
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[ The Cloudflare Blog ]]></title>
        <description><![CDATA[ Get the latest news on how products at Cloudflare are built, technologies used, and join the teams helping to build a better Internet. ]]></description>
        <link>https://blog.cloudflare.com</link>
        <atom:link href="https://blog.cloudflare.com/" rel="self" type="application/rss+xml"/>
        <language>en-us</language>
        <image>
            <url>https://blog.cloudflare.com/favicon.png</url>
            <title>The Cloudflare Blog</title>
            <link>https://blog.cloudflare.com</link>
        </image>
        <lastBuildDate>Fri, 10 Apr 2026 13:32:52 GMT</lastBuildDate>
        <item>
            <title><![CDATA[Introducing Cloudflare Security Center]]></title>
            <link>https://blog.cloudflare.com/security-center/</link>
            <pubDate>Thu, 09 Dec 2021 13:59:33 GMT</pubDate>
            <description><![CDATA[ We're launching Security Center, making attack surface management actionable and accessible, built on Cloudflare’s unique visibility into Internet activity and expertise on security best practices. ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Today we are launching Cloudflare Security Center, which brings together our suite of security products, our security expertise, and unique Internet intelligence as a unified security intelligence solution.</p><p>Cloudflare was launched in 2009 to help build a better Internet and make Internet performance and security accessible to everyone. Over the last twelve years, we’ve disrupted the security industry and launched a broad range of products to address our customer’s pain points across <a href="https://www.cloudflare.com/application-services/solutions/">Application Security</a>, <a href="https://www.cloudflare.com/learning/network-layer/network-security/">Network Security</a>, and Enterprise Security.</p><p>While there are a plethora of solutions on the market to solve specific pain points, we’ve architected Cloudflare One as a unified platform to holistically address our customers’ most pressing security challenges.  As part of this vision, we are extremely excited to launch the public beta of Security Center. Our goal is to help customers understand their <a href="https://www.cloudflare.com/learning/security/what-is-an-attack-surface/">attack surface</a> and quickly take action to reduce their risk of an incident.</p><p>Starting today, all Cloudflare users can use Security Center (available in <a href="http://dash.cloudflare.com/?to=/:account/security-center">your Cloudflare dashboard</a>) to map their attack surface, review potential security risks and threats to their organizations, and mitigate these risks with a few clicks.</p>
    <div>
      <h3>The changing corporate attack surface</h3>
      <a href="#the-changing-corporate-attack-surface">
        
      </a>
    </div>
    <p>A year ago, we <a href="/introducing-cloudflare-one/">announced Cloudflare One</a> to address the complex nature of corporate networking today. The proliferation of public cloud, SaaS applications, mobile devices, and remote work has made the traditional model of the corporate network obsolete. The Internet is the new enterprise WAN, necessitating a novel approach to the way security teams <a href="https://www.cloudflare.com/application-services/products/securitycenter/">manage their attack surface</a>.</p><p>Second, the way we build applications has changed. Web applications today heavily use open source code and third-party scripts. Earlier this year we <a href="/introducing-page-shield/">announced Page Shield</a>, now GA, to help our customers track and monitor their third-party JavaScript dependencies.</p><p>These transformations in the IT landscape, coupled with the natural evolution that every organization goes through — such as growth, attrition, and M&amp;A activity — create significant complexity for IT and security teams to stay on top of their organization’s ever-changing attack surface.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5HL9WvE5u4irCvhXhAHB3s/f0ed3936c06ef9b5ff9e5e5f5f8da5b9/image1-43.png" />
            
            </figure>
    <div>
      <h3>The importance of attack surface management</h3>
      <a href="#the-importance-of-attack-surface-management">
        
      </a>
    </div>
    <p>An attack surface refers to the entire IT footprint of an organization that is susceptible to cyberattacks. Your attack surface consists of all the corporate servers, devices, SaaS, and cloud assets that are accessible from the Internet.</p><p>Over the last six months, something we’ve heard consistently from our customers is that they often don’t have a good grasp of their attack surface.</p><p>Because of the ease of creating new resources with the public cloud or SaaS, IT teams struggle to stay on top of shadow IT resources. Even when IT is aware of new infrastructure being spun up by dev teams, ensuring that these new resources are configured in line with corporate security standards is a constant battle.</p><p>It’s not only new resources that cause problems for IT teams — IT teams also want to quickly identify and decommission forgotten websites or applications that may have sensitive data or expose their organization to potential security risks.</p><p>These challenges are further complicated by the use of third-party software. Open source code, JavaScript libraries, SaaS applications, or self-hosted software <a href="https://www.cloudflare.com/the-net/oss-attack-detection/">introduce supply-chain risk</a> into your attack surface. Security teams want to monitor potential vulnerabilities and malicious dependencies in third-party software.</p><p>Lastly, external threats add to your organization’s attack surface. Security teams want to quickly identify and take down rogue assets created by malicious actors. These rogue assets are often phishing sites or malware distribution points that attempt to trick the organization’s customers or employees into providing sensitive details or downloading a file.</p>
    <div>
      <h3>The challenges of attack surface management</h3>
      <a href="#the-challenges-of-attack-surface-management">
        
