies to corporate email applications, such as Google Suite or O365.  As an employee attempts to upload an attachment to an email, the upload is inspected for sensitive data, and then allowed or blocked according to your policy.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/704ZpjYQXtyZ2D00VTgOV9/2aed47f2472eccaa3de611a40ee7d105/image2-17.png" />
            
            </figure><p>Inside your corporate email extend more core data protection principles with Area 1 in the following ways:</p>
    <div>
      <h3>Enforcing data security between partners</h3>
      <a href="#enforcing-data-security-between-partners">
        
      </a>
    </div>
    <p>With Cloudflare’s Area 1, you can also enforce strong TLS standards. Having TLS configured adds an extra layer of security as it ensures that emails are encrypted, preventing any attackers from reading sensitive information and changing the message if they intercept the email in transit (<a href="https://www.cloudflare.com/learning/security/threats/on-path-attack/">on-path-attack</a>). This is especially useful for G Suite customers whose internal emails still go out to the whole Internet in front of prying eyes or for customers who have contractual obligations to communicate with partners with SSL/TLS.</p><p>Area 1 makes it easy to enforce SSL/TLS inspections. From the Area 1 portal, you can configure Partner Domain(s) TLS by navigating <i>“Partner Domains TLS”</i> within “<i>Domains &amp; Routing”</i> and adding a partner domain with which you want to enforce TLS. If TLS is required then all emails from that domain with no TLS will be automatically dropped. Our TLS ensures strong TLS rather than the best effort in order to make sure that all traffic is encrypted with strong ciphers preventing a malicious attacker from being able to decrypt any intercepted emails.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6oDQjBZINI9yeEBL2opdf8/f9f16241839d78d283125bfb1fb93d7b/image4-13.png" />
            
            </figure>
    <div>
      <h3>Stopping passive email data loss</h3>
      <a href="#stopping-passive-email-data-loss">
        
      </a>
    </div>
    <p>Organizations often forget that exfiltration also can be done without ever sending any email. Attackers who are able to compromise a company account are able to passively sit by, monitoring all communications and picking out information manually.</p><p>Once an attacker has reached this stage, it is incredibly difficult to know an account is compromised and what information is being tracked. Indicators like email volume, IP address changes, and others do not work since the attacker is not taking any actions that would cause suspicion. At Cloudflare, we have a strong thesis on <a href="https://www.cloudflare.com/zero-trust/solutions/account-takeover-prevention/">preventing these account takeovers</a> before they take place, so no attacker is able to fly under the radar.</p><p>In order to stop account takeovers before they happen, we place great emphasis on filtering emails that pose a risk for stealing employee credentials. The most common attack vector used by malicious actors are phishing emails. Given its ability to have a high impact in accessing confidential data when successful, it’s no shock that this is the go-to tool in the attackers tool kit. Phishing emails pose little threat to an email inbox protected by Cloudflare’s Area 1 product. Area 1’s models are able to assess if a message is a suspected phishing email by analyzing different metadata. Anomalies detected by the models like domain proximity (how close a domain is to the legitimate one), sentiment of email, or others can quickly determine if an email is legitimate or not. If Area 1 determines an email to be a phishing attempt, we automatically retract the email and prevent the recipient from receiving the email in their inbox ensuring that the employee’s account remains uncompromised and unable to be used to exfiltrate data.</p>
    <div>
      <h3>Protecting Against Malicious Links</h3>
      <a href="#protecting-against-malicious-links">
        
      </a>
    </div>
    <p>Attackers who are looking to <a href="https://www.cloudflare.com/learning/security/what-is-data-exfiltration/">exfiltrate data</a> from an organization also often rely on employees clicking on links sent to them via email. These links can point to online forms which on the surface look innocuous but serve to gather sensitive information. Attackers can use these websites to initiate scripts which gather information about the visitor without any interaction from the employee. This presents a strong concern since an errant click by an employee can lead to the exfiltration of sensitive information. Other malicious links can contain exact copies of websites which the user is accustomed to accessing. However, these links are a form of phishing where the credentials entered by the employee are sent to the attacker rather than logging them into the website.</p><p>Area 1 covers this risk by providing <a href="/safe-email-links/">Email Link Isolation</a> as part of our <a href="https://www.cloudflare.com/zero-trust/products/email-security/">email security</a> offering. With email link isolation, Area 1 looks at every link sent and accesses its domain authority. For anything that's on the margin (a link we cannot confidently say is safe), Area 1 will launch a headless Chromium browser and open the link there with no interruption. This way, any malicious scripts that execute will run on an isolated instance far from the company’s infrastructure, stopping the attacker from getting company information. This is all accomplished instantaneously and reliably.</p>
    <div>
      <h3>Stopping Ransomware</h3>
      <a href="#stopping-ransomware">
        
