
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[ The Cloudflare Blog ]]></title>
        <description><![CDATA[ Get the latest news on how products at Cloudflare are built, technologies used, and join the teams helping to build a better Internet. ]]></description>
        <link>https://blog.cloudflare.com</link>
        <atom:link href="https://blog.cloudflare.com/" rel="self" type="application/rss+xml"/>
        <language>en-us</language>
        <image>
            <url>https://blog.cloudflare.com/favicon.png</url>
            <title>The Cloudflare Blog</title>
            <link>https://blog.cloudflare.com</link>
        </image>
        <lastBuildDate>Fri, 03 Apr 2026 21:53:03 GMT</lastBuildDate>
        <item>
            <title><![CDATA[How Cloudy translates complex security into human action]]></title>
            <link>https://blog.cloudflare.com/cloudy-upgrades-for-cloudflare-one/</link>
            <pubDate>Tue, 03 Mar 2026 06:00:00 GMT</pubDate>
            <description><![CDATA[ Cloudy is our LLM-powered explanation layer built directly into Cloudflare One. Its explanations, now part of Phishnet and API CASB, can improve user decisions and SOC efficiency. ]]></description>
            <content:encoded><![CDATA[ <p>Today’s security ecosystem generates a staggering amount of complex telemetry. For instance, processing a single email requires analyzing sender reputation, authentication results, link behavior, infrastructure metadata, and countless other attributes. Simultaneously, <a href="https://www.cloudflare.com/sase/products/casb/"><u>Cloud access security broker (CASB)</u></a> engines continuously scan SaaS environments for signals that detect misconfigurations, risky access, and exposed data.</p><p>But while detections have become more sophisticated, explanations have not always kept pace.</p><p>Security and IT teams are often aware when something is flagged, but they do not always know, at a glance, why. End users are asked to make real-time decisions about emails that may impact the entire organization, yet they are rarely given clear, contextual guidance in the moment that matters.</p><p><a href="https://developers.cloudflare.com/fundamentals/reference/cloudy-ai-agent/"><u>Cloudy</u></a> changes that.</p><p>Cloudy is our LLM-powered explanation layer, built directly into Cloudflare One. It translates complex machine learning outputs into precise, human-readable guidance for security teams and end users alike. Instead of exposing raw technical signals, Cloudy surfaces the reasoning behind a detection in a way that drives informed action.</p><p>For <a href="https://www.cloudflare.com/en-au/sase/products/email-security/"><u>Cloudflare Email Security</u></a>, this means helping users understand why a message was flagged before they escalate it to the security operations center, or SOC. For Cloudflare CASB, it means helping administrators quickly understand the risk and remediation path for SaaS findings without having to manually assess low-level signals.</p><p>This post outlines how we are extending Cloudy across <a href="https://developers.cloudflare.com/cloudflare-one/email-security/settings/phish-submissions/"><u>Phishnet</u></a> and API CASB to improve decision making, reduce unnecessary noise, and turn complex security signals into clear, actionable insight.</p>
    <div>
      <h2>Cloudy for Email Security users</h2>
      <a href="#cloudy-for-email-security-users">
        
      </a>
    </div>
    <p>When an email is analyzed by <a href="https://www.cloudflare.com/sase/products/email-security/"><u>Cloudflare Email Security</u></a>, it is not evaluated by a single signal or model. Instead, a wide range of machine learning models analyze different parts of the message, from sender reputation and message structure to content, links, and behavioral patterns. This model set continues to grow as our machine learning team regularly trains and deploys new detections to keep pace with evolving threats.</p><p>Based on this analysis, messages are labeled with outcomes such as Malicious, Suspicious, Spam, Bulk, or Spoof. While these detections have been effective, we consistently heard feedback from customers that it was not always clear why a message was flagged. The decision was correct, they told us —  but the reasoning behind it was often opaque to both end users and security teams.</p><p>To address this, we introduced the first version of <a href="https://blog.cloudflare.com/cloudy-driven-email-security-summaries/"><b><u>Cloudy</u></b><u>: LLM-powered summaries for detections</u></a>. These summaries translate what our machine learning models are seeing into human readable explanations. Initially, these summaries were available in the Cloudflare dashboard to help SOC teams during investigations. Over the past few months, customer feedback has confirmed that these explanations significantly improve understanding in our detections.</p><p>As we continued speaking with customers, another challenge surfaced. Our <b>Phishnet</b> tool allows users to submit messages to the SOC when they believe an email may be suspicious. While this empowers employees to participate in security, many SOC teams told us their queues were being flooded with submissions that turned out to be clean messages.</p><p>The result was unnecessary backlog and slower response times for emails that actually required investigation.</p><p>At the same time, customers told us that traditional security awareness training was not always enough. Users still struggled to evaluate emails in the moment, when it mattered most. They wanted more contextual guidance directly within the workflow where decisions are made.</p><p>This upgrade is designed to address both of these problems. By bringing clearer explanations and contextual education directly into Phishnet, we aim to help users make better decisions while reducing noise for SOC teams, without sacrificing security.</p>
    <div>
      <h3>The problem: Some users flag too many emails, while some aren’t cautious enough</h3>
      <a href="#the-problem-some-users-flag-too-many-emails-while-some-arent-cautious-enough">
        
      </a>
    </div>
    <p>As organizations and attack techniques have evolved, so has the role of the end user. Modern email threats increasingly rely on social engineering, subtle impersonation, and psychological pressure which places users directly in the decision path.</p><p>In response, users are being asked to act as an additional layer of defense. However, traditional security awareness tools often fall short. Training is typically delivered through periodic sessions or simulated phishing campaigns, disconnected from real messages and real decisions. When users encounter an unfamiliar email, they are left without enough context to confidently assess risk.</p><p>This gap commonly leads to one of two outcomes. Some users submit nearly every questionable message to the SOC, creating excessive noise and slowing down investigations. Others interact with messages they should not, simply because nothing in the moment signals clear risk.</p><p><b>By embedding Cloudy directly into Phishnet, we close this gap. </b></p><p>Users receive immediate, contextual explanations that help them understand what Cloudflare is seeing and why a message may be risky. This enables users to make informed decisions at the point of interaction, reduces unnecessary escalations to the SOC, and allows security teams to focus on the messages that truly require attention.</p><p>Over time, this approach shifts users from being a source of noise to becoming an effective part of the detection and response workflow. The result: stronger email security, without adding friction or burden to security teams.</p>
    <div>
      <h3>Phishnet for Microsoft gets a Cloudy upgrade</h3>
      <a href="#phishnet-for-microsoft-gets-a-cloudy-upgrade">
        
      </a>
    </div>
    <p>In the next month, we will be upgrading our Phishnet reporting button to extend the Cloudy summaries.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6dO9TV4MfE2R0YZ035QQ7/3693156d65a4c8aca4b2b9d57e77ce87/image1.png" />
          </figure><p><sub><i>The new Phishnet screens will show Cloudy summaries.</i></sub></p><p>With this upgrade, end users receive a simplified, user-friendly version of Cloudy summaries at the moment they report a message. These summaries are generated in real time using Cloudflare Workers AI and run directly on Cloudflare’s global Workers platform when a user interacts with a message in Phishnet.</p><p>When a user clicks the Phishnet reporting button, the request triggers a Workers-based workflow that aggregates structured outputs from multiple detection models associated with that message. These model outputs include signals such as sender reputation, domain and infrastructure characteristics, authentication results, link and content analysis, and behavioral indicators collected during message processing.</p><p>The aggregated signals are then passed to Workers AI, where a series of purpose-built prompts generate a natural language explanation. Each prompt is designed to transform low-level detection outputs into a concise and human-readable summary. This process focuses on explanation rather than classification and does not alter the original disposition of the message.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5PSAZclxFkdcvSivalmoCn/b355e9e6cf667e6e8e9587f6946db5c6/image6.png" />
          </figure><p><sub><i>How Cloudy transforms detections into clear explanations.</i></sub></p><p>For this experience, we intentionally redesigned the summaries compared to those shown to administrators in the Cloudflare dashboard. During testing, we found that admin-focused summaries often relied on technical concepts that were difficult for non-technical users to interpret. Terms such as ASNs, IP reputation, or authentication failures required translation. </p><p>To ensure end users can understand the summaries, Phishnet emphasizes plain-language explanations while preserving the meaning of the underlying detections.</p><table><tr><td><p><b>Signal</b></p></td><td><p><b>What it means</b></p></td><td><p><b>Cloudy translation for end users</b></p></td></tr><tr><td><p>SPF Fail</p></td><td><p>Sender explicitly not authorized by SPF</p></td><td><p>This email failed a sender verification check.</p></td></tr><tr><td><p>DKIM Fail</p></td><td><p>Message signature does not validate</p></td><td><p>The message integrity check failed, which can be a sign of tampering.</p></td></tr><tr><td><p>DMARC Fail</p></td><td><p>DMARC policy check failed</p></td><td><p>The sender’s domain could not confirm this email is legitimate.</p></td></tr><tr><td><p>Reply to Mismatch</p></td><td><p>Reply To differs from From</p></td><td><p>Replies may go to a different address than the sender shown.</p></td></tr><tr><td><p>Domain Age</p></td><td><p>Domain recently registered</p></td><td><p>The sender domain is newly created, which is common in phishing.</p></td></tr><tr><td><p>URL Low Reputation</p></td><td><p>Destination URL has poor reputation</p></td><td><p>The link destination has signals associated with risk.</p></td></tr></table><p>Because this workflow runs on the Cloudflare Workers platform, summaries are generated with low latency and at global scale — so users receive immediate feedback at the moment of interaction. This real-time context allows users to better understand why an email may be risky or why it appears safe before deciding whether to escalate it to the SOC.</p><p>We are currently beta testing this experience with Microsoft customers to ensure the summaries are accurate and reliable. <b>Cloudy summaries are not trained on customer data.</b> We are also applying additional validation to ensure the generated explanations do not hallucinate. Accuracy is critical at this stage as incorrect guidance could introduce real security risk.</p><p>Following the beta period, we plan to expand access to all Microsoft users. We will also bring similar upgrades to the Phishnet sidebar for Google Workspace users later in 2026.</p>
    <div>
      <h2>Your CASB findings, explained with Cloudy</h2>
      <a href="#your-casb-findings-explained-with-cloudy">
        
      </a>
    </div>
    <p>But helping end users better understand what makes an email risky is only part of the story. We are also applying Cloudy to the administrative side of security operations, where clarity and speed matter just as much. Beyond Phishnet, Cloudy now translates complex CASB findings into structured explanations that help security and IT teams quickly understand risk, prioritize remediation, and take confident action across their SaaS environments.</p>
    <div>
      <h3>API CASB in the wild</h3>
      <a href="#api-casb-in-the-wild">
        
      </a>
    </div>
    <p>Inside <a href="https://www.cloudflare.com/sase/"><u>Cloudflare One</u></a>, our SASE platform, CASB connects to the SaaS and cloud tools your teams already use. By talking to providers over API, CASB gives security and IT teams:</p><ul><li><p>A consolidated view of misconfigurations, overshared files, and risky access patterns across apps like Microsoft 365, Google Workspace, Slack, Salesforce, Box, GitHub, Jira, and Confluence (<a href="https://developers.cloudflare.com/cloudflare-one/applications/scan-apps/casb-integrations/"><u>CASB Integrations</u></a>).</p></li><li><p>Continuous scanning for new issues as users collaborate, share, and adopt new tools.</p></li><li><p>Findings that are organized, searchable, and exportable for triage and reporting.</p></li></ul>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1CH5fnjMQL3oK5PdF9F1bT/d34abcaa64d536cd8706a407f20ba2a9/image2.png" />
          </figure><p><sub><i>A typical CASB Findings page showing detections for a Microsoft 365 finding.</i></sub></p>
    <div>
      <h3>Making SaaS security straightforward</h3>
      <a href="#making-saas-security-straightforward">
        
      </a>
    </div>
    <p>Until now, understanding what exactly triggered a CASB Finding — the detections that CASB makes across connected SaaS integrations — has been a black box. While the information was there to put together an explanation of why that file, that user, that configuration was triggering a CASB Finding Type, it wasn’t exactly obvious the reason why it was ultimately detected by our system.</p><p>With the introduction of Cloudy summaries in CASB, users receive a short description of the detection rationale with the specific details of the match listed out for easy comprehension.</p><p>Unlike a simple text summary, Cloudy for CASB provides a structured breakdown designed for immediate remediation. As seen in our beta testing across different providers, from Microsoft 365 to Dropbox, the model consistently parses findings into two distinct sections:</p><ul><li><p>Risk: It identifies exactly why the finding matters. For instance, rather than just noting a 'Suspended User,' Cloudy clarifies that this 'may indicate a compromised account or a user who should no longer have access to company data'.</p></li><li><p>Guidance: It offers immediate next steps. Instead of generic advice, it suggests specific actions, such as verifying if a suspension was intentional or reviewing an application's legitimacy before revoking access.</p></li></ul><p>This structure ensures that analysts can understand the gravity of a finding without needing deep expertise in the specific SaaS application involved.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/BkfPI5VWYYaGzjjHsfyEz/16783ef841292ff66972222afda350e9/image4.png" />
          </figure><p><sub><i>An example Cloudy Summary in a CASB Posture Finding.</i></sub></p><table><tr><td><p><b>Finding Type</b></p></td><td><p><b>Technical Signal</b></p></td><td><p><b>Cloudy Translation (Risk &amp; Guidance)</b></p></td></tr><tr><td><p><b>Identity &amp; Access</b></p></td><td><p>Dropbox:</p><p>Suspended User</p></td><td><p>Risk: A suspended user account may indicate a compromised account or a user who should no longer have access to company data.</p><p></p><p>Guidance: Verify that the suspension is intentional and that the user's access has been properly revoked.</p></td></tr><tr><td><p><b>Shadow IT</b></p></td><td><p>Google Workspace:</p><p>Installed 3rd-party app</p></td><td><p>Risk: This installed application with Google Sign In access may pose a risk of unauthorized access to user data.</p><p></p><p>Guidance: Review the application's legitimacy and necessity, and consider revoking access if it is no longer needed.</p></td></tr><tr><td><p><b>Email Security</b></p></td><td><p>Microsoft 365:</p><p>Domain DMARC record not present</p></td><td><p>Risk: The absence of a DMARC record may leave the domain vulnerable to email spoofing and phishing attacks.</p><p></p><p>Guidance: Configure a DMARC record for the domain to specify how to handle unauthenticated emails.</p></td></tr><tr><td><p><b>Data Loss Prevention</b></p></td><td><p>Microsoft 365:</p><p>File publicly accessible + DLP Match</p></td><td><p>Risk: This file being shared publicly with edit access may allow unauthorized modifications... especially given the potential sensitive content indicated by the DLP Profile match.</p><p></p><p>Guidance: Review the file's content... and consider restricting access if necessary.</p></td></tr></table><p>We know that when it comes to our customers getting to the bottom of identified security issues, time is of the essence. We believe that any amount of unnecessary uncertainty or lack of clarity around what’s going wrong just puts more time between an imperfect state and one that is more secure.</p><p>We built this feature on the same privacy-first foundations as all products at Cloudflare. Cloudy summaries in CASB are generated using Cloudflare Workers AI, ensuring that your data remains within our secure infrastructure during analysis. The models are not trained on your SaaS data, and the summaries are generated ephemerally to aid in triage. This allows your team to leverage the speed of AI without exposing sensitive internal documents or configurations to public models.</p>
    <div>
      <h3>What’s next</h3>
      <a href="#whats-next">
        