      </a>
    </div>
    <p>With such an expansive list of potential risks and threats to an organization, it’s no surprise that organizations of all sizes are struggling to keep up with their attack surface. Many of our customers have built in-house solutions or use a range of security products to ascertain and monitor their attack surface.</p><p>But we’ve consistently heard from our customers that these solutions just don’t work. They are often too noisy and produce far too many alerts, making it difficult for security teams to triage and prioritize issues. Customers are also tired of security vendor sprawl and don’t want to add yet another tool to integrate with their existing security solutions. Security teams have limited resources — across staff and budget — and they want a solution that creates less, not more, work.</p>
    <div>
      <h3>Introducing Cloudflare Security Center</h3>
      <a href="#introducing-cloudflare-security-center">
        
      </a>
    </div>
    <p>In order to make attack surface management accessible and actionable for all organizations, we are excited to launch Cloudflare Security Center. Security Center is a single place to map your attack surface, identify potential security risks, and mitigate risks with a few clicks.</p><p>Starting today, you’ll find “Security Center” in your Account Home page.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1HcUkeSyNwjpdjdquF0fgH/1108c4c6d443b4a2700904207634e469/image3-17.png" />
            
            </figure><p>Once you navigate to Security Center within the Cloudflare dashboard, you’ll find two new features:</p><ul><li><p><b>Security Insights</b>: Review and manage potential security risks and vulnerabilities associated with your IT infrastructure.</p></li><li><p><b>Infrastructure</b>: Review and manage your IT infrastructure</p></li></ul><p>In today’s release, if you navigate to <b>Security Insights</b>, you can view a log of potential security risks, vulnerabilities, and insecure configurations associated with your IT infrastructure on Cloudflare. Our security experts have helped curate our automated detections to help you quickly triage and address the most critical issues impacting your attack surface.</p><p>If this is your first time using Security Center, you will need to click <b>Start scan</b> to consent to Cloudflare scanning your infrastructure. Once you opt in to Security Center, we will scan your infrastructure on a regular schedule:</p><ul><li><p>If you have any Pro or higher plan zones, or are using Teams Standard or higher, after opting in to Security Center, we will scan your infrastructure on a daily basis.</p></li><li><p>For all other Cloudflare plans, after opting in to Security Center, we will scan your infrastructure every three days.</p></li></ul><p>After every scan, you can visit the Security Insights page to view a high level summary of your attack surface and dig into the specifics of any potential security risks we have identified.</p><div></div><p>Directly from Security Insights, you can resolve any insights by making the recommended changes to your Cloudflare configurations in just a few clicks.</p><div></div><p>With each scan, we inventory your IT assets on Cloudflare as part of the <b>Infrastructure</b> feature within <b>Security Center</b>. Here, you can view a summary of your domains on Cloudflare. At the top of the page, you can find a breakdown of your DNS records by Proxy Usage. Below this chart, you can review a list of all your domains on Cloudflare, as well as view other key details about your domains.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6FM8UVknVMfM3g0bXM3pvL/3caa0ed6851325be60ab9fd8574963a9/image4-20.png" />
            
            </figure>
    <div>
      <h3>What’s next</h3>
      <a href="#whats-next">
        
      </a>
    </div>
    <p>All features made available as part of today’s Security Center beta release are included in your existing Cloudflare plan. It’s our mission to help build a better Internet, and we believe that making attack surface management accessible and actionable is an important part of that mission. We want everyone, from an individual web developer to the <a href="https://www.cloudflare.com/cio/">CIO of a Fortune 100 company</a>, to be able to easily secure their IT footprint.</p><p>You can get started today with Security Center’s beta release by <a href="http://dash.cloudflare.com/?to=/:account/security-center">visiting your Cloudflare dashboard</a>. With just a few clicks, you can ensure that your Cloudflare settings are optimized for your organization’s security.</p><p>We’d love your feedback on Security Center. If you have any comments, questions or concerns, you can contact us directly at <a>securitycenter@cloudflare.com</a>, or on our <a href="https://community.cloudflare.com/c/security/security-center/65">Cloudflare Community forum</a>.</p><p>Stay tuned for further updates, as we continue to add more features to Security Center. Soon, you’ll be able to control not only your IT assets on Cloudflare, but your entire IT footprint. We’ll continue to build upon our risk detection capabilities, going beyond Application Security to <a href="https://www.cloudflare.com/network-security/">Network Security</a>, Enterprise Security, and Brand Security.</p> ]]></content:encoded>
            <category><![CDATA[CIO Week]]></category>
            <category><![CDATA[Security]]></category>
            <guid isPermaLink="false">5uWLKgMXOLapx2PLpNAS0K</guid>
            <dc:creator>Malavika Balachandran Tadeusz</dc:creator>
        </item>
        <item>
            <title><![CDATA[Announcing antivirus in Cloudflare Gateway]]></title>
            <link>https://blog.cloudflare.com/announcing-antivirus-in-cloudflare-gateway/</link>
            <pubDate>Tue, 23 Mar 2021 13:00:00 GMT</pubDate>
            <description><![CDATA[ We’re announcing support for malware detection and prevention directly from the Cloudflare edge, giving Gateway users an additional line of defense against security threats. ]]></description>
            <content:encoded><![CDATA[ <p>Today we’re announcing support for malware detection and prevention directly from the Cloudflare edge, giving Gateway users an additional line of defense against security threats.</p><p>Cloudflare Gateway protects employees and data from threats on the Internet, and it does so without sacrificing performance for security. Instead of backhauling traffic to a central location, Gateway customers connect to one of Cloudflare’s data centers in 200 cities around the world where our network can apply content and security policies to protect their Internet-bound traffic.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2Df0kOWRoBf3PRw2eumHJ8/9455cbbd422bbc2b5a35561893936705/image1-34.png" />
            