      </a>
    </div>
    <p>Attackers have many tools in their arsenal to try to compromise employee accounts. As we mentioned above, phishing is a common threat vector, but it's far from the only one. At Area 1, we are also vigilant in <a href="https://www.cloudflare.com/learning/security/ransomware/how-to-prevent-ransomware/">preventing the propagation of ransomware</a>.</p><p>A common mechanism that attackers use to disseminate ransomware is to disguise attachments by renaming them. A ransomware payload could be renamed from petya.7z to Invoice.pdf in order to try to trick an employee into downloading the file. Depending on how urgent the email made this invoice seem, the employee could blindly try to open the attachment on their computer causing the organization to suffer a ransomware attack. Area 1’s models detect these mismatches and stop malicious ones from arriving into their target’s email inbox.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2WQIj1D7PNCJsOdX8hKchw/d36a976b9170195ee05c2eec49d654e3/image1-26.png" />
            
            </figure><p>A successful ransomware campaign can not only stunt the daily operations of any company, but can also lead to the loss of local data if the encryption is unable to be reversed. Cloudflare’s Area 1 product has dedicated payload models which analyze not only the attachment extensions but also the hashed value of the attachment to compare it to known ransomware campaigns. Once Area 1 finds an attachment deemed to be ransomware, we prohibit the email from going any further.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6p9osqhPcNKYz8wBsCoHsW/17f23b7b5aae575f6d1a26138769d567/image3-15.png" />
            
            </figure>
    <div>
      <h3>Cloudflare’s DLP vision</h3>
      <a href="#cloudflares-dlp-vision">
        
      </a>
    </div>
    <p>We aim for Cloudflare products to give you the layered security you need to protect your organization, whether its malicious attempts to get in or sensitive data getting out. As email continues to be the largest surface of corporate data, it is crucial for companies to have strong DLP policies in place to prevent the loss of data. With Area 1 and Cloudflare One working together, we at Cloudflare are able to provide organizations with more confidence about their DLP policies.</p><p>If you are interested in these email security or DLP services, <a href="https://www.cloudflare.com/lp/cio-week-2023-cloudflare-one-contact-us/">contact us for a conversation</a> about your security and data protection needs.</p><p>Or if you currently subscribe to Cloudflare services, consider reaching out to your Cloudflare customer success manager to discuss adding additional email security or DLP protection.</p> ]]></content:encoded>
            <category><![CDATA[CIO Week]]></category>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <guid isPermaLink="false">6orNvCFKmOebk6b3WheUiR</guid>
            <dc:creator>Ayush Kumar</dc:creator>
            <dc:creator>Noelle Kagan</dc:creator>
        </item>
        <item>
            <title><![CDATA[How Cloudflare helps secure the inboxes of democracy]]></title>
            <link>https://blog.cloudflare.com/securing-the-inboxes-of-democracy/</link>
            <pubDate>Mon, 12 Dec 2022 14:00:00 GMT</pubDate>
            <description><![CDATA[ Cloudflare email security tool worked hard in the 2022 midterm elections to ensure that the email inboxes of those seeking office were secure. ]]></description>
            <content:encoded><![CDATA[ <p><i></i></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/78XAHfAo8IhaPP4lsOUyx3/1f7873e7bfc7a507f797c007c69952e2/image2-6.png" />
            
            </figure><p>We at Cloudflare believe that every candidate, no matter their political affiliation, should be able to operate their campaign without having to worry about the risk of cyberattacks. Malicious attackers such as nation-state threat actors, those seeking monetary reward, or those with too much time on their hands often disagree with our mission and aim to wreak havoc on the democratic process.</p>
    <div>
      <h3>Protecting Email Inboxes Is Key In Stopping Attacks</h3>
      <a href="#protecting-email-inboxes-is-key-in-stopping-attacks">
        
      </a>
    </div>
    <p>In the past years, malicious actors have used email as their primary threat vector when trying to disrupt election campaigns. A quick search online shows how active attackers still are in trying to compromise election official’s email inboxes.<sup>1</sup> Over 90% of damages done to any organization are caused by a phishing attack, making protecting email inboxes a key focus. A well crafted phishing email paired, or an errant click could give an attacker the opportunity to see sensitive information, disseminate false information to voters, or steal campaign donations.</p><p>For the United States 2022 midterm elections, Cloudflare protected the inboxes of over 100 campaigns, election officials and public organizations supporting elections. These campaigns ranged from new officials seeking spots in their local elections to incumbents in the national government. In the three months leading up to the recent elections, Cloudflare processed over 20 million emails and stopped around 150K phishing attacks from making their way into campaign officials' email inboxes.</p>
    <div>
      <h3>Political Campaigns Are Attacked Consistently</h3>
      <a href="#political-campaigns-are-attacked-consistently">
        
      </a>
    </div>
    <p>Some campaigns were targeted more than others. For example, the campaign of a specific incumbent seeking re-election in the US Senate saw their staff members receiving over 35 malicious emails on average every day. And attackers were not just phishing for credentials but also trying to impersonate officials. We saw over 10 thousand emails sent in the three-month span that were using the names of those running for office without their permission.</p><p>Below are the metrics we saw from a senator’s campaign who attackers frequently tried to phish.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6Qqld6iHUc4g6vmQfBnYG2/f09c850caaf95106cc5c78f879c57bb3/image4-4.png" />
            