      </a>
    </div>
    <p>For Email Security, we will continue to expand how Cloudy supports both administrators and end users. Our focus is on delivering clearer explanations, better in context guidance, and deeper integration into daily workflows.</p><p>For CASB, we’re excited to look for opportunities where Cloudy can make it even easier for CASB administrators to understand what’s going on across their cloud and SaaS apps. Keep an eye out as we look to expand Cloudy coverage to allow administrators to query their findings using natural language, further reducing the time it takes to identify and remediate risks.</p><p>Looking ahead, this includes richer explanations for additional detection types, tighter feedback loops between user actions and detections, and continued improvements to how users and SOC teams collaborate through Phishnet. Our goal is to make Cloudy a core part of how organizations understand, trust, and act on email security decisions.</p><p>We provide all organizations (whether a Cloudflare customer or not) with free access to our <a href="https://developers.cloudflare.com/cloudflare-one/email-security/retro-scan/"><u>Retro Scan</u></a> tool, allowing them to use our predictive AI models to scan existing inbox messages in Microsoft 365. </p><p>Retro Scan will detect and highlight any threats found, enabling organizations to remediate them directly in their email accounts. With these insights, organizations can implement further controls, either using <a href="https://www.cloudflare.com/zero-trust/products/email-security/"><u>Cloudflare Email Security</u></a> or their preferred solution, to prevent similar threats from reaching their inboxes in the future.</p><p>If you are interested in how Cloudflare can help secure your inboxes, sign up for a phishing risk assessment <a href="https://www.cloudflare.com/lp/email-security-self-guided-demo-request/?utm_medium=referral&amp;utm_source=blog&amp;utm_campaign=2025-q3-acq-gbl-modernsec-es-ge-general-ai_week_blog"><u>here</u></a>.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/FcaNb9DmTtKE1VbgLfPtT/5824d6eacb9f4ea5fe09c3dbd0843ba1/image3.png" />
          </figure><p></p> ]]></content:encoded>
            <category><![CDATA[Email Security]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Cloudflare One]]></category>
            <category><![CDATA[CASB]]></category>
            <guid isPermaLink="false">6S9GOOoOPdJX0xziMyNShi</guid>
            <dc:creator>Ayush Kumar</dc:creator>
            <dc:creator>Alex Dunbrack</dc:creator>
        </item>
        <item>
            <title><![CDATA[From reactive to proactive: closing the phishing gap with LLMs]]></title>
            <link>https://blog.cloudflare.com/email-security-phishing-gap-llm/</link>
            <pubDate>Tue, 03 Mar 2026 06:00:00 GMT</pubDate>
            <description><![CDATA[ Email security is a constant arms race. Like WWII engineers reinforcing only the planes that returned, survivorship bias hides real gaps. But LLMs can help us find the invisible weaknesses. ]]></description>
            <content:encoded><![CDATA[ <p><a href="https://www.cloudflare.com/learning/email-security/what-is-email-security/"><u>Email security</u></a> has always been defined by impermanence. It is a perpetual call-and-response arms race, where defenses are only as strong as the last bypass discovered and attackers iterate relentlessly for even marginal gains. Every control we deploy eventually becomes yesterday’s solution.</p><p>What makes this challenge especially difficult is that our biggest weaknesses are, by definition, invisible.</p><p>This problem is best illustrated by a classic example from World War II. Mathematician <a href="https://www.historyofdatascience.com/abraham-wald-a-statistical-hero/"><u>Abraham Wald</u></a> was tasked with helping Allied engineers decide where to reinforce bomber aircraft. Engineers initially focused on the bullet holes visible on planes returning from missions. Wald pointed out the flaw: they were reinforcing the areas where planes could already take damage and survive. The true vulnerabilities were on the planes that never came back.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1NxyKOOVeVCGbOz7hY5AFU/c382fc6186bc98fe63a7de35720f3618/image3.png" />
          </figure><p>Email security faces an identical hurdle: our detection gaps are unseen. By integrating LLMs, we advance email phishing protection and move from reactive to proactive detection improvement.</p><p>The limits of reactive defense</p><p>Traditional email security systems improve primarily through user-reported misses. For example, if we marked a spam message as clean, customers can send us the original EML to our pipelines for our analysts to analyze and update our models. This feedback loop is necessary and valuable, but it is inherently reactive. It depends on someone noticing a failure after the fact and taking the time to report it.</p><p>That means detection improvements are often driven by what attackers already succeeded at, rather than by what they are about to exploit next.</p><p>To close this gap, we need a way to systematically observe the “planes that didn’t make it back.”</p>
    <div>
      <h3>Mapping the threat landscape with LLMs</h3>
      <a href="#mapping-the-threat-landscape-with-llms">
        
      </a>
    </div>
    <p><a href="https://www.cloudflare.com/learning/ai/what-is-large-language-model/"><u>Large Language Models (LLMs)</u></a> hit the mainstream market in late 2022 and early 2023, fundamentally changing how we process unstructured data. At their core, LLMs use deep learning and massive datasets to predict the next token in a sequence, allowing them to understand context and nuance. They are particularly well-suited for email security because they can read natural language and characterize complex concepts (like intent, urgency, and deception) across millions of messages.</p><p>Every day, Cloudflare processes millions of unwanted emails. Historically, it was not feasible to deeply characterize each message beyond coarse classifications. Manually mapping emails to nuanced threat vectors simply did not scale. </p><p>Now, Cloudflare has integrated LLMs into our email security tools to identify threats before they strike. By using the power of LLMs, as we’ll describe below, we can finally see a clear and comprehensive picture of the evolving threat landscape.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/510saHtEz5iJRxg9Qp9zEN/8c59e619c6f6d62e8f6ced7e8f8dd401/image2.png" />
          </figure><p><sup><i>Our LLM-driven categorization shows clear spikes and persistent trends across several distinct categories, including "PrizeNotification" and "SalesOutreach".</i></sup></p><p>These LLM-generated tags provide Cloudflare analysts with high-fidelity signals in near real time. Tasks that previously required hours of manual investigation and complex querying can now be surfaced automatically, with relevant context attached. This directly increases the velocity at which we can build new targeted Machine Learning models or retrain existing ones to address emerging behaviors.</p><p>Because Cloudflare operates at global Internet scale, we can gather these insights earlier than ever before, often before a new technique becomes widely visible through customer-reported misses.</p>
    <div>
      <h3>The Sales Outreach threat</h3>
      <a href="#the-sales-outreach-threat">
        
      </a>
    </div>
    <p>One of the clearest patterns we’ve identified using this new intelligence is the continued persistence of malicious messages structured to look like Sales Outreach-style phishing. These emails are designed to mimic legitimate B2B communication, often presenting opportunities to purchase or receive "special deals" on unique items or services, to lure targets into clicking malicious links or providing credentials.</p><p>Once LLM categorization surfaced Sales Outreach as a dominant vector, we moved from broad visibility to targeted data collection. </p><p>Using LLM-generated tags, we began systematically isolating messages that exhibited Sales Outreach characteristics across our global dataset. This produced a continuously growing, high-precision corpus of real-world examples, including confirmed malicious messages as well as borderline cases that traditional systems struggled to classify. From this corpus, we built a dedicated training pipeline.</p><p>First, we curated training data by grouping messages based on shared linguistic and structural traits identified by the LLMs. These traits included persuasive framing, manufactured urgency, transactional language, and subtle forms of social proof.</p><p>Next, we focused feature extraction on sentiment and intent rather than static indicators. The model learns how requests are phrased, how credibility is established, and how calls to action are embedded within otherwise normal business conversations.</p><p>Finally, we trained a purpose-built sentiment analysis model optimized specifically for Sales Outreach behavior. This avoided overloading a general phishing classifier and allowed us to tune precision and recall for this threat class.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1uxwkalxVBOczIXJ1VebIs/ce1197d61c83f9756c3951d4dee77572/image4.png" />
          </figure>
    <div>
      <h4>Turning language into enforcement</h4>
      <a href="#turning-language-into-enforcement">
        
      </a>
    </div>
    <p>The output of this model is a risk score that reflects how closely a message aligns with known Sales Outreach attack patterns. That score is evaluated alongside existing signals such as sender reputation, link behavior, and historical context to determine whether a message should be blocked, quarantined, or allowed.</p><p>This process is continuous. As attackers adapt their language, newly observed messages are fed back into the pipeline and used to refine the model without waiting for large volumes of user-reported misses. LLMs act as the discovery layer by surfacing new linguistic variants, while the specialized model performs fast and scalable enforcement.</p><p>This is what an all-out offensive looks like in practice. It is a feedback loop where large-scale language understanding drives focused, high-precision detection. The result is earlier intervention against a threat class that thrives on subtlety, and fewer malicious sales emails reaching the inbox.</p>
    <div>
      <h3>Results of the undertaking</h3>
      <a href="#results-of-the-undertaking">
        
      </a>
    </div>
    <p>The visibility unlocked by LLM-driven mapping fundamentally changed how we improve detections. Instead of waiting for attackers to succeed and relying on downstream user reports, we gained the ability to identify systemic gaps earlier and address them at the source. This shift from reactive remediation to proactive reinforcement translated directly into measurable customer impact.</p><p>The most immediate signal of success was a marked reduction in customer friction. Sales Outreach–related phishing has historically generated a high volume of user-reported misses, largely because these messages closely resemble legitimate business communication and often evade traditional rule-based or reputation-driven systems. As our targeted models came online and were continuously refined using LLM-derived insights, fewer of these messages reached end users in the first place.</p><p>The data reflects this change clearly. Average daily Sales Outreach submissions — messages that we labeled as clean but were in fact Sales Outreach phishing emails, flagged by end users — dropped from 965 in Q3 2025 to 769 in Q4 2025, representing a <b>20.4% reduction in reported misses</b> <b>in a single quarter.</b></p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7plV0JarzggZYDPHKcgmya/8762112a2c7f4c1cec70e654a1a6a4ef/image1.png" />
          </figure><p>This reduction is not just a metric improvement; it represents thousands fewer disruptive moments per day for security teams and end users alike. Each avoided submission is a phishing attempt that was stopped before it could erode trust, consume analyst time, or force a user to make a security judgment mid-workflow. We have seen this trend continue in Q1 of 2026 with average daily submissions decreasing by two-thirds.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3Y6v2oNdWrJUmXzR5igzsL/72dc19cc052185f2753adad111ce0afb/image5.png" />
          </figure><p>In effect, LLMs allowed us to “see” the planes that never made it back. By illuminating previously invisible failure modes, we were able to reinforce defenses precisely where attackers were concentrating their efforts. The result is a system that improves not only detection rates, but also the day-to-day experience of the people relying on it.</p>
    <div>
      <h3>The next front in the arms race</h3>
      <a href="#the-next-front-in-the-arms-race">
        
      </a>
    </div>
    <p>Our work with LLMs is just beginning. </p><p>To stay ahead of the next evolution of attacks, we are moving toward a model of total environmental awareness by refining LLM specificity to extract forensic-level detail from every interaction. This granular mapping allows us to identify specific tactical signatures rather than relying on broad labels. </p><p>Simultaneously, we are deploying specialized machine learning models purpose-built to hunt for emerging, high-obfuscation vectors at the "fringes" that traditional defenses miss. By leveraging this real-time LLM data as a strategic compass, we can shift our human expertise away from known noise and toward the critical gaps where the next strike is likely to land.</p><p>By illuminating the "planes that didn't make it back," we are doing more than just reacting to missed email; we are systematically narrowing the battlefield. In the email arms race, the advantage belongs to the side that can see the invisible first.</p>
    <div>
      <h3>Ready to enhance your email security?</h3>
      <a href="#ready-to-enhance-your-email-security">
        
      </a>
    </div>
    <p>We provide all organizations (whether a Cloudflare customer or not) with free access to our <a href="https://developers.cloudflare.com/cloudflare-one/email-security/retro-scan/"><u>Retro Scan</u></a> tool, allowing them to use our predictive AI models to scan existing inbox messages in Microsoft 365. </p><p>Retro Scan will detect and highlight any threats found, enabling organizations to remediate them directly in their email accounts. With these insights, organizations can implement further controls, either using <a href="https://www.cloudflare.com/zero-trust/products/email-security/"><u>Cloudflare Email Security</u></a> or their preferred solution, to prevent similar threats from reaching their inboxes in the future.</p><p>If you are interested in how Cloudflare can help secure your inboxes, sign up for a phishing risk assessment <a href="https://www.cloudflare.com/lp/email-security-self-guided-demo-request/?utm_medium=referral&amp;utm_source=blog&amp;utm_campaign=2025-q3-acq-gbl-modernsec-es-ge-general-ai_week_blog"><u>here</u></a>.</p> ]]></content:encoded>
            <category><![CDATA[Email Security]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Cloudflare One]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <guid isPermaLink="false">6bn8ZofdSYZHfiOOkBl2qq</guid>
            <dc:creator>Sebastian Alovisi</dc:creator>
            <dc:creator>Ayush Kumar</dc:creator>
        </item>
        <item>
            <title><![CDATA[Integrating CrowdStrike Falcon Fusion SOAR with Cloudflare’s SASE platform]]></title>
            <link>https://blog.cloudflare.com/integrating-crowdstrike-falcon-fusion-soar-with-cloudflares-sase-platform/</link>
            <pubDate>Mon, 15 Sep 2025 16:17:51 GMT</pubDate>
            <description><![CDATA[ Cloudflare and CrowdStrike have partnered to help SOC teams minimize manual bottlenecks. By combining Cloudflare’s SASE platform with CrowdStrike’s Falcon® Fusion SOAR, security teams can now detect  ]]></description>
            <content:encoded><![CDATA[ 
    <div>
      <h2>The challenge of manual response</h2>
      <a href="#the-challenge-of-manual-response">
        
      </a>
    </div>
    <p>Security teams know all too well the grind of manual investigations and remediation. With the mass adoption of AI and increasingly automated attacks, defenders cannot afford to rely on overly manual, low priority, and complex workflows.</p><p>Heavily burdensome manual response introduces delays as analysts bounce between consoles and high alert volumes, contributing to alert fatigue. Even worse, it prevents security teams from dedicating time to high-priority threats and strategic, innovative work. To keep pace, <a href="https://www.cloudflare.com/learning/security/glossary/what-is-a-security-operations-center-soc/"><u>SOCs</u></a> need automated responses that contain and remediate common threats at machine speed before they become business-impacting incidents.</p>
    <div>
      <h2>Expanding our capabilities with CrowdStrike Falcon® Fusion’ SOAR</h2>
      <a href="#expanding-our-capabilities-with-crowdstrike-falcon-r-fusion-soar">
        
      </a>
    </div>
    <p>That’s why today, we’re excited to announce a new integration between the Cloudflare One platform and CrowdStrike's Falcon® Fusion SOAR.</p><p>As part of our ongoing partnership with CrowdStrike, this integration introduces two out-of-the-box integrations for Zero Trust and <a href="https://www.cloudflare.com/zero-trust/products/email-security/"><u>Email Security</u></a> designed for organizations already leveraging CrowdStrike Falcon® Insight XDR or CrowdStrike Falcon® Next-Gen SIEM.</p><p>This allows SOC teams to gain powerful new capabilities to <a href="https://www.cloudflare.com/learning/email-security/how-to-prevent-phishing/"><u>stop phishing</u></a>, <a href="https://www.cloudflare.com/learning/ddos/glossary/malware/"><u>malware</u></a>, and suspicious behavior faster, with less manual effort.</p>
    <div>
      <h2>Out-of-the-box integrations</h2>
      <a href="#out-of-the-box-integrations">
        