            </figure><p>Last year, Gateway expanded from a <a href="/protect-your-team-with-cloudflare-gateway/">secure DNS filtering solution</a> to a full <a href="/gateway-swg/">Secure Web Gateway</a> capable of protecting every user’s HTTP traffic as well. This enables admins to detect and block not only threats at the DNS layer, but malicious URLs and undesired file types as well. Moreover, admins now have the ability to create high-impact, company-wide policies that protect all users with one click, or they can create more granular <a href="/gateway-swg-3/">rules based on user identity</a>.</p><p>Earlier this month, we launched <a href="/gateway-app-policies/">application policies</a> in Cloudflare Gateway to make it easier for administrators to block specific web applications. With this feature, administrators can block those applications commonly used to distribute malware, such as public cloud file storage.</p><p>These features in Gateway enable a layered approach to security. With Gateway’s DNS filtering, customers are protected from threats that <a href="/a-quirk-in-the-sunburst-dga-algorithm/">abuse the DNS protocol</a> for the purposes of communicating with a C2 server, downloading an implant payload, or exfiltrating corporate data. DNS filtering applies to all applications generating DNS queries, and HTTP traffic inspection complements that by going deep on threats that users might encounter as they navigate the Internet.</p><p>Today, we are excited to announce another layer of defense with the addition of antivirus protection in Cloudflare Gateway. Now administrators can block malware and other malicious files from being downloaded onto corporate devices as they pass through Cloudflare’s edge for file inspection.</p>
    <div>
      <h3>Stopping malware distribution</h3>
      <a href="#stopping-malware-distribution">
        
      </a>
    </div>
    <p>Protecting corporate infrastructure and devices from becoming infected with malware in the first place is one of the top priorities for IT admins. Malware can wreak a wide range of havoc: business operations may be crippled by ransomware, sensitive data may be exfiltrated by spyware, or local CPU resources may be siphoned for financial gain by cryptojacking malware.</p><p>In order to compromise a network, malicious actors commonly attempt to distribute malware through an email attachment or malicious link <a href="https://www.cloudflare.com/learning/email-security/what-is-email-fraud/">sent via email</a>. More recently, in order to evade <a href="https://www.cloudflare.com/zero-trust/products/email-security/">email security</a>, threat actors are beginning to leverage other communication channels, such as SMS, voice, and support ticket software for malware distribution.</p><p>The devastating impact of malware, coupled with the <a href="https://www.cloudflare.com/learning/security/what-is-an-attack-surface/">large attack surface</a> for potential compromise, makes <a href="https://www.cloudflare.com/learning/security/ransomware/how-to-prevent-ransomware/">malware prevention</a> a top-of-mind concern for security teams.</p>
    <div>
      <h3>Defense in Depth</h3>
      <a href="#defense-in-depth">
        
      </a>
    </div>
    <p>No single tool or approach provides perfect security, necessitating a layered defense against threats that make their way past these different tools. Not all threats are previously known to threat researchers, requiring admins to fall back on additional inspection tools once a user successfully connects to a site containing potentially malicious content.</p><p>Highly sophisticated threats may make their way into a user’s network and the primary task for security teams is to quickly determine the scope of the attack against their organization. In these worst case scenarios, where a user accesses a domain, website, or file that is deemed malicious, the last line of defense for a security team is achieving a clear understanding of the source of the attack against their organization and what resources were affected.</p>
    <div>
      <h3>Announcing File Scanning</h3>
      <a href="#announcing-file-scanning">
        
      </a>
    </div>
    <p>Today, with Cloudflare Gateway, you can augment your endpoint protection and prevent malicious files from being downloaded onto employee devices. Gateway will scan files inbound from the Internet as they pass through the Cloudflare edge at the nearest data center. Cloudflare manages this layer of defense for customers the same as it manages intelligence used for DNS and HTTP traffic filtering, freeing admins from purchasing additional antivirus licenses or worrying about keeping virus definitions up to date.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1ewqp8BcNB4NfhfJoR0Ugc/818f0b6dd60a4d5e7dae03da32bd1c41/image2-28.png" />
            
            </figure><p>When a user initiates a download and that file passes through Gateway at Cloudflare’s edge, that file is sent to the malware scanning engine. This engine contains malware sample definitions and is updated on a daily basis. When Gateway scans a file and detects the presence of malware, it will block the file transfer by resetting the connection which is then displayed to the user in their browser as a download error. Gateway also logs the URL where the file was downloaded, the SHA-256 hash of the file, and the fact that the file was blocked due to the presence of malware.</p><p>A common approach to security is to “assume breach.” This assumption by security teams acknowledges that not all threats are previously known and optimizes for responding to threats quickly. With Gateway, administrators have complete visibility over the impact the threat had on their organization by leveraging Gateway’s centralized logging, providing clear steps for threat remediation as part of an incident response.</p>
    <div>
      <h3>Detecting malware post-compromise</h3>
      <a href="#detecting-malware-post-compromise">
        