            </figure><p>A candidate for the US House of Representatives saw their staff members receive an email with the subject “Staff Payroll Review” that asked them to access a document link.</p><p>Looking at the email, it would be tough to distinguish it from a valid internal email. It contained a valid email footer and branding that is consistent with the campaign. However, Area 1 models found several discrepancies within the metadata of the email and marked it as malicious.</p><p>Our models found that the domain sending these emails was suspicious based on how similar it was to the representative's actual campaign email. We refer to this as domain proximity. Also analyzing the link found in the email found that it was recently registered, further adding suspicion to the validity of the email.</p><p>Taking in all the data points, Area 1 made sure that the email never made it to any campaign staff’s mailbox and prevented the loss of data and money.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6LOQBeTP2cngDdnNHsknQf/84756044f88b666e5ea9607e7f851f1d/image3-1.png" />
            
            </figure><p>Another common attack campaigns see is the use of malicious attachments. These attachments can range from containing ransomware to data uploaders. The goal is to either slow down the politician’s campaign or <a href="https://www.cloudflare.com/learning/security/what-is-data-exfiltration/">exfiltrate</a> sensitive information.</p><p>Attackers will use misdirection by either changing the extension of the attached file or by mentioning in the body of the email that the attachment is something more innocuous. We saw this in action for another campaign where a staffer was sent a targeted email asking them to download a purchase order.</p><p>Someone who processes hundreds of purchase orders a day does not have the time to thoroughly scrutinize every email and instead will focus on getting the money paid, so operations are not halted. Area 1’s models saved the staffer time and assessed this email to be malicious.</p><p>Our models first noticed that the attachment was a 7-Zip file called PO567.7z. Most purchase orders are sent via PDF so seeing it being sent as a 7z compressed file was concerning. Another data point the models assessed as being anomalous was the poor sentiment. The email not only has a glaring  grammatical mistake (i.e. “Dear Info,”) but also had poor message tone since it lacked common information found in legitimate purchase order emails.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4Gp3XVdP5vXeHdlUnwfsBn/63dd659f2abec7758e6988501639ec42/image1-9.png" />
            
            </figure><p>All these signals, combined with the fact that this is the first time the recipient has ever received communications from the sender, triggered Area 1 to stop the email from making it into any mailbox.</p><p>These examples speak about the trust that campaigns place in Cloudflare. Our ability to scan millions of emails and prevent dangerous ones from making it into mailboxes while allowing safe ones to reach their intended recipients with no interruptions is why so many campaigns chose Cloudflare’s Area 1 product to secure their mailboxes and by extension secure our democratic institutions.</p>
    <div>
      <h3>Cloudflare’s Area 1 Solution</h3>
      <a href="#cloudflares-area-1-solution">
        
      </a>
    </div>
    <p>All this is possible because of Area 1’s preemptive campaign discovery and machine learning algorithms which analyze various threat signals, from email attachments, to the sender's domain, to sentiment within the email itself in order to assess whether an email is malicious or not.</p><p>We also made Area 1 easily deployable, ensuring that campaigns are protected right away rather than having to spend time configuring hardware, agents, or appliances. Cloudflare also knows that election campaigns struggle to apply the appropriate email hygiene and authentication controls, stipulated by industry standards (such as SPF / DKIM / DMARC).</p><p>These can be complex and take time to implement. The rapid cycle of new campaigns makes it harder to set up the right email authentication controls that conform with industry best practices. Given that, it is all the more vital to ensure there are strong inbound technical controls against phishing and email-based attacks; letting campaigns focus on what's most important - spreading their message to their constituents in the most effective &amp; secure manner possible.We know that those who seek to become political leaders have a target on their backs from attackers looking to disrupt the democratic process.</p><p>At Cloudflare, we believe in creating a better Internet and that means ensuring that <a href="https://www.cloudflare.com/zero-trust/solutions/email-security-services/">inboxes remain secure</a>. If you would like to learn more about how Area 1 works and other ways we protect email inboxes, please check out the Area 1 product page <a href="https://www.cloudflare.com/products/zero-trust/email-security/">here</a>.</p><p>...</p><p><sup>1. </sup><a href="https://www.cbsnews.com/feature/election-hacking/">https://www.cbsnews.com/feature/election-hacking/</a></p><p></p> ]]></content:encoded>
            <category><![CDATA[Impact Week]]></category>
            <category><![CDATA[Email Security]]></category>
            <category><![CDATA[Cloud Email Security]]></category>
            <guid isPermaLink="false">673KHQmNbUYisO2COSZZg</guid>
            <dc:creator>Ayush Kumar</dc:creator>
        </item>
    </channel>
</rss>