      </a>
    </div>
    <p>Although teams can always create custom automations, we’ve made it simple to get started with two pre-built integrations focused on Zero Trust Access and Email Security. Both follow the same general structure and are available directly in the CrowdStrike Content Library.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3laW9PA2y85HzMIo8n9azl/188a3c5286816e63f99c05c553493b95/Screenshot_2025-09-15_at_10.32.51.png" />
          </figure><p><b>Cloudflare within CrowdStrike Content Library</b></p><p>The actions you can take within CrowdStrike from these integrations are the following:</p><table><tr><td><p><b>Email Security</b></p><p>- Update Allow Policy </p><p>- Search Email Messages</p><p>- List Trusted Domains</p><p>- List Protected Domains</p><p>- List Blocked Senders</p><p>- List Allow Policies </p><p>- Get Trusted Domain</p><p>- Get Message Details</p><p>- Get Detection Details</p><p>- Get Allow Policy </p><p>- Delete Trusted Domain</p><p>- Delete Allow Policy</p><p>       Delete Blocked Sender</p><p>       Create Trusted Domain</p><p>       Create Blocked Sender</p><p>       Create Allow Policy</p><p>       Get Blocked Sender</p></td><td><p><b>Zero Trust Access </b></p><p>- Update Reusable Policy</p><p>- Update Access Group</p><p>- Revoke Application Tokens</p><p>- Read Metadata For A Key</p><p>- List Reusable Policies</p><p>- List Access Groups</p><p>- List Access Applications </p><p>- List Access App Policies </p><p>- Get Access Reusable Policy </p><p>- Get Access Group</p><p>- Get Access Application </p><p>- Get Access App Policy </p><p>- Delete Reusable Policy </p><p>- Delete Access Group </p><p>- Delete Access Application </p><p>- Delete Access App Policy </p><p>- Create Reusable Policy </p><p>- Create Access Group</p><p>- Create Access App Policy </p></td></tr></table><p>Using these signals, customers can create automated workflows that run with minimal to no human intervention. Falcon Fusion SOAR’s drag-and-drop editor makes it easy to chain together Cloudflare actions with other signals (from CrowdStrike or even third-party vendors) to automate large portions of the SOC workflow.</p><p>An example flow that you could create is: </p><ol><li><p>A phishing email is detected by Cloudflare Email Security.</p></li><li><p>Falcon Fusion SOAR automatically retrieves detection details, blocks the sender, and updates allow/deny lists.</p></li><li><p>Cloudflare Zero Trust revokes active session tokens for the impacted account.</p></li><li><p>If Falcon confirms the endpoint is compromised, the device is automatically isolated.</p></li></ol><p>Another example of how a workflow like above would show in the UI is the following:  </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3VAhAcZlZ6UlY7m8akijP6/b723b59a1f7099c2dd41e3c195cbf2ad/image_-_2025-09-15T103707.530.png" />
          </figure><p><b>An example automated flow using Cloudflare</b></p><p>From the Cloudflare UI, customers can navigate to the Logpush section where they can set up a job with CrowdStrike. To do this customers need to create a job with “HTTP destination”: </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4fb3bijbYCmZNVx1x3xNHI/d6c3e7bd28aca05514a3c704058cf1ab/image_-_2025-09-15T103911.429.png" />
          </figure><p>From here, customers can input the HTTP endpoint provided by CrowdStrike in the data connector setup to start sending logs over to Falcon Fusion SOAR. This URL will show up in the following way: <i>ingest.us-2.crowdstrike.com/api/ingest/hec/&lt;CRWDconnectionID&gt;/v1/services/collector/raw</i></p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7dNB9yDkmzsNQhd9vKnZEI/43267cdfec074608410bf316478ca40b/image_-_2025-09-15T104010.825.png" />
          </figure><p><b>CrowdStrike URL Location</b></p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7I9DtSd5yDgcWC9ko7ygNK/1af7ecc2459796284ca354ebb290d25e/image_-_2025-09-15T104048.857.png" />
          </figure><p><b>Working Logpush to CrowdStrike</b></p><p>This end-to-end automation allows teams to reduce mean time-to-response from minutes to seconds.</p>
    <div>
      <h2>How detection and remediation are made possible</h2>
      <a href="#how-detection-and-remediation-are-made-possible">
        
      </a>
    </div>
    <p>At a technical level, the integration relies on webhook and API integrations between <a href="https://www.cloudflare.com/zero-trust/"><u>Cloudflare’s SASE platform </u></a>and CrowdStrike Falcon Fusion SOAR. For example:</p><ul><li><p><b>From endpoint to network:</b> When the CrowdStrike Falcon® platform detects an endpoint compromise, it triggers a workflow to Cloudflare’s API, which enforces step-up authentication or session revocation across SaaS, private apps, or email access. This is done via Cloudflare’s <a href="https://www.cloudflare.com/zero-trust/products/access/"><u>Access</u></a> product. </p></li><li><p><b>From network to endpoint:</b> When Cloudflare flags suspicious behavior (e.g., abnormal login patterns, anomalous traffic, or unsafe email activity), it notifies CrowdStrike Falcon Fusion SOAR, which then isolates the device and launches remediation playbooks.</p></li></ul><p>This bidirectional exchange makes sure threats are contained from both sides, endpoint and network, without requiring manual intervention from analysts.</p>
    <div>
      <h2>How to get started</h2>
      <a href="#how-to-get-started">
        
      </a>
    </div>
    <p>If your organization already uses CrowdStrike Falcon Fusion SOAR with Cloudflare’s <a href="https://www.cloudflare.com/learning/access-management/what-is-sase/">SASE</a> platform, you can enable these workflows today directly from the Cloudflare Dashboard and CrowdStrike Falcon console (<a href="https://falcon.us-2.crowdstrike.com/workflow/fusion/content-library/apps/313f46ae74dd42939cbfd7f519986631"><u>Zero Trust</u></a>, <a href="https://falcon.us-2.crowdstrike.com/workflow/fusion/content-library/apps/dbccb19e577f44b49c561fac70518913"><u>Email Security</u></a>). You can also search for Cloudflare within the content library in CrowdStrike to find the integrations. </p><p>For organizations looking to customize further, both platforms allow extensibility through APIs and custom playbooks so SOC teams can tailor response actions to their unique risk posture.</p><p>To learn more about our integrations, feel free to <a href="https://www.cloudflare.com/zero-trust/trial/"><u>reach out to us</u></a> to get started with a consultation.</p> ]]></content:encoded>
            <category><![CDATA[Cloudflare One]]></category>
            <category><![CDATA[Cloudflare Zero Trust]]></category>
            <category><![CDATA[Email Security]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <guid isPermaLink="false">4pnRemZNUf37u3e5pPlaAV</guid>
            <dc:creator>Ayush Kumar</dc:creator>
            <dc:creator>Andrew Meyer</dc:creator>
            <dc:creator>Michael Mcgrory</dc:creator>
            <dc:creator>Gavin Chen</dc:creator>
        </item>
        <item>
            <title><![CDATA[Cloudflare named a Strong Performer in Email Security by Forrester]]></title>
            <link>https://blog.cloudflare.com/cloudflare-named-a-strong-performer-in-email-security-by-forrester/</link>
            <pubDate>Fri, 30 May 2025 14:30:00 GMT</pubDate>
            <description><![CDATA[ Forrester has recognized Cloudflare Email Security as a Strong Performer in the ‘current offering’ category in “The Forrester Wave™: Email, Messaging, And Collaboration Security Solutions. ]]></description>
            <content:encoded><![CDATA[ <p>Today, we are excited to announce that Forrester has recognized <a href="https://www.cloudflare.com/zero-trust/products/email-security/"><u>Cloudflare Email Security</u></a> as a Strong Performer and among the top three providers in the ‘current offering’ category in “The Forrester Wave™: Email, Messaging, And Collaboration Security Solutions, Q2 2025” report. Get a complimentary copy of the report <a href="https://www.cloudflare.com/lp/forrester-wave-email-security-2025/"><u>here</u></a>. </p><p>According to Forrester:</p><blockquote><p><i>“Cloudflare is a solid choice for organizations looking to augment current email, messaging, and collaboration security tooling with deep content analysis and processing and malware detection capabilities.”</i></p></blockquote>
    <div>
      <h2>Cloudflare’s top-ranked criteria</h2>
      <a href="#cloudflares-top-ranked-criteria">
        
      </a>
    </div>
    <p>In this evaluation, Forrester analyzed 10 Email Security vendors across 27 different criteria. Cloudflare received the highest scores possible in nine key evaluation criteria, and also scored among the top three in the current offering category. We believe this recognition is due to our ability to deliver stronger security outcomes across email and collaboration tools. These highlights showcase the strength and maturity of our <a href="https://www.cloudflare.com/zero-trust/products/email-security/"><u>Email Security</u></a> solution:</p>
    <div>
      <h4><b>Antimalware &amp; sandboxing</b></h4>
      <a href="#antimalware-sandboxing">
        
      </a>
    </div>
    <p>Cloudflare’s advanced sandboxing engine analyzes files, whether directly attached or linked via cloud storage, using both static and dynamic analysis. Our AI-powered detectors evaluate attachment structure and behavior in real time, enabling protection not only against known <a href="https://www.cloudflare.com/learning/ddos/glossary/malware/">malware</a> but also emerging threats.</p>
    <div>
      <h4><b>Malicious URL detection &amp; web security</b></h4>
      <a href="#malicious-url-detection-web-security">
        
      </a>
    </div>
    <p>URLs are analyzed at delivery and again at click-time using Cloudflare’s global network. Our OCR and machine learning models extract and analyze metadata and page behavior to determine the maliciousness of a URL. Customers can also isolate suspicious links in remote browser sessions preventing user compromise. We continuously monitor URLs and retroactively remediate messages if the risk changes.</p>
    <div>
      <h4><b>Threat intelligence</b></h4>
      <a href="#threat-intelligence">
        
      </a>
    </div>
    <p>With over 4.4 trillion signals ingested daily across <a href="https://www.cloudflare.com/learning/dns/what-is-dns/">DNS</a>, <a href="https://www.cloudflare.com/learning/ddos/glossary/hypertext-transfer-protocol-http/">HTTP</a>, and email layers, Cloudflare operates one of the most comprehensive real-time threat intelligence ecosystems. Campaigns observed via our DNS or HTTP layers are used to preemptively block related email threats well before traditional feeds.</p>
    <div>
      <h4><b>Content analysis &amp; processing</b></h4>
      <a href="#content-analysis-processing">
        
      </a>
    </div>
    <p>Cloudflare uses an ensemble of <a href="https://www.cloudflare.com/learning/ai/what-is-large-language-model/">large language models (LLMs)</a>, <a href="https://www.cloudflare.com/learning/ai/natural-language-processing-nlp/">natural language processing (NLP)</a> techniques, and <a href="https://www.cloudflare.com/learning/ai/what-is-machine-learning/">machine learning (ML)</a> classifiers to analyze message tone, thread behavior, QR codes, and invoice language. These models detect indicators of fraud, <a href="https://www.cloudflare.com/learning/email-security/business-email-compromise-bec/">business email compromise (BEC)</a>, and social engineering that legacy engines often miss.</p>
    <div>
      <h4><b>Reporting &amp; dashboards</b></h4>
      <a href="#reporting-dashboards">
        
      </a>
    </div>
    <p>Cloudflare’s unified <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust</a> dashboard gives SOC teams full visibility across email, web, cloud, data events. Analysts can pivot across user activity in just a few clicks and export data when needed. </p>
    <div>
      <h4><b>User quarantine</b></h4>
      <a href="#user-quarantine">
        
      </a>
    </div>
    <p>Our quarantine workflow is designed to minimize disruption. Customers can choose several ways to get notifications to users about messages that have been quarantined. </p>
    <div>
      <h4><b>Email authentication</b></h4>
      <a href="#email-authentication">
        
      </a>
    </div>
    <p>Cloudflare enforces <a href="https://developers.cloudflare.com/radar/glossary/#authentication-methods"><u>SPF, DKIM, and DMARC</u></a> alignment automatically. We also offer a <a href="https://developers.cloudflare.com/dmarc-management/"><u>free DMARC reporting tool </u></a>that gives customers visibility into email authentication failures and helps them take control of email brand protection.</p>
    <div>
      <h4><b>Product security</b></h4>
      <a href="#product-security">
        
      </a>
    </div>
    <p>Security is core to Cloudflare’s DNA. All services undergo continuous penetration testing, adhere to <a href="https://www.cloudflare.com/trust-hub/compliance-resources/"><u>SOC 2 Type II and ISO 27001 standards</u></a>, and operate on Cloudflare’s own infrastructure.</p>
    <div>
      <h4><b>Partner ecosystem</b></h4>
      <a href="#partner-ecosystem">
        
      </a>
    </div>
    <p>Cloudflare integrates natively with Splunk, Microsoft Sentinel, Palo Alto XSOAR, and ServiceNow, making it easy to bring Cloudflare Email Security into existing SOC workflows. We also partner with leading human risk and awareness platforms to give organizations a more user-centric view of risk and behavior.</p><p>These strengths reflect Cloudflare’s commitment to building a comprehensive email security platform, one that’s designed to protect email inboxes and workspaces. </p>
    <div>
      <h2>Our email vision</h2>
      <a href="#our-email-vision">
        
      </a>
    </div>
    <p>We agree with Forrester’s perspective on where the email security market is headed. Across our customer base, from Fortune 100 enterprises to fast-growing startups, we’ve seen a clear evolution:</p><p><b><i><u>Phishing is no longer confined to the inbox.</u></i></b></p><p>Attackers are increasingly luring users into external apps, unaudited chat platforms, or legitimate third-party services, bypassing traditional security controls. This shift is forcing SOC teams to think beyond just email and adopt a more holistic approach to workspace security.</p><p>Cloudflare was one of the first vendors to position email security as part of a broader <a href="https://www.cloudflare.com/zero-trust/products/"><u>SASE and Zero Trust</u></a> strategy, securing not just messages, but the entire user surface. Looking ahead, we’re doubling down on this integrated vision of workspace security to give SOC teams simpler investigations and faster response.</p>
    <div>
      <h3>What’s next: our strategic focus</h3>
      <a href="#whats-next-our-strategic-focus">
        
      </a>
    </div>
    <p>We will continue to:</p><ul><li><p><b>Build AI-driven automation
</b>Reduce alert fatigue and manual triage by using LLMs to summarize incidents, auto-label threats, and recommend next steps, allowing junior analysts to act with senior-level confidence.</p></li><li><p><b>Deepen integrations across the Cloudflare ecosystem
</b>Continue to unify signals across email, web, cloud, and data to give security teams a single view of user behavior driving faster remediations.</p></li><li><p><b>Enhance real-time user coaching
</b>Deliver contextual guidance at the moment of risk, whether via banners, isolation flows, or in-app warnings, to help users make safer and more informed decisions.</p></li><li><p><b>Develop best-in-class detections
</b>Continue investing in advanced models detecting new and novel phishing campaigns by leveraging global telemetry from our network edge to stop novel threats faster.</p></li></ul><p>Cloudflare has always approached email security not as a standalone point solution, but as a core pillar of unified threat protection, deeply integrated across the modern enterprise security stack.</p>
    <div>
      <h2>Ready to enhance your email security?</h2>
      <a href="#ready-to-enhance-your-email-security">
        
      </a>
    </div>
    <p>We provide all organizations (whether a Cloudflare customer or not) with free access to our <a href="https://blog.cloudflare.com/threats-lurking-office-365-cloudflare-email-retro-scan/"><u>Retro Scan</u></a> tool, allowing them to use our predictive AI models to scan existing inbox messages. Retro Scan will detect and highlight any threats found, enabling organizations to remediate them directly in their email accounts. With these insights, organizations can implement further controls, either using Cloudflare Email Security or their preferred solution, to prevent similar threats from reaching their inboxes in the future.</p><p>If you are interested in how Cloudflare can help secure your inboxes, sign up for a phishing risk assessment <a href="https://www.cloudflare.com/lp/email-security-self-guided-demo-request/"><u>here</u></a>. </p><p><sub><i>Forrester does not endorse any company, product, brand, or service included in its research publications and does not advise any person to select the products or services of any company or brand based on the ratings included in such publications. Information is based on the best available resources. Opinions reflect judgment at the time and are subject to change. For more information, read about Forrester’s objectivity </i></sub><a href="https://www.forrester.com/about-us/objectivity/"><sub><i>here.</i></sub></a><sub></sub></p> ]]></content:encoded>
            <category><![CDATA[Forrester]]></category>
            <category><![CDATA[Email Security]]></category>
            <guid isPermaLink="false">1V8L0Y4ySPeme0LzUNSodX</guid>
            <dc:creator>Ayush Kumar</dc:creator>
        </item>
        <item>
            <title><![CDATA[Security Week 2025: in review]]></title>
            <link>https://blog.cloudflare.com/security-week-2025-wrap-up/</link>
            <pubDate>Mon, 24 Mar 2025 13:05:00 GMT</pubDate>
            <description><![CDATA[ Security Week 2025 has officially come to a close. Our updates for the week included a deep dive on our AI offering, a unified navigation experience, and an introduction to our AI Agent Cloudy. ]]></description>
            <content:encoded><![CDATA[ <p>Thank you for following along with another Security Week at Cloudflare. We’re extremely proud of the work our team does to make the Internet safer and to help meet the challenge of emerging threats. As our CISO Grant Bourzikas outlined in his <a href="https://blog.cloudflare.com/welcome-to-security-week-2025/"><u>kickoff post</u></a> this week, security teams are facing a landscape of rapidly increasing complexity introduced by vendor sprawl, an “AI Boom”, and an ever-growing surface area to protect.</p><p>As we continuously work to meet new challenges, Innovation Weeks like Security Week give us an invaluable opportunity to share our point of view and engage with the wider Internet community. Cloudflare’s mission is to <i>help</i> build a better Internet. We want to help safeguard the Internet from the arrival of quantum supercomputers, help protect the livelihood of content creators from <a href="https://www.cloudflare.com/learning/ai/how-to-prevent-web-scraping/">unauthorized AI scraping</a>, help raise awareness of the latest Internet threats, and help find new ways to help reduce the reuse of compromised passwords. Solving these challenges will take a village. We’re grateful to everyone who has engaged with us on these issues via social media, contributed to <a href="https://github.com/cloudflare"><u>our open source repositories</u></a>, and reached out through our <a href="https://www.cloudflare.com/partners/technology-partners/"><u>technology partner program</u></a> to work with us on the issues most important to them. For us, that’s the best part.</p><p>Here’s a recap of this week’s announcements:</p>
    <div>
      <h3>Helping make the Internet safer</h3>
      <a href="#helping-make-the-internet-safer">
        