      </a>
    </div>
    <p>When using an “assume breach” approach, security teams rely on surfacing actionable insights from all available information around an attack. A more sophisticated attack might unfold this way:</p><ul><li><p>After exploiting a user’s system through any number of means (leading to the “assume breach” approach), a stage 0 implant (or dropper) is placed on the exploited device.</p></li><li><p>This file may be complete or need additional pieces of a larger implant, and sends a DNS query to a domain previously unknown to threat research as being associated with C2 for an attack campaign.</p></li><li><p>The response to the query to the C2 server encodes information indicating where the implant can download additional components of the implant.</p></li><li><p>The implant uses DNS tunneling to a different domain, also unknown to threat research as being malicious, to download additional components of the implant.</p></li><li><p>The fully constructed implant performs any number of tasks assigned by another C2 server. These include exfiltrating local files, moving laterally in the network, encrypting all the files on the local machine, or even using the local CPU for the purpose of mining cryptocurrency.</p></li></ul><p>Cloudflare Gateway goes beyond simply detecting and blocking queries to domains previously known to be associated with C2, DNS tunneling, or that appear to be generated by a Domain Generation Algorithm (DGA). Gateway uses heuristics from threat research to identify queries that appear to be generated by a DGA for the purposes of an attack outlined above, detects these previously unknown threats from an organization’s log data, and proactively blocks them before a security admin needs to manually intervene.</p><p>Threat research is continually evolving. Cloudflare Gateway takes the burden of keeping pace with security threats off IT admins by delivering <a href="/solarwinds-orion-compromise-trend-data/">insights derived from Cloudflare’s network</a> to protect organizations of any size anywhere they are.</p>
    <div>
      <h3>What’s Next</h3>
      <a href="#whats-next">
        
      </a>
    </div>
    <p>Our goal is to provide sophisticated, but easy to implement, security capabilities to organizations regardless of size so they can get back to what matters to their business. We’re excited to continue to expand Gateway’s capabilities to protect users and their data. DNS tunneling and DGA detection is included in Gateway DNS filtering at no cost for <a href="https://www.cloudflare.com/teams-pricing/">teams up to 50 users</a>. In-line detection of malware at Cloudflare’s edge will be included with Teams Standard and Teams Enterprise plans.</p><p>Stay tuned for filtering at the network level and integration with GRE tunnels — we’re just getting started. Follow <a href="https://www.cloudflare.com/teams/">this link</a> to sign up today.</p> ]]></content:encoded>
            <category><![CDATA[Cloudflare Zero Trust]]></category>
            <category><![CDATA[Cloudflare Gateway]]></category>
            <category><![CDATA[Security Week]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <guid isPermaLink="false">6kIGxhqH4GgYl0tnlwXtML</guid>
            <dc:creator>Malavika Balachandran Tadeusz</dc:creator>
            <dc:creator>Pete Zimmerman</dc:creator>
        </item>
        <item>
            <title><![CDATA[Control web applications with two-clicks in Cloudflare Gateway]]></title>
            <link>https://blog.cloudflare.com/gateway-app-policies/</link>
            <pubDate>Tue, 09 Mar 2021 12:00:00 GMT</pubDate>
            <description><![CDATA[ Announcing Application policies in Cloudflare Gateway. With Gateway, users instead connect to one of Cloudflare’s data centers in 200 cities around the world where our network can apply consistent security policies for all of their Internet traffic. ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Nearly a year ago, we announced <a href="https://teams.cloudflare.com/">Cloudflare for Teams</a>, Cloudflare’s platform for securing users, devices, and data. With Cloudflare for Teams, our global network becomes your team’s network, replacing on-premise appliances and security subscriptions with a single solution delivered closer to your users — wherever they work. Cloudflare for Teams centers around two core products: Cloudflare Access and Cloudflare Gateway.</p><p>Cloudflare Gateway protects employees from security threats on the Internet and enforces appropriate use policies. We built Gateway to help customers replace the pain of backhauling user traffic through centralized firewalls. With Gateway, users instead connect to one of Cloudflare’s data centers in 200 cities around the world where our network can apply consistent security policies for all of their Internet traffic.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4buYtp6iTiEE9aDETwjhS9/e6e1f4e203088922f206825825d0b531/image4-6.png" />
            
            </figure><p>In March 2020, we launched Gateway’s first feature, a <a href="/protect-your-team-with-cloudflare-gateway/">secure DNS filtering solution</a>. With Gateway’s DNS filtering, administrators can click a single button to block known threats, like sources of malware or phishing sites. Policies can also be used to block specific risky categories, like gambling or social media. When users request a filtered site, Gateway stops the DNS query from resolving and prevents the device from connecting to a malicious destination or hostname with blocked material.</p><p>More recently, we expanded Gateway’s security filtering with a <a href="/gateway-swg/">cloud L7 firewall</a>. The L7 firewall enables admins to apply security and content policies to HTTP traffic. For example, teams can stop files from being uploaded to certain applications or to build rules by URL.</p>
    <div>
      <h3>The mundane task of managing firewall settings for cloud apps</h3>
      <a href="#the-mundane-task-of-managing-firewall-settings-for-cloud-apps">
        
      </a>
    </div>
    <p>Building those rules for a single hostname or URL takes just a few clicks, but applying these policies to entire “applications” can be tedious. We often think of popular applications, like Microsoft Office 365, as a single entity. But behind the scenes, those services rely on hundreds of hostnames and IP addresses that collectively enable the application. If your team wants to build a rule to always allow file uploads to Office 365, you would have to find and input every single destination in their changing list.</p><p>For example, <i>Salesforce</i> is more than just salesforce.com. As of today, Salesforce uses 11 unique apex domains (e.g., forceusercontent.com, or sfdcstatic.com), and this list continues to grow.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7ktvj0DnhKuVOzvcKSGUtU/a57563a7f29470114bf3ecee0ce07b87/image1-9.png" />
            
            </figure><p>If an IT administrator wants to ensure that Salesforce functions properly on their network, they will need to make sure that all of Salesforce’s domains are in their allowlist. And, they’ll need to make sure that they update this list whenever Salesforce adds a new network endpoint.</p><p>Maintaining a firewall policy for just one application can create enough of a headache. Most organizations need to keep track of hundreds of cloud applications that they want to manage on their network. These allow lists might consist of thousands of hostnames and require hours of time spent on tedious review to make sure that they are up-to-date and comprehensive.</p><p>Adding to this complexity is the constantly evolving landscape of cloud applications. An IT administrator might need to limit access to all unapproved file sharing applications on company devices for compliance requirements. To achieve this, they will need to keep track of all file sharing services and all the hostnames associated with each file sharing service.</p>
    <div>
      <h3>Gateway policies with Applications and App Types</h3>
      <a href="#gateway-policies-with-applications-and-app-types">
        
      </a>
    </div>
    <p>We want to reduce the burden on IT administrators and streamline the way organizations manage their firewall policies for cloud applications. Starting today, you can skip that chore with Cloudflare Gateway.</p><p>Cloudflare does the work of researching and grouping these applications for you. Your team can use those collections to build single Gateway HTTP rules by both <b>application</b> (e.g., Salesforce, Microsoft Office 365) and <b>app type</b> (e.g., File Sharing, Social Media).</p><p>Applications consist of a collection of hostnames based on the cloud application they belong to. App Types consist of a collection of applications.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3D9cKnl4wiGGqREClAnlyo/00fa599e14be22cab975187f4980885d/image5-5.png" />
            
            </figure><p>To create a policy using applications or app types, first navigate to the “Policies” tab of the Gateway section of the Teams dashboard. Then select the “HTTP” tab, and click the blue “Add a rule” button on the right hand side to navigate to the rule builder.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/0Mn0lf37Q33lbRa9QfTYm/ed0af19de8255406115b7a75e86bc3cb/image6-3.png" />
            
            </figure><p>For example, let’s create a rule to block all Collaboration &amp; Online Meeting tools except for Slack. In the “Selector” drop down menu, select the “Application” option, and in the “Operator” drop down menu just next to it, select the “in” option. In the “Value” field, start typing “Collaboration &amp; Online Meetings” and you’ll see the rest of the app type auto-populate.</p><p>Once you click “Collaboration &amp; Online Meetings”, the full set of apps will populate in the value field. To remove Slack, press the “x” on the right hand side of value “Slack.”</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/anHuMCkZRKqp3NYP0Ekhp/ce0deb426e30e98e46524000d27c62ad/image3-7.png" />
            
            </figure><p>Lastly, navigate to the “Action” drop down at the bottom of the rule builder. Here, select “Block.” Don’t forget to save your rule by clicking the blue “Save” button on the top right hand side of the screen.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2qxBHdzUcoSiCeN1hixTE9/520122e3236dc7ed69d72c0c971a846c/image7-1.png" />
            
            </figure><p>Now you’ve created your first Application rule! With one rule, you saved yourself having to bulk upload a list of several hundred hostnames to achieve the same result. You also won’t need to keep an eye on updates to network endpoints for those 20+ apps either — we’ll take care of intelligently updating that list for you.</p>
    <div>
      <h3>What’s Next</h3>
      <a href="#whats-next">
        