      </a>
    </div>
    <table><tr><td><p><b>Title</b></p></td><td><p><b>Excerpt</b></p></td></tr><tr><td><p><a href="https://blog.cloudflare.com/post-quantum-zero-trust/"><u>Conventional cryptography is under threat. Upgrade to post-quantum cryptography with Cloudflare Zero Trust</u></a></p></td><td><p>We’re thrilled to announce that organizations can now protect their sensitive corporate network traffic against quantum threats by tunneling it through Cloudflare’s Zero Trust platform.</p></td></tr><tr><td><p><a href="https://blog.cloudflare.com/how-cloudflare-is-using-automation-to-tackle-phishing/"><u>How Cloudflare is using automation to tackle phishing head on</u></a></p></td><td><p>How Cloudflare is using threat intelligence and our Developer Platform products to automate phishing abuse reports.</p></td></tr><tr><td><p><a href="https://blog.cloudflare.com/advancing-account-security-as-part-of-cloudflare-commitment-to-cisa-secure-by-design-pledge/"><u>Advancing account security as part of Cloudflare’s commitment to CISA’s Secure by Design pledge</u></a></p></td><td><p>Cloudflare has made significant progress in boosting multi-factor authentication (MFA) adoption. With the addition of Apple and Google social logins, we’ve made secure access easier for our users.</p></td></tr><tr><td><p><a href="https://blog.cloudflare.com/email-security-now-available-for-free-for-political-parties-and-campaigns/"><u>Email Security now available for free for political parties and campaigns through Cloudflare for Campaigns</u></a></p></td><td><p>We’re excited to announce that Cloudflare for Campaigns now includes Email Security, adding an extra layer of protection to email systems that power political campaigns.</p></td></tr><tr><td><p><a href="https://blog.cloudflare.com/enhanced-security-and-simplified-controls-with-automated-botnet-protection/"><u>Enhanced security and simplified controls with automated botnet protection, cipher suite selection, and URL Scanner updates</u></a></p></td><td><p>Enhanced security, simplified control! This Security Week, Cloudflare unveils automated botnet protection, flexible cipher suites, and an upgraded URL Scanner.</p></td></tr><tr><td><p><a href="https://blog.cloudflare.com/password-reuse-rampant-half-user-logins-compromised/"><u>Password reuse is rampant: nearly half of user logins are compromised</u></a></p></td><td><p>Nearly half of login attempts across websites protected by Cloudflare involved leaked credentials. The pervasive issue of password reuse is enabling automated bot attacks on a massive scale.</p></td></tr></table>
    <div>
      <h3>Threat research from the network that sees the most threats </h3>
      <a href="#threat-research-from-the-network-that-sees-the-most-threats">
        
      </a>
    </div>
    <table><tr><td><p><b>Title</b></p></td><td><p><b>Excerpt</b></p></td></tr><tr><td><p><a href="https://blog.cloudflare.com/threat-events-platform/"><u>Unleashing improved context for threat actor activity with our Cloudforce One threat events platform</u></a></p></td><td><p>Gain real-time insights with our new threat events platform. This tool empowers your cybersecurity defense with actionable intelligence to stay ahead of attacks and protect your critical assets.</p></td></tr><tr><td><p><a href="https://blog.cloudflare.com/cloudflare-security-posture-management/"><u>One platform to manage your company’s predictive security posture with Cloudflare</u></a></p></td><td><p>Cloudflare introduces a single platform for unified security posture management, helping protect SaaS and web applications deployed across various environments.</p></td></tr><tr><td><p><a href="https://blog.cloudflare.com/monitoring-and-forensics/"><u>Cloudflare enables native monitoring and forensics with Log Explorer and custom dashboards</u></a></p></td><td><p>We are excited to announce support for Zero Trust datasets, and custom dashboards where customers can monitor critical metrics for suspicious or unusual activity</p></td></tr><tr><td><p><a href="https://blog.cloudflare.com/upgraded-turnstile-analytics-enable-deeper-insights-faster-investigations/"><u>Introducing new Turnstile Analytics: Gain insight into your visitor traffic, bot behavior patterns, traffic anomalies, and attack attributes.</u></a></p></td><td><p>Introducing new Turnstile Analytics: gain insight into your visitor traffic, bot behavior patterns, traffic anomalies, and attack attributes.</p></td></tr><tr><td><p><a href="https://blog.cloudflare.com/cloudflare-radar-ddos-leaked-credentials-bots/"><u>Extending Cloudflare Radar’s security insights with new DDoS, leaked credentials, and bots datasets</u></a></p></td><td><p>For Security Week 2025, we are adding several new DDoS-focused graphs, new insights into leaked credential trends, and a new Bots page to Cloudflare Radar.</p></td></tr></table>
    <div>
      <h3>Securing models and guarding against AI threats </h3>
      <a href="#securing-models-and-guarding-against-ai-threats">
        
      </a>
    </div>
    <table><tr><td><p><b>Title</b></p></td><td><p><b>Excerpt</b></p></td></tr><tr><td><p><a href="https://blog.cloudflare.com/cloudflare-for-ai-supporting-ai-adoption-at-scale-with-a-security-first-approach/"><u>Cloudflare for AI: supporting AI adoption at scale with a security-first approach</u></a></p></td><td><p>With Cloudflare for AI, developers, security teams, and content creators can leverage Cloudflare’s network and portfolio of tools to secure, observe, and make AI applications resilient and safe to use.</p></td></tr><tr><td><p><a href="https://blog.cloudflare.com/how-we-train-ai-to-uncover-malicious-javascript-intent-and-make-web-surfing-safer/"><u>How we train AI to uncover malicious JavaScript intent and make web surfing safer</u></a></p></td><td><p>Learn more about how Cloudflare developed an AI model to uncover malicious JavaScript intent using a Graph Neural Network, from pre-processing data to inferencing at scale.</p></td></tr><tr><td><p><a href="https://blog.cloudflare.com/an-early-look-at-cryptographic-watermarks-for-ai-generated-content/"><u>An early look at cryptographic watermarks for AI-generated content</u></a></p></td><td><p>It's hard to tell the difference between web content produced by humans and web content produced by AI. We're taking a new approach to making AI content distinguishable without impacting performance.</p></td></tr><tr><td><p><a href="https://blog.cloudflare.com/ai-labyrinth/"><u>How Cloudflare uses generative AI to slow down, confuse, and waste the resources of AI Crawlers and other bots that don’t respect “no crawl” directives.</u></a></p></td><td><p>How Cloudflare uses generative AI to slow down, confuse, and waste the resources of AI Crawlers and other bots that don’t respect “no crawl” directives.</p></td></tr><tr><td><p><a href="https://blog.cloudflare.com/take-control-of-public-ai-application-security-with-cloudflare-firewall-for-ai/"><u>Take control of public AI application security with Cloudflare's Firewall for AI</u></a></p></td><td><p>Firewall for AI discovers and protects your public LLM-powered applications, and is seamlessly integrated with Cloudflare WAF. Join the beta now and take control of your generative AI security</p></td></tr><tr><td><p><a href="https://blog.cloudflare.com/bots-heuristics/"><u>Improved Bot Management flexibility and visibility with new high-precision heuristics</u></a></p></td><td><p>By building and integrating a new heuristics framework into the Cloudflare Ruleset Engine, we now have a more flexible system to write rules and deploy new releases rapidly</p></td></tr></table>
    <div>
      <h3>Simplifying security</h3>
      <a href="#simplifying-security">
        
      </a>
    </div>
    <table><tr><td><p><b>Title</b></p></td><td><p><b>Excerpt</b></p></td></tr><tr><td><p><a href="https://blog.cloudflare.com/introducing-ai-agent/"><u>Introducing Cloudy, Cloudflare’s AI agent for simplifying complex configurations</u></a></p></td><td><p>Cloudflare’s first AI agent, Cloudy, helps make complicated configurations easy to understand for Cloudflare administrators.</p></td></tr><tr><td><p><a href="https://blog.cloudflare.com/new-application-security-experience/"><u>Making Application Security simple with a new unified dashboard experience</u></a></p></td><td><p>We’re introducing a new Application Security experience in the Cloudflare dashboard, with a reworked UI organized by use cases, making it easier for customers to navigate and secure their accounts</p></td></tr><tr><td><p><a href="https://blog.cloudflare.com/improved-support-for-private-applications-and-reusable-access-policies-with-cloudflare-access/"><u>Improved support for private applications and reusable access policies with Cloudflare Access</u></a></p></td><td><p>We are excited to introduce support for private hostname and IP address-defined applications as well as reusable access policies.</p></td></tr><tr><td><p><a href="https://blog.cloudflare.com/aegis-deep-dive/"><u>Simplify allowlist management and lock down origin access with Cloudflare Aegis</u></a></p></td><td><p>Cloudflare Aegis provides dedicated egress IPs for Zero Trust origin access strategies, now supporting BYOIP and customer-facing configurability, with observability of Aegis IP address utilization coming soon.</p></td></tr><tr><td><p><a href="https://blog.cloudflare.com/https-only-for-cloudflare-apis-shutting-the-door-on-cleartext-traffic"><u>HTTPS-only for Cloudflare APIs: shutting the door on cleartext traffic</u></a></p></td><td><p>We are closing the cleartext HTTP ports entirely for Cloudflare API traffic. This prevents the risk of clients unintentionally leaking their secret API keys in cleartext during the initial request, before we can reject the connection at the server side.</p></td></tr><tr><td><p><a href="https://blog.cloudflare.com/cloudflare-named-leader-waf-forrester-2025/"><u>Cloudflare named a leader in Web Application Firewall Solutions in 2025 Forrester report</u></a></p></td><td><p>Forrester Research has recognized Cloudflare as a Leader in its The Forrester Wave™: Web Application Firewall Solutions, Q1 2025 report.</p></td></tr></table>
    <div>
      <h3>Data security everywhere, all the time </h3>
      <a href="#data-security-everywhere-all-the-time">
        
      </a>
    </div>
    <table><tr><td><p><b>Title</b></p></td><td><p><b>Excerpt</b></p></td></tr><tr><td><p><a href="https://blog.cloudflare.com/scan-cloud-dlp-with-casb"><u>Detecting sensitive data and misconfigurations in AWS and GCP with Cloudflare One</u></a></p></td><td><p>Using Cloudflare’s CASB, integrate, scan, and detect sensitive data and misconfigurations in your cloud storage accounts.</p></td></tr><tr><td><p><a href="https://blog.cloudflare.com/browser-based-rdp"><u>RDP without the risk: Cloudflare's browser-based solution for secure third-party access</u></a></p></td><td><p>Cloudflare now provides clientless, browser-based support for the Remote Desktop Protocol (RDP). It natively enables secure, remote Windows server access without VPNs or RDP clients, to support third-party access and BYOD security.</p></td></tr><tr><td><p><a href="https://blog.cloudflare.com/improving-data-loss-prevention-accuracy-with-ai-context-analysis"><u>Improving Data Loss Prevention accuracy with AI-powered context analysis</u></a></p></td><td><p>Cloudflare’s Data Loss Prevention is reducing false positives by using a self-improving AI-powered algorithm, built on Cloudflare’s Developer Platform, to improve detection accuracy through AI context analysis.</p></td></tr><tr><td><p><a href="https://blog.cloudflare.com/enhance-data-protection-in-microsoft-outlook-with-cloudflare-ones-new-dlp"><u>Enhance data protection in Microsoft Outlook with Cloudflare One’s new DLP Assist</u></a></p></td><td><p>Customers can now easily safeguard sensitive data in Microsoft Outlook with our new DLP Assist feature.</p></td></tr><tr><td><p><a href="https://blog.cloudflare.com/lattice-crypto-primer"><u>Prepping for post-quantum: a beginner’s guide to lattice cryptography</u></a></p></td><td><p>This post is a beginner's guide to lattices, the math at the heart of the transition to post-quantum (PQ) cryptography. It explains how to do lattice-based encryption and authentication from scratch.</p></td></tr><tr><td><p><a href="https://blog.cloudflare.com/irap-protected-assessment"><u>Cloudflare is now IRAP assessed at the PROTECTED level, furthering our commitment to the global public sector</u></a></p></td><td><p>Cloudflare is now assessed at the IRAP PROTECTED level, bringing our products and services to the Australian Public Sector.</p></td></tr></table>
    <div>
      <h2>Tune in to the latest on Cloudflare TV</h2>
      <a href="#tune-in-to-the-latest-on-cloudflare-tv">
        
      </a>
    </div>
    <p>For a deeper dive on many of the great announcements from Security Week, <a href="https://www.cloudflare.com/security-week-2025/cloudflare-tv/"><u>check out our CFTV segments</u></a> where our team shares even more details on our latest updates. </p><div>
  
</div>
<p></p>
    <div>
      <h2>See you for our next Innovation Week</h2>
      <a href="#see-you-for-our-next-innovation-week">
        
      </a>
    </div>
    <p>We appreciate everyone who’s taken the time to read Cloudflare’s Security Week blog posts or engage with us on these topics via social media. Our next innovation week, <a href="https://www.cloudflare.com/developer-week-2024/updates/"><u>Developer Week</u></a>, is right around the corner in April. We look forward to seeing you then!</p> ]]></content:encoded>
            <category><![CDATA[Security Week]]></category>
            <category><![CDATA[Application Security]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[Email Security]]></category>
            <category><![CDATA[AI]]></category>
            <guid isPermaLink="false">57bTt5UYhnjdF2MwuEePqb</guid>
            <dc:creator>Kim Blight</dc:creator>
            <dc:creator>Adam Martinetti</dc:creator>
            <dc:creator>Alex Dunbrack</dc:creator>
        </item>
        <item>
            <title><![CDATA[Enhance data protection in Microsoft Outlook with Cloudflare One’s new DLP Assist]]></title>
            <link>https://blog.cloudflare.com/enhance-data-protection-in-microsoft-outlook-with-cloudflare-ones-new-dlp/</link>
            <pubDate>Fri, 21 Mar 2025 13:00:00 GMT</pubDate>
            <description><![CDATA[ Customers can now easily safeguard sensitive data in Microsoft Outlook with our new DLP Assist feature. ]]></description>
            <content:encoded><![CDATA[ <p><a href="https://developers.cloudflare.com/cloudflare-one/email-security/"><u>Cloudflare Email Security</u></a> customers using Microsoft Outlook can now enhance their data protection using our new <a href="https://developers.cloudflare.com/cloudflare-one/email-security/outbound-dlp/"><u>DLP Assist</u></a> capability. This application scans emails in real time as users compose them, identifying potential <a href="https://www.cloudflare.com/learning/access-management/what-is-dlp/"><u>data loss prevention (DLP)</u></a> violations, such as Social Security or credit card numbers. Administrators can instantly alert users of violations and take action downstream, whether by blocking or encrypting messages, to prevent sensitive information from leaking. DLP Assist is lightweight, easy to deploy, and helps organizations maintain compliance without disrupting workflow.</p>
    <div>
      <h3>Making DLP more accessible</h3>
      <a href="#making-dlp-more-accessible">
        
      </a>
    </div>
    <p>After speaking with our customers, we discovered a common challenge: many wanted to implement a data loss prevention policy for Outlook, but found existing solutions either too complex to set up or too costly to adopt.</p><p>That’s why we created DLP Assist to be a lightweight application that can be installed in minutes. Unlike other solutions, it doesn’t require changes to outbound email connectors or provide concerns about IP reputation to customers. By fully leveraging the Microsoft ecosystem, DLP Assist makes email DLP accessible to all organizations, whether they have dedicated IT teams or none at all.</p><p>We also recognized that traditional DLP solutions often demand significant financial investment in not just software but also in team members to configure and monitor them. DLP Assist aims to eliminate these barriers. Customers can use the application as part of our Email Security product, avoiding the need for additional purchases. Plus, with our DLP engine powered by optical character recognition (OCR), confidence levels, and other detection mechanisms, organizations don’t need a dedicated team to constantly oversee it. </p><p>By eliminating the complexities of legacy DLP and email systems, we allow customers to quickly begin preventing the unauthorized egress of sensitive data. With DLP Assist, organizations can be confident in controlling and protecting the information that leaves their environment.</p>
    <div>
      <h3>How does it work?</h3>
      <a href="#how-does-it-work">
        