      </a>
    </div>
    <p>Today, we support 223 applications across 17 app types. To view the full list of supported applications and their associated app types, check out the Gateway documentation. We’ll be making continuous updates to this list to support additional applications and app types, as well as provide additional controls and visibility into Shadow IT on your network.</p><p>Applications and app types are available in the Gateway rule builder today for all customers using the L7 firewall. The L7 firewall is available in Gateway standalone, Teams Standard, and Teams Enterprise plans. If you aren’t using Gateway yet, you can get started by <a href="https://dash.cloudflare.com/sign-up/teams">signing up for a Gateway account</a> and following the <a href="https://developers.cloudflare.com/gateway/getting-started">onboarding directions</a>.</p> ]]></content:encoded>
            <category><![CDATA[Cloudflare Zero Trust]]></category>
            <category><![CDATA[Cloudflare Gateway]]></category>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[Security]]></category>
            <guid isPermaLink="false">ANJyl8Drrz3GdX3Xz8Cym</guid>
            <dc:creator>Malavika Balachandran Tadeusz</dc:creator>
        </item>
        <item>
            <title><![CDATA[Trend data on the SolarWinds Orion compromise]]></title>
            <link>https://blog.cloudflare.com/solarwinds-orion-compromise-trend-data/</link>
            <pubDate>Wed, 16 Dec 2020 17:00:41 GMT</pubDate>
            <description><![CDATA[ Analyzing SUNBURST malware activity seen on Cloudflare’s public DNS resolver. ]]></description>
            <content:encoded><![CDATA[ <p></p><p>On Sunday, December 13, <a href="https://www.fireeye.com/blog/threat-research/2020/12/evasive-attacker-leverages-solarwinds-supply-chain-compromises-with-sunburst-backdoor.html">FireEye released a report</a> on a sophisticated supply chain attack leveraging SolarWinds' Orion IT monitoring software. The malware was distributed as part of regular updates to Orion and had a valid digital signature.</p><p>One of the notable features of the malware is the way it hides its network traffic using a multi-staged approach. First, the malware determines its command and control (C2) server using a domain generation algorithm (DGA) to construct and resolve a subdomain of avsvmcloud[.]com.</p><p>These algorithmically generated strings are added as a subdomain of one of the following <a href="https://www.cloudflare.com/learning/dns/glossary/what-is-a-domain-name/">domain names</a> to create a new fully-qualified domain name to resolve:</p><p><code>.appsync-api[.]eu-west-1[.]avsvmcloud[.]com.appsync-api[.]us-west-2[.]avsvmcloud[.]com.appsync-api[.]us-east-1[.]avsvmcloud[.]com.appsync-api[.]us-east-2[.]avsvmcloud[.]com</code></p><p>An example of such a domain name might look like: <code>hig4gcdkgjkrt24v6isue7ax09nksd[.]appsync-api[.]eu-west-1[.]avsvmcloud[.]com</code></p><p>The <a href="https://www.cloudflare.com/learning/dns/what-is-dns/">DNS query response</a> to a subdomain of one of the above will return a CNAME record that points to another C2 domain, which is used for <a href="https://www.cloudflare.com/learning/security/what-is-data-exfiltration/">data exfiltration</a>. The following subdomains were identified as the C2 domains used for data exfiltration:</p><p><code>freescanonline[.]comdeftsecurity[.]comthedoccloud[.]comwebsitetheme[.]comhighdatabase[.]comincomeupdate[.]comdatabasegalore[.]companhardware[.]comzupertech[.]comvirtualdataserver[.]comdigitalcollege[.]org</code></p>
    <div>
      <h3>Malware activity seen on Cloudflare’s public DNS resolver 1.1.1.1</h3>
      <a href="#malware-activity-seen-on-cloudflares-public-dns-resolver-1-1-1-1">
        
      </a>
    </div>
    <p>Using the published details about the network observables of the malware, we analyzed DNS query traffic to the identified malicious hostnames. Because 1.1.1.1 has a strong, audited privacy policy, we are unable to identify the source IP of users connecting to the malicious hostname — we can only see aggregated trends.</p><p>We first noticed a spike in DNS traffic through Cloudflare’s 1.1.1.1 resolver to avsvmcloud[.]com starting in April 2020:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2ZWBXX6eLKIO4Of4Kg39Uv/d67581bab72556724dc9124bfcad9765/image2-38.png" />
            
            </figure><p>Reviewing the subdomain data, a specific pattern of DGA domains emerged as early as April. These subdomains followed a format, (e.g. {dga-string}[.]appsync-api[.]{region}[.]avsvmcloud[.]com). As time went on, the attackers added more unique subdomains. The graph below depicts the unique newly observed subdomains of avsvmcloud[.]com on a weekly basis.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1D3doHZQGkyshB57sqmSco/85272385a5a21be1cf94d22c046e2c79/image1-60.png" />
            
            </figure><p>As illustrated in the graphs, we noticed a major rise in activity over the summer, with total subdomains observed reaching steady state in September.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7AABBhH8eD4LqWDdLRFW1S/9c60e34e2eba12abc3171cc5d600b97e/image4-23.png" />
            
            </figure><p>While the growth of unique names slowed down starting in October, the geographic distribution continued to change during the entire course of the attack. During the first few weeks of the attack, queries originated almost entirely from clients in North America and Europe. In May, the source of queries began to spread across the globe. By July, the queries began to cluster again, this time in South America, before returning to originate primarily from North America in November.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4j9ld3C9PcQdXv1Whn9Ir2/22021d3d41a25fedeb497a89fa2412bb/image3.gif" />
            
            </figure>
    <div>
      <h3>Protecting our customers from malicious activity</h3>
      <a href="#protecting-our-customers-from-malicious-activity">
        