      </a>
    </div>
    <p>Our DLP Assist is an application that integrates with the Desktop (Mac and Windows) and Web Outlook clients, passively scanning emails as they are composed. Running in the background within Microsoft Outlook, DLP Assist continuously monitors new text and attachments added to emails that users are drafting. </p><p>When a customer downloads and installs the application, Cloudflare creates a unique client ID specifically for emails read from the DLP Assist application, which serves as an identifier solely for use by DLP Assist within Cloudflare’s backend. When a user begins drafting a message, the DLP Assist application invokes several Microsoft Outlook APIs to gather information about how the message is changing. These APIs let the Cloudflare application continuously access different parts of the message like subject, body, attachments, etc. While the application is reading the changes within the message, it also establishes a secure, encrypted connection with a Cloudflare Worker. </p><p>As raw data about the email and attachments is sent to the Worker, the Worker relays the information to our DLP engine, which is at the heart of our scanning process. It leverages OCR technology to analyze attachments, extract text from images, and detect DLP violations across both email content and embedded data. It also examines raw text to ensure a comprehensive analysis of every part of the email and its attachments. While our engine supports most attachment types, it currently does not process video or audio files.</p><p>The DLP engine runs on all of our servers, and we also store the customer DLP profile configuration data on all of our servers. By keeping DLP policy configuration data on all servers alongside our analysis engine, we eliminate the need to reroute requests across our network allowing for low-latency, real-time DLP checks. The customer's client ID enables us to find and apply their defined DLP profiles and accurately determine policy violations, delivering results directly to the Cloudflare Worker. If a violation is found, the Worker responds to the application to take action within Outlook. </p><p>Our architecture ensures real-time scanning with minimal latency, as end users are always near a Cloudflare Worker, regardless of their location. Additionally, this design provides built-in resilience — if a Cloudflare Worker becomes unavailable, another can take over, allowing for uninterrupted DLP enforcement. By scanning in real time, this allows us to provide immediate feedback to the user about any DLP violations that they have within their email, rather than the user having to wait till the message has been sent. </p><p>If a violation is detected, the application first displays an insight message — a ribbon notification at the top of the email — alerting the user to the issue. Administrators have full control over this message and can customize it to provide specific guidance or warnings. We find that most of our customers point users to documentation reminding them what is allowed to be sent outside of the organization. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4X9uiCNNus3Y9t1hNNK1vi/d6782435b13f06719f7d75cb306b2231/image3.png" />
          </figure><p>When a DLP violation occurs, DLP Assist also injects a header into the <a href="https://www.adobe.com/acrobat/resources/document-files/eml.html"><u>EML file</u></a> to indicate the violation. If the user removes the content that is in violation, the header is automatically removed as well.</p><p>If the violation remains unchanged, DLP Assist invokes a Microsoft Outlook API which prompts the user with a final warning, giving them another opportunity to revise the message before sending.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2If0U9oDTYW5j5mbm4Gt5r/e7297064f8f1e7e820c962c1bfd7e673/image6.png" />
          </figure><p>If the user proceeds without making changes, the email will be sent from the client with headers embedded into the EML showing that message contains a DLP violation. Organizations can configure their outbound <a href="https://www.cloudflare.com/learning/email-security/what-is-a-mail-server/"><u>mail transfer agent (MTA)</u></a> to take appropriate action based on these headers. For those with Microsoft as their outbound MTA, Cloudflare’s DLP Assist integrates with <a href="https://learn.microsoft.com/en-us/purview/purview"><u>Microsoft Purview</u></a>, enabling organizations to block, encrypt, or require approval before sending.</p><p>For example, if an organization configures Purview to block the email, users will receive a notification similar to this one.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1FIuUhcuMC0kQPivQRIA5V/459a4acbaaa04bc007dc3829c4ed8d14/image5.png" />
          </figure><p>Violations detected by the DLP Assist application can also be sent externally through our <a href="https://developers.cloudflare.com/logs/about/"><u>Logpush</u></a> feature. Customers have the flexibility to integrate this data with SIEM or SOAR platforms for deeper analysis, or store it in bucket storage solutions like Cloudflare <a href="https://developers.cloudflare.com/r2/"><u>R2</u></a>. Additionally, customers can enhance their reporting capabilities by viewing block data directly within their outbound gateway.</p><p>As we continue to improve our DLP engine, we're introducing more advanced ways to analyze messages. During Security Week 2025, we’re unveiling new AI methodologies that automatically fine-tune DLP confidence levels using machine learning models. Initially, these enhancements will be rolled out for Gateway violations, but we plan to extend them to email scanning in the near future. For more details, see the associated <a href="https://blog.cloudflare.com/improving-data-loss-prevention-accuracy-with-ai-context-analysis/"><u>blog post</u></a>. </p><p>Cloudflare One’s DLP Assist is designed for quick deployment, enabling organizations to implement a data loss prevention solution with minimal effort. It allows customers to immediately begin scanning emails for sensitive data and take action to prevent unauthorized sharing, ensuring compliance and security from day one.</p>
    <div>
      <h3>How can I start using it?</h3>
      <a href="#how-can-i-start-using-it">
        
      </a>
    </div>
    <p>To get started, navigate to the Zero Trust dashboard and click on the Email Security tab. From there, select the Outbound DLP tab.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1FMrBrIsDS15sdUU9HUW56/1b25031717fde5411c286e27f2836f6a/image2.png" />
          </figure><p>To install DLP Assist, organizations can download the manifest file, which provides Microsoft with the necessary instructions to install the application within Outlook. Administrators can then upload this manifest file by going to Integrated Apps within the Microsoft 365 Admin Center and selecting Upload Custom Apps:</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3twUf3WW6eb7GsNdxNG6w6/f5244c2c9d801bd78a33537abd5fd9c4/image4.png" />
          </figure><p><i><sup>This application is best suited for use with OWA (Outlook Web Access) and the desktop (Mac and Windows) Outlook client. Due to Microsoft limitations, a stable experience on mobile devices is not yet available.</sup></i></p><p>More information can be found within our <a href="https://developers.cloudflare.com/cloudflare-one/email-security/outbound-dlp/"><u>developer documentation</u></a>. </p>
    <div>
      <h3>What's next?</h3>
      <a href="#whats-next">
        
      </a>
    </div>
    <p>We’re continuously expanding our solutions to help organizations protect their data. Exciting new DLP and Email Security features are on the way throughout 2025, so stay tuned for upcoming announcements.</p><p>To learn more about our DLP and Email Security solutions, reach out to your Cloudflare representative. Want to see our detections in action? Run a free <a href="https://blog.cloudflare.com/threats-lurking-office-365-cloudflare-email-retro-scan/"><u>Retro Scan</u></a> to uncover any potentially malicious messages hiding in your inbox.</p> ]]></content:encoded>
            <category><![CDATA[Security Week]]></category>
            <category><![CDATA[Email Security]]></category>
            <category><![CDATA[Data Loss]]></category>
            <category><![CDATA[Data Loss Prevention]]></category>
            <guid isPermaLink="false">tNeYTGhykKxYbzGItvS5M</guid>
            <dc:creator>Ayush Kumar</dc:creator>
            <dc:creator>Noelle Kagan</dc:creator>
            <dc:creator>Warnessa Weaver</dc:creator>
        </item>
        <item>
            <title><![CDATA[One platform to manage your company’s predictive security posture with Cloudflare]]></title>
            <link>https://blog.cloudflare.com/cloudflare-security-posture-management/</link>
            <pubDate>Tue, 18 Mar 2025 13:00:00 GMT</pubDate>
            <description><![CDATA[ Cloudflare introduces a single platform for unified security posture management, helping protect SaaS and web applications deployed across various environments.  ]]></description>
            <content:encoded><![CDATA[ <p>In today’s fast-paced digital landscape, companies are managing an increasingly complex mix of environments — from SaaS applications and public cloud platforms to on-prem data centers and hybrid setups. This diverse infrastructure offers flexibility and scalability, but also opens up new attack surfaces.</p><p>To support both business continuity and security needs, “security must evolve from being <a href="https://blog.cloudflare.com/welcome-to-security-week-2025/#how-can-we-help-make-the-internet-better"><u>reactive to predictive</u></a>”. Maintaining a healthy security posture entails monitoring and strengthening your security defenses to identify risks, ensure compliance, and protect against evolving threats. With our newest capabilities, you can now use Cloudflare to achieve a healthy posture across your SaaS and web applications. This addresses any security team’s ultimate (daily) question: <i>How well are our assets and documents protected</i>?</p><p>A predictive security posture relies on the following key components:</p><ul><li><p>Real-time discovery and inventory of all your assets and documents</p></li><li><p>Continuous asset-aware threat detection and risk assessment</p></li><li><p>Prioritised remediation suggestions to increase your protection</p></li></ul><p>Today, we are sharing how we have built these key components across SaaS and web applications, and how you can use them to manage your business’s security posture.</p>
    <div>
      <h3>Your security posture at a glance</h3>
      <a href="#your-security-posture-at-a-glance">
        
      </a>
    </div>
    <p>Regardless of the applications you have <a href="https://developers.cloudflare.com/reference-architecture/architectures/security/#using-cloudflare-to-protect-your-business"><u>connected to</u></a> Cloudflare’s global network, Cloudflare actively scans for risks and misconfigurations associated with each one of them on a <a href="https://developers.cloudflare.com/security-center/security-insights/how-it-works/#scan-frequency"><u>regular cadence</u></a>. Identified risks and misconfigurations are surfaced in the dashboard under <a href="https://dash.cloudflare.com/?to=/:account/security-center"><u>Security Center</u></a> as insights.</p><p>Insights are grouped by their severity, type of risks, and corresponding Cloudflare solution, providing various angles for you to zoom in to what you want to focus on. When applicable, a one-click resolution is provided for selected insight types, such as setting <a href="https://developers.cloudflare.com/ssl/edge-certificates/additional-options/minimum-tls/"><u>minimum TLS version</u></a> to 1.2 which is <a href="https://developers.cloudflare.com/ssl/reference/protocols/#decide-which-version-to-use"><u>recommended by PCI DSS</u></a>. This simplicity is highly appreciated by customers that are managing a growing set of assets being deployed across the organization.</p><p>To help shorten the time to resolution even further, we have recently added <a href="https://www.cloudflare.com/learning/access-management/role-based-access-control-rbac/"><u>role-based access control (RBAC)</u></a> to <a href="https://developers.cloudflare.com/security-center/security-insights/"><u>Security Insights</u></a> in the Cloudflare dashboard. Now for individual security practitioners, they have access to a distilled view of the insights that are relevant for their role. A user with an <a href="https://developers.cloudflare.com/fundamentals/setup/manage-members/roles/"><u>administrator role</u></a> (a CSO, for example) has access to, and visibility into, all insights.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/bnaU55Fi2z9bxUxl5pf7o/818043fbba2ae13c5a7c4cb25e5e7ebc/1.png" />
          </figure><p>In addition to account-wide Security Insights, we also provide posture overviews that are closer to the corresponding security configurations of your SaaS and web applications. Let’s dive into each of them.</p>
    <div>
      <h3>Securing your SaaS applications</h3>
      <a href="#securing-your-saas-applications">
        
      </a>
    </div>
    <p>Without centralized posture management, SaaS applications can feel like the security wild west. They contain a wealth of sensitive information – files, databases, workspaces, designs, invoices, or anything your company needs to operate, but control is limited to the vendor’s settings, leaving you with less visibility and fewer customization options. Moreover, team members are constantly creating, updating, and deleting content that can cause configuration drift and data exposure, such as sharing files publicly, adding PII to non-compliant databases, or giving access to third party integrations. With Cloudflare, you have visibility across your SaaS application fleet in one dashboard.</p>
    <div>
      <h4>Posture findings across your SaaS fleet</h4>
      <a href="#posture-findings-across-your-saas-fleet">
        
      </a>
    </div>
    <p>From the account-wide Security Insights, you can review insights for potential SaaS security issues:</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7JRKfYveWKayrMxdLxLvDB/1c3383209462917214ad9dc6584e98fe/2.png" />
          </figure><p>You can choose to dig further with <a href="https://developers.cloudflare.com/cloudflare-one/applications/casb/"><u>Cloud Access Security Broker (CASB)</u></a> for a thorough review of the misconfigurations, risks, and failures to meet best practices across your SaaS fleet. You can identify a wealth of security information including, but not limited to:</p><ul><li><p>Publicly available or externally shared files</p></li><li><p>Third-party applications with read or edit access</p></li><li><p>Unknown or anonymous user access</p></li><li><p>Databases with exposed credentials</p></li><li><p>Users without two-factor authentication</p></li><li><p>Inactive user accounts</p></li></ul><p>You can also explore the <i>Posture Findings </i>page, which provides easy searching and navigation across documents that are stored within the SaaS applications.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6skScbapgiG31w5qRoTCjG/ba3b069de8cce0c0bfcb9f011a2df954/3.png" />
          </figure><p>Additionally, you can create policies to prevent configuration drift in your environment. Prevention-based policies help maintain a secure configuration and compliance standards, while reducing alert fatigue for Security Operations teams, and these policies can prevent the inappropriate movement or exfiltration of sensitive data. Unifying controls and visibility across environments makes it easier to lock down regulated data classes, maintain detailed audit trails via logs, and improve your security posture to reduce the risk of breaches.</p>
    <div>
      <h4>How it works: new, real-time SaaS documents discovery</h4>
      <a href="#how-it-works-new-real-time-saas-documents-discovery">
        
      </a>
    </div>
    <p>Delivering SaaS security posture information to our customers requires collecting vast amounts of data from a wide range of platforms. In order to ensure that all the documents living in your SaaS apps (files, designs, etc.) are secure, we need to collect information about their configuration — are they publicly shared, do third-party apps have access, is <a href="https://www.cloudflare.com/learning/access-management/what-is-multi-factor-authentication/"><u>multi-factor authentication (MFA)</u></a> enabled? </p><p>We previously did this with crawlers, which would pull data from the SaaS APIs. However, we were plagued with rate limits from the SaaS vendors when working with larger datasets. This forced us to work in batches and ramp scanning up and down as the vendors permitted. This led to stale findings and would make remediation cumbersome and unclear – for example, Cloudflare would be reporting that a file is still shared publicly for a short period after the permissions were removed, leading to customer confusion.</p><p>To fix this, we upgraded our data collection pipeline to be dynamic and real-time, reacting to changes in your environment as they occur, whether it’s a new security finding, an updated asset, or a critical alert from a vendor. We started with our Microsoft asset discovery and <a href="https://developers.cloudflare.com/cloudflare-one/applications/casb/casb-integrations/microsoft-365/"><u>posture findings</u></a>, providing you real-time insight into your Microsoft Admin Center, OneDrive, Outlook, and SharePoint configurations. We will be rapidly expanding support to additional SaaS vendors going forward.</p>
    <div>
      <h5>Listening for update events from Cloudflare Workers</h5>
      <a href="#listening-for-update-events-from-cloudflare-workers">
        
      </a>
    </div>
    <p>Cloudflare Workers serve as the entry point for vendor webhooks, handling asset change notifications from external services. The workflow unfolds as follows:</p><ul><li><p><b>Webhook listener:</b> An initial Worker acts as the webhook listener, receiving asset change messages from vendors.</p></li><li><p><b>Data storage &amp; queuing:</b> Upon receiving a message, the Worker uploads the raw payload of the change notification to Cloudflare R2 for persistence, and publishes it to a Cloudflare Queue dedicated to raw asset changes.</p></li><li><p><b>Transformation Worker:</b> A second Worker, bound as a consumer to the raw asset change queue, processes the incoming messages. This Worker transforms the raw vendor-specific data into a generic format suitable for CASB. The transformed data is then:</p><ul><li><p>Stored in Cloudflare R2 for future reference.</p></li><li><p>Published on another Cloudflare Queue, designated for transformed messages.</p></li></ul></li></ul>
    <div>
      <h5>CASB Processing: Consumers &amp; Crawlers</h5>
      <a href="#casb-processing-consumers-crawlers">
        