      </a>
    </div>
    <p>Cloudflare’s 1.1.1.1 resolver has strict privacy protections, so we can only see trends of this attack. We cannot notify users that they might be compromised, because we intentionally do not know who those users are. For customers of Cloudflare Gateway, however, we can help them block these types of threats, and identify cases where they might be compromised.</p><p>Cloudflare Gateway consists of features that secure how users and devices connect to the Internet. Gateway’s DNS filtering feature is built on the same technology that powers 1.1.1.1, and adds security filtering and logging.</p><p>Following the FireEye report, Cloudflare blocked access to the C2 domains used in this attack for customers using the “Malware” category in Gateway, as well as for customers using 1.1.1.1 for Families (1.1.1.2 &amp; 1.1.1.3).</p><p>Our response team is working with customers to search logs for queries related to the malicious domains. Gateway customers can also download logs of their DNS query traffic and investigate on their own.</p> ]]></content:encoded>
            <category><![CDATA[Cloudflare Zero Trust]]></category>
            <category><![CDATA[Cloudflare Gateway]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Trends]]></category>
            <category><![CDATA[Threat Intelligence]]></category>
            <guid isPermaLink="false">30Os7AAonyy1SG1pggD5FD</guid>
            <dc:creator>Malavika Balachandran Tadeusz</dc:creator>
            <dc:creator>Jesse Kipp</dc:creator>
        </item>
        <item>
            <title><![CDATA[Introducing Cloudflare One Intel]]></title>
            <link>https://blog.cloudflare.com/cloudflare-one-intel/</link>
            <pubDate>Wed, 14 Oct 2020 16:59:00 GMT</pubDate>
            <description><![CDATA[ Announcing the next phase of network and threat intelligence at Cloudflare. ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Earlier this week, we announced <a href="/introducing-cloudflare-one/">Cloudflare One</a>, a single platform for networking and security management. Cloudflare One extends the speed, reliability, and security we’ve brought to Internet properties and applications over the last decade to make the Internet the new enterprise WAN.</p><p>Underpinning Cloudflare One is Cloudflare’s global network - today, our network spans more than 200 cities worldwide and is within milliseconds of nearly everyone connected to the Internet. Our network handles, on average, 18 million HTTP requests and 6 million DNS requests <i>per second</i>. With 1 billion unique IP addresses connecting to the Cloudflare network each day, we have one of the broadest views on Internet activity worldwide.</p><p>We see a large diversity of Internet traffic across our entire product suite. Every day, we block 72 billion cyberthreats. This visibility provides us with a unique position to <a href="https://www.cloudflare.com/products/zero-trust/threat-defense/">understand and mitigate Internet threats</a>, and enables us to see new threats and malware before anyone else.</p><p>At the beginning of this month, as part of our 10th Birthday Week, we launched <a href="https://radar.cloudflare.com/">Cloudflare Radar</a>, which shares high-level trends with the general public based on our network’s aggregate data. The same data that powers that view of the Internet also gives us the ability to create new insights to keep your team safer.</p><p>Today, we are excited to announce the next phase of network and threat intelligence at Cloudflare: the launch of Cloudflare One Intel. Cloudflare One Intel streamlines network and <a href="https://www.cloudflare.com/soc-as-a-service/">security operations</a> by converting the data we can gather on our network into actionable insights.</p>
    <div>
      <h3>The challenge with the traditional security operations</h3>
      <a href="#the-challenge-with-the-traditional-security-operations">
        
      </a>
    </div>
    <p>Most enterprises use a large array of point solutions to ensure that the corporate network remains fast, available and secure. Security teams typically aggregate logs from these point solutions into their <a href="https://www.cloudflare.com/learning/security/what-is-siem/">SIEM</a> and create custom alerts for incident detection.</p><p>Once an incident has been detected, security teams will quickly respond with remediating actions to prevent data loss, such as removing a compromised device’s access controls or adding a malicious hostname or URL to a block list.</p><p>Along with incident remediation, security teams will conduct an investigation of the incident to uncover more details about the attacker. Pivoting across historical DNS records, SSL certificate fingerprints, malware samples, and other indicators of compromise, security researchers will try to uncover more details about an attacker. Linked indicators then get fed back onto block lists in point solutions to prevent subsequent attacks.</p><p>However, there are several challenges with traditional incident detection and response. Security operations teams are often overwhelmed by the plethora of logs and alerts. With threat intelligence, SIEMs, and control planes all in different platforms, incident detection, remediation and forensics can be slow, arduous, and expensive.</p>
    <div>
      <h3>Improving Incident Response with Cloudflare One</h3>
      <a href="#improving-incident-response-with-cloudflare-one">
        
      </a>
    </div>
    <p>We want to make network and security operations as streamlined as possible. Cloudflare One Intel helps network and security teams detect and respond to incidents more efficiently. That means bringing together insights from your network activity, global Internet intelligence, and automated remediation in a single platform.</p><p>As part of the mission to help security teams detect and block emerging security threats more efficiently we are releasing two features within Cloudflare Gateway: DNS tunneling detection and domain insights.</p>
    <div>
      <h3>What is DNS Tunneling?</h3>
      <a href="#what-is-dns-tunneling">
        