      </a>
    </div>
    <p>Once the transformed messages reach the CASB layer, they undergo further processing:</p><ul><li><p><b>Polling consumer:</b> CASB has a consumer that polls the transformed message queue. Upon receiving a message, it determines the relevant handler required for processing.</p></li><li><p><b>Crawler execution:</b> The handler then maps the message to an appropriate crawler, which interacts with the vendor API to fetch the most up-to-date asset details.</p></li><li><p><b>Data storage:</b> The retrieved asset data is stored in the CASB database, ensuring it is accessible for security and compliance checks.</p></li></ul><p>With this improvement, we are now processing 10 to 20 Microsoft updates per second, or 864,000 to 1.72 million updates daily, giving customers incredibly fast visibility into their environment. Look out for expansion to other SaaS vendors in the coming months. </p>
    <div>
      <h3>Securing your web applications</h3>
      <a href="#securing-your-web-applications">
        
      </a>
    </div>
    <p>A unique challenge of securing web applications is that no one size fits all. An asset-aware posture management bridges the gap between a universal security solution and unique business needs, offering tailored recommendations for security teams to protect what matters.</p>
    <div>
      <h4>Posture overview from attacks to threats and risks</h4>
      <a href="#posture-overview-from-attacks-to-threats-and-risks">
        
      </a>
    </div>
    <p>Starting today, all Cloudflare customers have access to Security Overview, a new landing page customized for each of your onboarded domains. This page aggregates and prioritizes security suggestions across all your web applications:</p><ol><li><p>Any (ongoing) attacks detected that require immediate attention</p></li><li><p>Disposition (mitigated, served by Cloudflare, served by origin) of all proxied traffic over the last 7 days</p></li><li><p>Summary of currently active security modules that are detecting threats</p></li><li><p>Suggestions of how to improve your security posture with a step-by-step guide</p></li><li><p>And a glimpse of your most active and lately updated security rules</p></li></ol>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3YhmhUZbZbAIZryUuTodpV/2b9563ac7768348bb4be46abc5fef7b3/4.png" />
          </figure><p>These tailored security suggestions are surfaced based on your traffic profile and business needs, which is made possible by discovering your proxied web assets.</p>
    <div>
      <h4>Discovery of web assets</h4>
      <a href="#discovery-of-web-assets">
        
      </a>
    </div>
    <p>Many web applications, regardless of their industry or use case, require similar functionality: user identification, accepting payment information, etc. By discovering the assets serving this functionality, we can build and run targeted threat detection to protect them in depth.</p><p>As an example, bot traffic towards marketing pages versus login pages have different business impacts. Content scraping may be happening targeting your marketing materials, which you may or may not want to allow, while credential stuffing on your login page deserves immediate attention.</p><p>Web assets are described by a list of endpoints; and labelling each of them defines their business goals. A simple example can be <code>POST</code> requests to path <code>/portal/login</code>, which likely describes an API for user authentication. While the <code>GET</code> requests to path <code>/portal/login</code> denote the actual login webpage.</p><p>To describe business goals of endpoints, labels come into play. <code>POST</code> requests to the <code>/portal/login</code> endpoint serving end users and to the<code> /api/admin/login</code> endpoint used by employees can both can be labelled using the same <code>cf-log-in</code> <a href="https://developers.cloudflare.com/api-shield/management-and-monitoring/endpoint-labels/#managed-labels"><u>managed label</u></a>, letting Cloudflare know that usernames and passwords would be expected to be sent to these endpoints.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7jFh9mc7hyryXHIqeQwS9U/25ba022282b43cff9f09700d0ae81c76/5.png" />
          </figure><p>API Shield customers can already make use of <a href="https://developers.cloudflare.com/api-shield/management-and-monitoring/endpoint-labels/"><u>endpoint labelling</u></a>. In early Q2 2025, we are adding label discovery and suggestion capabilities, starting with three labels, <code>cf-log-in</code>, <code>cf-sign-up</code>, and <code>cf-rss-feed</code>. All other customers can manually add these labels to the <a href="https://developers.cloudflare.com/api-shield/management-and-monitoring/"><u>saved endpoints</u></a>. One example, explained below, is preventing disposable emails from being used during sign-ups. </p>
    <div>
      <h4>Always-on threat detection and risk assessment</h4>
      <a href="#always-on-threat-detection-and-risk-assessment">
        
      </a>
    </div>
    
    <div>
      <h5>Use-case driven threat detection</h5>
      <a href="#use-case-driven-threat-detection">
        
      </a>
    </div>
    <p>Customers told us that, with the growing excitement around generative AI, they need support to secure this new technology while not hindering innovation. Being able to discover LLM-powered services allows fine-tuning security controls that are relevant for this particular technology, such as inspecting prompts, limit prompting rates based on token usage, etc. In a separate Security Week blog post, we will share how we build Cloudflare Firewall for AI, and how you can easily protect your generative AI workloads.</p><p>Account fraud detection, which encompasses multiple attack vectors, is another key area that we are focusing on in 2025.</p><p>On many login and signup pages, a <a href="https://www.cloudflare.com/learning/bots/how-captchas-work/"><u>CAPTCHA</u></a> solution is commonly used to only allow human beings through, assuming only bots perform undesirable actions. Put aside that most visual CAPTCHA puzzles can be easily <a href="https://arstechnica.com/ai/2024/09/ai-defeats-traffic-image-captcha-in-another-triumph-of-machine-over-man/"><u>solved by AI</u></a> nowadays, such an approach cannot effectively solve the <i>root cause</i> of most account fraud vectors. For example, human beings using disposable emails to sign up single-use accounts to take advantage of signup promotions.</p><p>To solve this fraudulent sign up issue, a security rule currently under development could be deployed as below to block all attempts that use disposable emails as a user identifier, regardless of whether the requester was automated or not. All existing or future <code>cf-log-in</code> and <code>cf-sign-up</code> labelled endpoints are protected by this single rule, as they both require user identification.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7sJzdnjp9UWrp35Hd3SsGB/db0959b457c555a4a1e93e5515a1e61f/6.png" />
          </figure><p>Our fast expanding use-case driven threat detections are all running by default, from the first moment you onboarded your traffic to Cloudflare. The instant available detection results can be reviewed through security analytics, helping you make swift informed decisions.</p>
    <div>
      <h5>API endpoint risk assessment</h5>
      <a href="#api-endpoint-risk-assessment">
        
      </a>
    </div>
    <p>APIs have their own set of risks and vulnerabilities, and today Cloudflare is delivering seven new risk scans through API Posture Management. This new capability of API Shield helps reduce risk by identifying security issues and fixing them early, before APIs are attacked. Because APIs are typically made up of many different backend services, security teams need to pinpoint which backend service is vulnerable so that development teams may remediate the identified issues.</p><p>Our new API posture management risk scans do exactly that: users can quickly identify which API endpoints are at risk to a number of vulnerabilities, including sensitive data exposure, authentication status, <a href="https://owasp.org/API-Security/editions/2023/en/0xa1-broken-object-level-authorization/"><u>Broken Object Level Authorization (BOLA)</u></a> attacks, and more.</p><p>Authentication Posture is one risk scan you’ll see in the new system. We focused on it to start with because sensitive data is at risk when API authentication is assumed to be enforced but is actually broken. <a href="https://developers.cloudflare.com/api-shield/security/authentication-posture/"><u>Authentication Posture</u></a> helps customers identify authentication misconfigurations for APIs and alerts of their presence. This is achieved by scanning for successful requests against the API and noting their authentication status. API Shield scans traffic daily and labels API endpoints that have missing and mixed authentication for further review.</p><p>For customers that have configured session IDs in API Shield, you can find the new risk scan labels and authentication details per endpoint in API Shield. Security teams can take this detail to their development teams to fix the broken authentication.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/21jVSrwsgfjKlyxyOZ5Qye/7963d95ea28a41f5e2b4f331ab5d5060/7.png" />
          </figure><p>We’re launching today with <a href="https://developers.cloudflare.com/api-shield/management-and-monitoring/endpoint-labels/"><u>scans</u></a> for authentication posture, sensitive data, underprotected APIs, BOLA attacks, and anomaly scanning for API performance across errors, latency, and response size.</p>
    <div>
      <h3>Simplify maintaining a good security posture with Cloudflare</h3>
      <a href="#simplify-maintaining-a-good-security-posture-with-cloudflare">
        
      </a>
    </div>
    <p>Achieving a good security posture in a fast-moving environment requires innovative solutions that can transform complexity into simplicity. Bringing together the ability to continuously assess threats and risks across both public and private IT environments through a single platform is our first step in supporting our customers’ efforts to maintain a healthy security posture.</p><p>To further enhance the relevance of security insights and suggestions provided and help you better prioritize your actions, we are looking into integrating Cloudflare’s global view of threat landscapes. With this, you gain additional perspectives, such as what the biggest threats to your industry are, and what attackers are targeting at the current moment. Stay tuned for more updates later this year.</p><p>If you haven’t done so yet, <a href="https://dash.cloudflare.com/?to=/:account/security-center"><u>onboard your SaaS and web applications</u></a> to Cloudflare today to gain instant insights into how to improve your business’s security posture.</p> ]]></content:encoded>
            <category><![CDATA[Security Week]]></category>
            <category><![CDATA[Security Posture Management]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Security Center]]></category>
            <category><![CDATA[SAAS Security]]></category>
            <category><![CDATA[Application Security]]></category>
            <category><![CDATA[API Security]]></category>
            <category><![CDATA[Email Security]]></category>
            <guid isPermaLink="false">41Rkgr3IVvWI5n1DpmMDkJ</guid>
            <dc:creator>Zhiyuan Zheng</dc:creator>
            <dc:creator>Noelle Kagan</dc:creator>
            <dc:creator>John Cosgrove</dc:creator>
            <dc:creator>Frank Meszaros</dc:creator>
            <dc:creator>Yugesha Sapte</dc:creator>
        </item>
        <item>
            <title><![CDATA[Email Security now available for free for political parties and campaigns through Cloudflare for Campaigns]]></title>
            <link>https://blog.cloudflare.com/email-security-now-available-for-free-for-political-parties-and-campaigns/</link>
            <pubDate>Mon, 17 Mar 2025 13:00:00 GMT</pubDate>
            <description><![CDATA[ We’re excited to announce that Cloudflare for Campaigns now includes Email Security, adding an extra layer of protection to email systems that power political campaigns. ]]></description>
            <content:encoded><![CDATA[ <p>At Cloudflare, we believe that every political candidate — regardless of their affiliation — should be able to run their campaign without the constant worry of cyber attacks. Unfortunately, malicious actors, such as nation-states, financially motivated attackers, and hackers, are often looking to disrupt campaign operations and messaging. These threats have the potential to interfere with the democratic process, weaken public confidence, and cause operational challenges for campaigns of all scales.</p><p>In 2020, in partnership with the non-profit, non-partisan <a href="https://defendcampaigns.org/"><u>Defending Digital Campaigns</u> </a>(DDC), we launched <a href="https://www.cloudflare.com/campaigns/usa/"><u>Cloudflare for Campaigns</u></a> to offer a free package of cybersecurity tools to political campaigns, especially smaller ones with limited resources. Since then, we have helped over 250 political campaigns and parties across the US, regardless of affiliation.</p><p>This is why we are excited to announce that we have extended our Cloudflare for Campaigns product suite to include <a href="https://www.cloudflare.com/zero-trust/products/email-security/"><u>Email Security</u></a>, to secure email systems that are essential to safeguarding the integrity and success of a political campaign. By preventing phishing, spoofing, and other email threats, it helps protect candidates, staff, and supporters from cyberattacks that could compromise sensitive data.</p>
    <div>
      <h3>The front line of protection is email security  </h3>
      <a href="#the-front-line-of-protection-is-email-security">
        
      </a>
    </div>
    <p><a href="https://www.cloudflare.com/learning/access-management/phishing-attack/"><u>Phishing attacks</u></a> on political campaigns have been a major cybersecurity threat in recent years, often leading to data breaches, leaks, and misinformation. In 2016,<a href="https://www.washingtonpost.com/world/national-security/how-the-russians-hacked-the-dnc-and-passed-its-emails-to-wikileaks/2018/07/13/af19a828-86c3-11e8-8553-a3ce89036c78_story.html"> <u>attackers targeted</u></a> Democratic National Committee (DNC) staff with <a href="https://www.cloudflare.com/learning/access-management/spear-phishing/"><u>spear phishing emails</u></a> disguised as Google security alerts, allowing hackers to access thousands of emails. In 2018, Russian intelligence agents<a href="https://www.npr.org/2018/07/26/632897181/russian-agents-unsuccessfully-tried-to-hack-sen-claire-mccaskills-campaign"> <u>attempted to infiltrate</u></a> Senator Claire McCaskill's re-election campaign by sending emails to her staff, urging them to change their passwords. </p><p>This unsettling trend has affected political parties as well. In 2020, the Republican Party of Wisconsin fell <a href="https://cyberscoop.com/wisconsin-gop-alleges-late-race-hack-cost-party-2-3-million-from-fund-to-reelect-trump/"><u>victim to a phishing attack</u></a> that resulted in hackers stealing $2.3 million. </p><p>During the<a href="https://blog.cloudflare.com/securing-the-inboxes-of-democracy/"> <u>2022 US midterm elections</u></a>, Cloudflare safeguarded the email inboxes of more than 100 campaigns, election officials, and public organizations involved in the election process. These ranged from first-time candidates in local races to seasoned incumbents at the national level. In the three months leading up to the 2022 midterms, Cloudflare processed over 20 million emails and successfully blocked around 150,000 phishing attempts targeting campaign staff. </p><p>During the <a href="https://blog.cloudflare.com/exploring-internet-traffic-shifts-and-cyber-attacks-during-the-2024-us-election/"><u>2024 US election</u></a>, we actively protected state and local election offices, political campaigns, state parties, independent media, and voting rights organizations. In addition, we safeguarded the inboxes of hundreds of political campaigns, ensuring secure and uninterrupted communications to help campaigns focus on their message and outreach without the fear of cyberattack derailing their efforts. Over the course of the year, Cloudflare:</p><ul><li><p>Scanned 5.7 million emails for campaigns and political parties </p></li><li><p>Blocked 400,000 malicious messages before they reached campaign staff and teams</p></li><li><p>Detected and blocked 21,000 suspicious emails</p></li><li><p>Prevented 14,000 unique spoofing attempts</p></li></ul>
    <div>
      <h3>Providing tools to help political campaigns and parties stay secure online </h3>
      <a href="#providing-tools-to-help-political-campaigns-and-parties-stay-secure-online">
        
      </a>
    </div>
    <p>We launched <a href="https://blog.cloudflare.com/introducing-cloudflare-for-campaigns/"><u>Cloudflare for Campaigns in 2020</u></a> to help political campaigns stay online amid cyber attacks. US campaign finance laws prohibit corporations from donating money or services to federal candidates or parties. However, we partner with Defending Digital Campaigns (DDC), approved by the Federal Election Commission, to offer free and discounted cybersecurity services. Through DDC, we provide tailored security solutions for resource-limited campaigns and parties facing heightened cyber threats.</p><blockquote><p><i>"DDC is thrilled that Cloudflare is expanding their product offerings to campaigns with the addition of Email Security. This will expedite robust protections from the real and serious threats posed by phishing. Now campaigns, in concert with the DDoS protection Cloudflare provides via Cloudflare for Campaigns, will be able to easily enable a suite of core protections. This new offering further exemplifies Cloudflare's extraordinary and generous commitment to protecting campaigns. Cloudflare has been one of DDC’s core partners since we were founded."</i><i><b>  </b></i><b>– Michael Kaiser, President &amp; CEO of Defending Digital Campaigns</b></p></blockquote><p>Over five years, our partnership has strengthened protections against DDoS attacks and web vulnerabilities. However, campaigns have frequently asked for help combating malicious emails that target campaign staff. </p><p><a href="https://www.cloudflare.com/press-releases/2022/cloudflare-to-acquire-area-1-security/"><u>Cloudflare acquired Area 1 Security in 2022</u></a> to enhance its Zero Trust platform by integrating an email security solution that proactively identifies and blocks phishing threats before they reach users' inboxes. Before the acquisition, Area 1 provided low-cost email security to political campaigns with direct FEC approval. </p><p>Fast-forward to 2025, and we are excited to officially integrate Email Security into our full Cloudflare for Campaigns portfolio to better protect US political parties and campaigns.</p>
    <div>
      <h3>Access free Email Security for your political campaign or party with Cloudflare for Campaigns </h3>
      <a href="#access-free-email-security-for-your-political-campaign-or-party-with-cloudflare-for-campaigns">
        