      </a>
    </div>
    <p>DNS tunneling is the misuse of the Domain Name System (DNS) protocol to encode another protocol’s data into a series of DNS queries and response messages. DNS tunneling is often used to circumvent a corporate firewall. For example, DNS tunneling might be used to visit a website that is blocked on the corporate firewall, distribute malware from a command &amp; control server, or exfiltrate sensitive data.</p><p>DNS tunneling isn’t only used for malicious activities. One of the most common uses of DNS tunneling is by antivirus software, which will often use DNS tunneling to look up file signatures.</p>
    <div>
      <h3>Blocking DNS tunneling using Cloudflare Gateway</h3>
      <a href="#blocking-dns-tunneling-using-cloudflare-gateway">
        
      </a>
    </div>
    <p>Starting today, customers using Cloudflare Gateway can block hostnames associated with DNS tunneling using the “DNS Tunneling” filter in Gateway’s DNS filtering policies. This feature is available to all Gateway users at no additional cost.</p><p>You can begin using the filter by navigating to the Policies section of the Gateway product and selecting the “Security Threats” tab. Once you check the “DNS Tunneling” box, Gateway will automatically block any requests made by your organization’s users to domains on this list. Should you want to manually override any specific domains, you can use the “Domain Override” feature to remove the block policy on a specific domain.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6GD34cT2tPcFp6Q5UfTBfi/156802414847c6b5f4f45ccea166f344/Screenshot-2020-10-14-at-10.33.20.png" />
            
            </figure><p>We previously included known malicious DNS tunnels in our “Anonymizer” category within Gateway’s security threat categories. We are now pulling that into its own category so that customers can have more granular visibility into threats on their network. Further, we are expanding the filter beyond known malicious DNS tunnels to include newly emerging threats, so that customers can block these threats as soon as we see them on our network.</p>
    <div>
      <h3>How we use machine learning to detect DNS tunneling</h3>
      <a href="#how-we-use-machine-learning-to-detect-dns-tunneling">
        
      </a>
    </div>
    <p>Using <a href="https://www.cloudflare.com/learning/ai/what-is-machine-learning/">machine learning</a>, Cloudflare detects anomalous DNS request patterns and flags these requests as suspected DNS tunneling. Our model analyzes requests and detects anomalous behavior at a frequency of every five minutes.</p><p>Once a set of requests is flagged, we add the associated hostname to our “DNS Tunneling” category. We do not add hostnames of commonly allowed DNS tunnels to this list, such as those used by antivirus software.</p><p>Our model not only blocks hostnames associated with DNS tunneling seen on your network, but across the entire Cloudflare network. Processing over 500 billion DNS queries each day, we have unique insight into global DNS traffic patterns.</p>
    <div>
      <h3>Adding transparency to security</h3>
      <a href="#adding-transparency-to-security">
        
      </a>
    </div>
    <p>Cloudflare’s unique insight into global Internet traffic is what powers the intelligence behind Cloudflare One. DNS tunneling detection is one example of how we use aggregated data from our network to improve Internet security for everyone. But, until now, that has been opaque to users.</p><p>Security teams investigating the threats that impact their organization need more transparency. Cloudflare One Intel consolidates the information we have about the potentially harmful sites and properties that can target your organization.</p><p>Starting today, with a single click, administrators reviewing logs in Cloudflare Gateway can get a comprehensive breakdown of any site being allowed or blocked.</p><p>In this expanded view, you can now click the “View Domain Insights” button, which will take you to the Cloudflare Radar Domain Insights page for the requested hostname. This feature is available to all Gateway users at no additional cost.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/AlHYR5z0LZVTjTWWMR367/dae9b621829471c26adcae77e71743c7/image1-17.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/p8d5DxN92Ri0134VyvtLc/800ca70b2b8adff4486b55ae5c3fe21e/image4-11.png" />
            
            </figure>
    <div>
      <h3>What’s Next</h3>
      <a href="#whats-next">
        
      </a>
    </div>
    <p>These new features are just the beginning of Cloudflare One Intel. Over the coming weeks and months, we’ll be rolling out more features across the Cloudflare One platform that will make our Internet intelligence more accessible and actionable. Stay tuned for premium features available in Cloudflare Radar for Cloudflare Gateway customers.</p>
    <div>
      <h3>Get started now</h3>
      <a href="#get-started-now">
        
      </a>
    </div>
    <p>Cloudflare Radar is available to everyone for free - you can check it out <a href="https://radar.cloudflare.com/">here</a> and start exploring our Internet intelligence.</p><p>To protect your team from threats on the Internet that utilize DNS tunnelling, <a href="https://dash.cloudflare.com/sign-up/teams">sign up for a Cloudflare Gateway account</a> and use the Security filter setting to block DNS tunnelling attempts. DNS-based security and content filtering is available for free across every Gateway plan.</p> ]]></content:encoded>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[Zero Trust Week]]></category>
            <category><![CDATA[Cloudflare Zero Trust]]></category>
            <category><![CDATA[Cloudflare Gateway]]></category>
            <category><![CDATA[DNS Filtering]]></category>
            <category><![CDATA[Threat Intelligence]]></category>
            <category><![CDATA[Security]]></category>
            <guid isPermaLink="false">5Xu6KvH3DB4fzcej6vrgus</guid>
            <dc:creator>Malavika Balachandran Tadeusz</dc:creator>
        </item>
    </channel>
</rss>