      </a>
    </div>
    <p>Under this program, <a href="https://www.cloudflare.com/zero-trust/products/email-security/"><u>Cloudflare Email Security</u></a> is available starting today and includes: </p><ul><li><p><b>Phishing protection</b>: AI-powered threat detection that automatically identifies and blocks malicious emails before they reach their target</p></li><li><p><b>Email authentication</b>: Built-in support for <a href="https://www.cloudflare.com/learning/email-security/dmarc-dkim-spf/"><u>DMARC, DKIM, and SPF</u></a> to prevent email spoofing</p></li><li><p><b>Real-time monitoring</b>: Continuous scanning for suspicious activities and anomalies</p></li><li><p><b>Seamless integration</b>: Easily integrates with existing email providers without disrupting workflows</p></li><li><p><b>Insightful reporting</b>: Actionable analytics and reports to track security events and improve defenses</p></li></ul><p>At Cloudflare, we are committed to helping build a better Internet — one where election campaigns can operate securely, free from the threat of cyber attacks. </p><p>Current campaigns and political parties that are protected under Cloudflare for Campaigns will receive an email with information on how to enable Email Security. If you are a campaign or a political party interested in applying for the project to get access to the full suite of products, please visit <a href="https://www.cloudflare.com/campaigns/usa/"><u>https://www.cloudflare.com/campaigns/usa</u></a>.</p> ]]></content:encoded>
            <category><![CDATA[Security Week]]></category>
            <category><![CDATA[Impact]]></category>
            <category><![CDATA[Email Security]]></category>
            <category><![CDATA[Policy & Legal]]></category>
            <guid isPermaLink="false">1vrjPL7SVTINpzIEqARhsx</guid>
            <dc:creator>Jocelyn Woolbright</dc:creator>
            <dc:creator>Ayush Kumar</dc:creator>
        </item>
        <item>
            <title><![CDATA[The role of email security in reducing user risk amid rising threats]]></title>
            <link>https://blog.cloudflare.com/the-role-of-email-security-in-reducing-user-risk-amid-rising-threats/</link>
            <pubDate>Thu, 19 Dec 2024 14:00:00 GMT</pubDate>
            <description><![CDATA[ As threats evolve, SOC teams must adapt their operations. With Cloudflare’s holistic approach to managing user-based risk, SOC teams can operate more efficiently and reduce the likelihood of a breach. ]]></description>
            <content:encoded><![CDATA[ <p>Phishing remains one of the most dangerous and persistent cyber threats for individuals and organizations. Modern attacks use a growing arsenal of deceptive techniques that bypass traditional <a href="https://www.cloudflare.com/en-gb/learning/email-security/secure-email-gateway-seg/"><u>secure email gateways (SEGs)</u></a> and email authentication measures, targeting organizations, employees, and vendors. From <a href="https://www.cloudflare.com/learning/email-security/business-email-compromise-bec/"><u>business email compromise (BEC)</u></a> to <a href="https://www.cloudflare.com/en-gb/learning/security/what-is-quishing/"><u>QR phishing</u></a> and <a href="https://www.cloudflare.com/en-gb/learning/access-management/account-takeover/"><u>account takeovers</u></a>, these threats are designed to exploit weaknesses across multiple communication channels, including email, Slack, Teams, SMS, and cloud drives.</p><p>Phishing remains the most popular attack vector for bad actors looking to gain unauthorized access or extract fraudulent payment, and it is <a href="https://blog.cloudflare.com/2023-phishing-report/"><u>estimated</u></a> that 90% of all attacks <a href="https://www.cisa.gov/shields-guidance-families"><u>start</u></a> with a <a href="https://www.cloudflare.com/learning/access-management/phishing-attack/"><u>phishing</u></a> email. However, as companies have shifted to using a multitude of apps to support communication and collaboration, attackers too have evolved their approach. Attackers now engage employees across a combination of channels in an attempt to build trust and pivot targeted users to less-secure apps and devices. Cloudflare is uniquely positioned to address this trend thanks to our integrated <a href="https://www.cloudflare.com/zero-trust/"><u>Zero Trust</u></a> services, extensive visibility from protecting <a href="https://w3techs.com/technologies/overview/proxy/all"><u>approximately 20% of all websites</u></a>, and signals derived from processing billions of email messages a year.</p><p>Cloudflare recognizes that combating phishing requires an integrated approach and a more complete view of user-based risk. That’s why we’ve designed our email security solution to protect organizations before, during, and after message delivery, while also extending protection beyond email into the broader security ecosystem. Phishing is no longer just an email problem — it’s a multi-channel, cross-application threat.</p>
    <div>
      <h2>Assessing holistic user risk</h2>
      <a href="#assessing-holistic-user-risk">
        
      </a>
    </div>
    <p>When it comes to protecting against user-based threats, Cloudflare employs a platform approach to security. Instead of forcing customers to rely on an array of fragmented tools that create unnecessary complexity and blind spots, we treat email security as part of an overall strategy for assessing and responding to user-related risk. Our email security solution works in tandem with our network solutions so that SOC teams can quickly assert what actions their users are performing outside of email. Given our extensive network visibility, our platform is not limited by API integrations, and can provide SOC teams with the best visibility and protection. This helps SOC teams not only combat phishing, but begin to identify and take action against a wider range of insider threats.</p><p>Within a single, unified dashboard, SOC teams can quickly review detailed information regarding the following questions, which we discuss in more detail below: </p><ol><li><p>Who in the organization is being targeted?</p></li><li><p>Who are the attackers impersonating?</p></li><li><p>What risky behaviors are my users performing?</p></li></ol>
    <div>
      <h3>Who in the organization is being targeted?</h3>
      <a href="#who-in-the-organization-is-being-targeted">
        
      </a>
    </div>
    
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7hCZ0UXnPA7Wx5iBHxkfjE/47a143332f6c22c7e11b568b43dfdd74/BLOG-2645_2.png" />
          </figure><p>Within the Cloudflare dashboard, SOC teams can view which users are the most targeted. This can help them determine which accounts should be hardened (e.g. MFA enforced), and identify risky users that should be monitored more closely for significant deviations in behavior. One way organizations can use this information is to require high-risk users to connect from a managed device. For instance, if they use Crowdstrike, <a href="https://developers.cloudflare.com/cloudflare-one/identity/devices/service-providers/crowdstrike/"><u>we can require that these users be on a managed device</u></a> and force a posture check before letting them access sensitive applications. </p><p>SOC teams can also dive into what types of attacks are hitting their users and at what frequency.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2nVgW0EXy3qzC2hDBeJRAx/5cf8408ec72339fe8985019629912cbb/BLOG-2645_3.png" />
          </figure><p>Customers can use these insights to adjust various platform policies, effectively blocking malicious content and securing sensitive resources. Above, we can see that attackers are frequently leveraging links to try to compromise users. Based on the link analysis we are seeing in email, SOC teams can use our gateway to block similar attacks, so that when attackers try to use other communication methods (LinkedIn, Teams, Slack, etc.) users will not be able to interact with those links.</p><p>To learn more about stopping these types of multichannel phishing attacks, please see our blog post, <a href="https://blog.cloudflare.com/a-wild-week-in-phishing-and-what-it-means-for-you/"><i><u>A wild week in phishing, and what it means for you</u></i></a><i>.</i></p>
    <div>
      <h3>Who are the attackers impersonating?</h3>
      <a href="#who-are-the-attackers-impersonating">
        
      </a>
    </div>
    
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/16lvS6lNsi4TuSgtMFqBtk/b093ecb444def1bd06fb84566b5eb05a/BLOG-2645_4.png" />
          </figure><p>SOC teams can also get visibility into impersonation attempts within their email environment. Customers can see which users are being impersonated the most, and can use this information to build policies within our email security solution and broader set of Zero Trust services.</p><p>A list of frequently impersonated users can be added to the <a href="https://developers.cloudflare.com/cloudflare-one/email-security/detection-settings/impersonation-registry/"><u>impersonation registry</u></a>, which changes the sensitivity of our models to apply more scrutiny on messages coming from those users. </p><p>Given our unique position as a <a href="https://www.cloudflare.com/products/registrar/"><u>domain name registrar</u></a>, customers can also report lookalike domains to Cloudflare for action to be taken against them. This helps prevent attackers from being able to impersonate our customers and negatively impact their reputation. </p><p>Finally, customers can also use our free <a href="https://developers.cloudflare.com/dmarc-management/"><u>DMARC management</u></a> to track who is sending emails on their behalf. This information can be used to update <a href="https://www.cloudflare.com/en-gb/learning/dns/dns-records/dns-spf-record/"><u>SPF records</u></a> and get customers to <code>p=quarantine</code> or <code>p=reject</code> so that their brand is more resistant to being spoofed. </p>
    <div>
      <h3>What risky behaviors are my users performing?</h3>
      <a href="#what-risky-behaviors-are-my-users-performing">
        
      </a>
    </div>
    <p>Cloudflare provides visibility into user actions in several ways. </p><p>Within the email security solution, we can track internal messages and alert if we see any malicious or suspicious behaviors. This can be enhanced with our managed service offering, <a href="https://developers.cloudflare.com/cloudflare-one/email-security/phish-guard/"><u>Phishguard</u></a>, which can alert admins when they see any type of behavior that indicates fraud (like Business Email Compromise), account takeover, or insider threats.</p><p>SOC teams can also take advantage of our <a href="https://www.cloudflare.com/en-gb/zero-trust/products/casb/"><u>CASB solution</u></a> to view the different actions that users have performed. Actions are labeled with different risk levels to let teams know which findings are critical and require remediation. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7aiDl5Qo2PGsGYF7NfYcDT/dc49eb88beffc7b9df099d71244489c9/BLOG-2645_5.png" />
          </figure><p>Customers are also able to view data loss prevention (<a href="https://www.cloudflare.com/en-gb/zero-trust/products/dlp/"><u>DLP</u></a>) violations that users have incurred to see if there is any unauthorized egress of data. We provide the ability to automatically block this egress based on different policies within our platform, making sure there is no exfiltration of sensitive data.</p><p>We also enable organizations to put internal applications behind our <a href="https://www.cloudflare.com/en-gb/zero-trust/products/access/"><u>Access</u></a> solution. This prevents any users with improper permissions or a high risk level from accessing critical applications. Our dashboard then provides metrics on these logins to see how many failures we observed, so that SOC teams can investigate the user further. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/34LnlEK1lkpbeW5mYLSl8m/5d51092b134bfd7e2d6093a04fcfdc60/BLOG-2645_6.png" />
          </figure><p>These signals feed into our <a href="https://blog.cloudflare.com/unified-risk-posture/"><u>Unified Risk Score</u></a>, which can be exported if needed to take automated actions within other platforms.</p>
    <div>
      <h2>Increasing SOC productivity</h2>
      <a href="#increasing-soc-productivity">
        
      </a>
    </div>
    <p>With all of our functionality unified within a single interface and fed by one data lake, we see an increase in SOC productivity because teams no longer have to spend time building rules or flipping between disparate interfaces and workflows. </p>
    <div>
      <h3>AI-driven email security</h3>
      <a href="#ai-driven-email-security">
        
      </a>
    </div>
    <p>Unlike legacy secure email gateways, our email security solution is driven by predictive AI models which eliminate the need for creating and updating rules. These models are also more effective than reactive measures because they are fed by a massive volume of diverse data from across Cloudflare’s network. This means models are trained on emerging threats earlier and can identify new tactics with a higher accuracy than legacy systems. </p>
    <div>
      <h3>Automated isolation</h3>
      <a href="#automated-isolation">
        
      </a>
    </div>
    <p>To further reduce the risk posed by users visiting potentially malicious websites, customers can isolate browser sessions using our natively integrated, clientless remote browser that runs on our <a href="https://www.cloudflare.com/network"><u>global network</u></a>. Within an isolated browsing session, SOC teams can prohibit various behaviors such as copy/paste, upload/download, keyboard inputs, and more. This decreases the risk of users accessing a website and performing an action which could compromise the organization.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/65YXZvV78mjzNXvV4YLJRD/b0ef76d80edd7769a23d877ffdc25696/BLOG-2645_7.png" />
          </figure><p>Our browser isolation solution also decreases the time SOC teams need to maintain policies. Rather than adding domains and applications one by one, teams can choose to isolate based on content categories. These categories are based on our threat intelligence, and are constantly updated. This means that as new websites emerge, SOC teams do not have to spend the time to chase down and update the proper policy — rather, it is done automatically. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2aCMZRmIRp33YbGTU5Vxt6/44ca92e4e3cde07b1424b9875311dd59/BLOG-2645_8.png" />
          </figure>
    <div>
      <h3>Automated blocking</h3>
      <a href="#automated-blocking">
        
      </a>
    </div>
    <p>While some websites might require running in an isolated browser to mitigate the risk of users encountering malicious content, others may need to be fully blocked altogether. Customers can use the same process listed above to block any website that could be risky for users based on tags. However, we allow admins to also provide feedback to users to increase awareness. This can be done via a <a href="https://developers.cloudflare.com/cloudflare-one/policies/gateway/block-page/"><u>custom block page</u></a> that allows SOC teams to communicate with users about their risky behaviors, so that they take actions to curb this behavior in the future and alert their SOC teams to attacks that might be occurring. </p>
    <div>
      <h2>What's on the horizon for 2025</h2>
      <a href="#whats-on-the-horizon-for-2025">
        
      </a>
    </div>
    <p>In 2024, our email security team focused on refining the user interface and improving the incident investigation experience. Looking ahead to 2025, we plan to introduce additional capabilities that deepen the integration of our email security solution with our <a href="https://www.cloudflare.com/learning/access-management/what-is-sase/">SASE</a> platform, delivering enhanced insight and protection against user-based threats. </p>
    <div>
      <h3>Configurable browser isolation for email</h3>
      <a href="#configurable-browser-isolation-for-email">
        
      </a>
    </div>
    <p>Our Email Link Isolation feature currently applies to links we consider suspicious. However, we intend to allow customers to add customized configurations to meet their internal policies. This enhancement will provide more granular control over which websites users can access from an email message without using an isolated browser. </p>
    <div>
      <h3>Outbound DLP for email</h3>
      <a href="#outbound-dlp-for-email">
        
      </a>
    </div>
    <p>We will be releasing an add-in for Microsoft Outlook that will allow customers to use our DLP engine for inspecting outbound email messages. This client-side application enables customers to configure downstream policies that trigger action when a DLP policy is violated, all while minimizing disruption to existing email infrastructure. </p>
    <div>
      <h3>Expanded user risk scoring</h3>
      <a href="#expanded-user-risk-scoring">
        
      </a>
    </div>
    <p>Cloudflare will be increasing the signals that feed into our user risk scores. This will enable SOC teams to create more policies within Cloudflare or to take automated actions externally based on the level of risk observed. </p><p>These are just a few examples of significant releases that will be coming in 2025. Please stay tuned to the Cloudflare blog where we will be announcing these releases as they happen. </p>
    <div>
      <h2>Try Cloudflare Email Security today</h2>
      <a href="#try-cloudflare-email-security-today">
        
      </a>
    </div>
    <p>We provide all organizations (whether a Cloudflare customer or not) with free access to our <a href="https://blog.cloudflare.com/threats-lurking-office-365-cloudflare-email-retro-scan/"><u>Retro Scan</u></a> tool, allowing them to use our predictive AI models to scan existing inbox messages. Retro Scan will detect and highlight any threats found, enabling organizations to remediate them directly in their email accounts. With these insights, organizations can implement further controls, either using Cloudflare Email Security or their preferred solution, to prevent similar threats from reaching their inboxes in the future.</p> ]]></content:encoded>
            <category><![CDATA[Cloud Email Security]]></category>
            <category><![CDATA[SASE]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[Email Security]]></category>
            <guid isPermaLink="false">4fVFiDpaCJhYAFUvAocDDC</guid>
            <dc:creator>Ayush Kumar</dc:creator>
            <dc:creator>Justin Knapp</dc:creator>
        </item>
        <item>
            <title><![CDATA[Cloudflare acquires Kivera to add simple, preventive cloud security to Cloudflare One ]]></title>
            <link>https://blog.cloudflare.com/cloudflare-acquires-kivera/</link>
            <pubDate>Tue, 08 Oct 2024 13:00:00 GMT</pubDate>
            <description><![CDATA[ The acquisition of Kivera broadens the scope of Cloudflare’s SASE platform beyond just apps, incorporating increased cloud security through proactive configuration management of cloud services.  ]]></description>
            <content:encoded><![CDATA[ <p>We’re excited to announce that <a href="https://www.kivera.io/"><u>Kivera</u></a>, a cloud security, data protection, and compliance company, has joined Cloudflare. This acquisition extends our SASE portfolio to incorporate inline cloud app controls, empowering <a href="https://www.cloudflare.com/zero-trust/"><u>Cloudflare One</u></a> customers with preventative security controls for all their cloud services.</p><p>In today’s digital landscape, cloud services and SaaS (software as a service) apps have become indispensable for the daily operation of organizations. At the same time, the amount of data flowing between organizations and their cloud providers has ballooned, increasing the chances of data leakage, compliance issues, and worse, opportunities for attackers. Additionally, many companies — especially at enterprise scale — are working directly with multiple cloud providers for flexibility based on the strengths, resiliency against outages or errors, and cost efficiencies of different clouds. </p><p>Security teams that rely on <a href="https://www.cloudflare.com/learning/cloud/what-is-cspm/"><u>Cloud Security Posture Management (CSPM)</u></a> or similar tools for monitoring cloud configurations and permissions and Infrastructure as code (IaC) scanning are falling short due to detecting issues only after misconfigurations occur with an overwhelming volume of alerts. The combination of Kivera and Cloudflare One puts preventive controls directly into the deployment process, or ‘inline’, blocking errors before they happen. This offers a proactive approach essential to protecting cloud infrastructure from evolving cyber threats, <a href="https://www.cloudflare.com/learning/cloud/what-is-dspm/">maintaining data security</a>, and accelerating compliance. </p>
    <div>
      <h2>An early warning system for cloud security risks </h2>
      <a href="#an-early-warning-system-for-cloud-security-risks">
        
      </a>
    </div>
    <p>In a significant leap forward in cloud security, the combination of Kivera’s technology and Cloudflare One adds preventive, inline controls to enforce secure configurations for cloud resources. By inspecting cloud API traffic, these new capabilities equip organizations with enhanced visibility and granular controls, allowing for a proactive approach in mitigating risks, managing cloud security posture, and embracing a streamlined DevOps process when deploying cloud infrastructure.</p><p>Kivera will add the following capabilities to Cloudflare’s <a href="https://www.cloudflare.com/learning/access-management/what-is-sase/"><u>SASE</u></a> platform:</p><ul><li><p><b>One-click security:</b> Customers benefit from immediate prevention of the most common cloud breaches caused by misconfigurations, such as accidentally allowing public access or policy inconsistencies.</p></li><li><p><b>Enforced cloud tenant control:</b> Companies can easily draw boundaries around their cloud resources and tenants to ensure that sensitive data stays within their organization. </p></li><li><p><b>Prevent data exfiltration:</b> Easily set rules to prevent data being sent to unauthorized locations.</p></li><li><p><b>Reduce ‘shadow’ cloud infrastructure:</b> Ensure that every interaction between a customer and their cloud provider is in line with preset standards. </p></li><li><p><b>Streamline cloud security compliance:</b> Customers can automatically assess and enforce compliance against the most common regulatory frameworks.</p></li><li><p><b>Flexible DevOps model:</b> Enforce bespoke controls independent of public cloud setup and deployment tools, minimizing the layers of lock-in between an organization and a cloud provider.</p></li><li><p><b>Complementing other cloud security tools:</b> Create a first line of defense for cloud deployment errors, reducing the volume of alerts for customers also using CSPM tools or <a href="https://www.cloudflare.com/learning/cloud/cnapp/">Cloud Native Application Protection Platforms (CNAPPs)</a>. </p></li></ul>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7nALx5Qv8FBYxn1R6RkUvX/1b3dddb60d9d85142a9fda82d2eee381/BLOG-2592_2.png" />
          </figure><p><sub><i>An intelligent proxy that uses a policy-based approach to 
enforce secure configuration of cloud resources.</i></sub></p>
    <div>
      <h2>Better together with Cloudflare One</h2>
      <a href="#better-together-with-cloudflare-one">
        
      </a>
    </div>
    <p>As a SASE platform, Cloudflare One ensures safe access and provides data controls for cloud and SaaS apps. This integration broadens the scope of Cloudflare’s SASE platform beyond user-facing applications to incorporate increased cloud security through proactive configuration management of infrastructure services, beyond what CSPM and <a href="https://www.cloudflare.com/learning/access-management/what-is-a-casb/"><u>CASB</u></a> solutions provide. With the addition of Kivera to Cloudflare One, customers now have a unified platform for all their inline protections, including cloud control, access management, and threat and data protection. All of these features are available with single-pass inspection, which is <a href="https://blog.cloudflare.com/network-performance-update-cio-edition/?_ga=2.241337794.1947644748.1710771073-1224524116.1709647459"><u>50% faster</u></a> than <a href="https://www.cloudflare.com/learning/access-management/what-is-a-secure-web-gateway/"><u>Secure Web Gateway (SWG)</u></a> alternatives.  </p><p>With the earlier <a href="https://blog.cloudflare.com/cloudflare-acquires-bastionzero/"><u>acquisition of BastionZero</u></a>, a Zero Trust infrastructure access company, Cloudflare One expanded the scope of its VPN replacement solution to cover infrastructure resources as easily as it does apps and networks. Together Kivera and BastionZero enable centralized security management across hybrid IT environments, and provide a modern DevOps-friendly way to help enterprises connect and protect their hybrid infrastructure with Zero Trust best practices.</p><p>Beyond its SASE capabilities, Cloudflare One is integral to <a href="https://www.cloudflare.com/connectivity-cloud/"><u>Cloudflare’s connectivity cloud</u></a>, enabling organizations to consolidate IT security tools on a single platform. This simplifies secure access to resources, from developer privileged access to technical infrastructure and expanding cloud services. As <a href="https://www.cloudflare.com/lp/forrester-wave-sse-2024/"><u>Forrester echoes</u></a>, “Cloudflare is a good choice for enterprise prospects seeking a high-performance, low-maintenance, DevOps-oriented solution.”</p>
    <div>
      <h2>The growing threat of cloud misconfigurations</h2>
      <a href="#the-growing-threat-of-cloud-misconfigurations">
        
      </a>
    </div>
    <p>The cloud has become a prime target for cyberattacks. According to the <a href="https://www.crowdstrike.com/resources/reports/crowdstrike-2023-cloud-risk-report-executive-summary/"><u>2023 Cloud Risk Report</u></a>, CrowdStrike observed a 95% increase in cloud exploitation from 2021 to 2022, with a staggering 288% jump in cases involving threat actors directly targeting the cloud.</p><p>Misconfigurations in cloud infrastructure settings, such as improperly set security parameters and default access controls, provide adversaries with an easy path to infiltrate the cloud. According to the <a href="https://cpl.thalesgroup.com/sites/default/files/content/cloud-security/2024/2024-thales-cloud-security-study-global-edition.pdf"><u>2023 Thales Global Cloud Security Study</u></a>, which surveyed nearly 3,000 IT and security professionals from 18 countries, 44% of respondents reported experiencing a data breach, with misconfigurations and human error identified as the leading cause, accounting for 31% of the incidents.</p><p>Further, according to Gartner<sup>Ⓡ</sup>, “Through 2027, 99% of records compromised in cloud environments will be the result of user misconfigurations and account compromise, not the result of an issue with the cloud provider.”<sup>1</sup></p><p>Several factors contribute to the rise of cloud misconfigurations:</p><ul><li><p><b>Rapid adoption of cloud services:</b> Leaders are often driven by the scalability, cost-efficiency, and ability to support remote work and real-time collaboration that cloud services offer. These factors enable rapid adoption of cloud services which can lead to unintentional misconfigurations as IT teams struggle to keep up with the pace and complexity of these services. </p></li><li><p><b>Complexity of cloud environments:</b> Cloud infrastructure can be highly complex with multiple services and configurations to manage. For example, <a href="https://public.docs.kivera.io/docs/access-analyzer"><u>AWS alone offers</u></a> 373 services with 15,617 actions and 140,000+ parameters, making it challenging for IT teams to manage settings accurately. </p></li><li><p><b>Decentralized management:</b> In large organizations, cloud infrastructure resources are often managed by multiple teams or departments. Without centralized oversight, inconsistent security policies and configurations can arise, increasing the risk of misconfigurations.</p></li><li><p><b>Continuous Integration and Continuous Deployment (CI/CD):</b> <a href="https://www.cloudflare.com/learning/serverless/glossary/what-is-ci-cd/">CI/CD pipelines</a> promote the ability to rapidly deploy, change and frequently update infrastructure. With this velocity comes the increased risk of misconfigurations when changes are not properly managed and reviewed.</p></li><li><p><b>Insufficient training and awareness:</b> Employees may lack the cross-functional skills needed for cloud security, such as understanding networks, identity, and service configurations. This knowledge gap can lead to mistakes and increases the risk of misconfigurations that compromise security.</p></li></ul>
    <div>
      <h3>Common exploitation methods </h3>
      <a href="#common-exploitation-methods">
        
      </a>
    </div>
    <p>Threat actors exploit cloud services through various means, including targeting misconfigurations, abusing privileges, and bypassing encryption. Misconfigurations such as exposed storage buckets or improperly secured APIs offer attackers easy access to sensitive data and resources. Privilege abuse occurs when attackers gain unauthorized access through compromised credentials or poorly managed identity and access management (IAM) policies, allowing them to escalate their access and move laterally within the cloud environment. Additionally, unencrypted data enables attackers to intercept and decrypt data in transit or at rest, further compromising the integrity and confidentiality of sensitive information.</p><p>Here are some other vulnerabilities that organizations should address: </p><ul><li><p><b>Unrestricted access to cloud tenants:</b> Allowing unrestricted access exposes cloud platforms to <a href="https://www.cloudflare.com/learning/security/what-is-data-exfiltration/">data exfiltration</a> by malicious actors. Limiting access to approved tenants with specific IP addresses and service destinations helps prevent unauthorized access.</p></li><li><p><b>Exposed access keys:</b> Exposed access keys can be exploited by unauthorized parties to steal or delete data. Requiring encryption for the access keys and restricting their usage can mitigate this risk.</p></li><li><p><b>Excessive account permissions:</b> Granting excessive privileges to cloud accounts increases the potential impact of security breaches. Limiting permissions to necessary operations helps prevent lateral movement and privilege escalation by threat actors.</p></li><li><p><b>Inadequate network segmentation:</b> Poorly managed network security groups and insufficient segmentation practices can allow attackers to move freely within cloud environments. Drawing boundaries around your cloud resources and tenants ensures that data stays within your organization.</p></li><li><p><b>Improper public access configuration:</b> Incorrectly exposing critical services or storage resources to the internet increases the likelihood of unauthorized access and data compromise. Preventing public access drastically reduces risk.</p></li><li><p><b>Shadow cloud infrastructure:</b> Abandoned or neglected cloud instances are often left vulnerable to exploitation, providing attackers with opportunities to access sensitive data left behind. Preventing untagged or unapproved cloud resources to be created can reduce the risk of exposure.</p></li></ul>
    <div>
      <h2>Limitations of existing tools </h2>
      <a href="#limitations-of-existing-tools">
        
      </a>
    </div>
    <p>Many organizations turn to CSPM tools to give them more visibility into cloud misconfigurations. These tools often alert teams after an issue occurs, putting security teams in a reactive mode. Remediation efforts require collaboration between security teams and developers to implement changes, which can be time-consuming and resource-intensive. This approach not only delays issue resolution but also exposes companies to compliance and legal risks, while failing to train employees on secure cloud practices. <a href="https://www.ibm.com/reports/data-breach-action-guide"><u>On average</u></a>, it takes 207 days to identify these breaches and an additional 70 days to contain them. </p><p>Addressing the growing threat of cloud misconfigurations requires proactive security measures and continuous monitoring. Organizations must adopt proactive security solutions that not only detect and alert but also prevent misconfigurations from occuring in the first place and enforce best practices. Creating a first line of defense for cloud deployment errors reduces the volume of alerts for customers, especially those also using CSPM tools or CNAPPs. </p><p>By implementing these proactive strategies, organizations can safeguard their cloud environments against the evolving landscape of cyber threats, ensuring robust security and compliance while minimizing risks and operational disruptions.</p>
    <div>
      <h2>What’s next for Kivera</h2>
      <a href="#whats-next-for-kivera">
        
      </a>
    </div>
    <p>The Kivera product will not be a point solution add-on. We’re making it a core part of our Cloudflare One offering because integrating features from products like our Secure Web Gateway give customers a comprehensive solution that works better together.</p><p>We’re excited to welcome Kivera to the Cloudflare team. Through the end of 2024 and into early 2025, Kivera’s team will focus on integrating their preventive inline cloud app controls directly into Cloudflare One. We are looking for early access testers and teams to provide feedback about what they would like to see. If you’d like early access, please <a href="https://www.cloudflare.com/lp/cloud-app-controls"><u>join the waitlist</u></a>.</p><p><sub>[1] Source: Outcome-Driven Metrics You Can Use to Evaluate Cloud Security Controls, Gartner, Charlie Winckless, Paul Proctor, Manuel Acosta, 09/28/2023 </sub></p><p><sub>GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved.</sub></p><p>
</p> ]]></content:encoded>
            <category><![CDATA[Data Protection]]></category>
            <category><![CDATA[Acquisitions]]></category>
            <category><![CDATA[Email Security]]></category>
            <category><![CDATA[Cloud Email Security]]></category>
            <category><![CDATA[SASE]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[Cloudflare One]]></category>
            <guid isPermaLink="false">6e7vmGCa8tZRTNJWqYs1di</guid>
            <dc:creator>Noelle Kagan</dc:creator>
            <dc:creator>Neil Brown</dc:creator>
            <dc:creator>Yumna Moazzam</dc:creator>
        </item>
        <item>
            <title><![CDATA[A wild week in phishing, and what it means for you]]></title>
            <link>https://blog.cloudflare.com/a-wild-week-in-phishing-and-what-it-means-for-you/</link>
            <pubDate>Fri, 16 Aug 2024 18:34:00 GMT</pubDate>
            <description><![CDATA[ From the U.S. elections and geopolitical conflict to tens of millions in corporate dollars lost, phishing remains the root cause of cyber damages. Learn why a comprehensive solution is the best way to stay protected. ]]></description>
            <content:encoded><![CDATA[ 
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7qPKUuIGbxmn5I3oGZ7W1E/9bd8faa76cc25b6d2ef1cb81ad920ddd/2504-1-Hero.png" />
          </figure><p>Being a bad guy on the Internet is a really good business. In more than 90% of cybersecurity incidents, phishing is the root cause of the attack, and during this third week of August phishing attacks were reported <a href="https://apnews.com/article/trump-campaign-hacking-iran-769d8411d9a13ef9a0e039c0b6c3b032"><u>against the U.S. elections</u></a>, in the <a href="https://blog.google/threat-analysis-group/iranian-backed-group-steps-up-phishing-campaigns-against-israel-us/"><u>geopolitical conflict</u></a> between the U.S., Israel, and Iran, and to cause <a href="https://www.sec.gov/Archives/edgar/data/1609804/000095014224002170/eh240519238_8k.htm"><u>$60M in corporate losses</u></a>.</p><p>You might think that after 30 years of email being the top vector for attack and risk we are helpless to do anything about it, but that would be giving too much credit to bad actors, and a misunderstanding of how defenders focused on detections can take control and win. </p><p>Phishing isn’t about email exclusively, or any specific protocol for that matter. Simply put, it is an attempt to get a person, like you or me, to take an action that unwittingly leads to damages. These attacks work because they appear to be authentic, <a href="https://blog.cloudflare.com/50-most-impersonated-brands-protect-phishing"><u>visually</u></a> or organizationally, such as pretending to be the CEO or CFO of your company, and when you break it down they are <a href="https://blog.cloudflare.com/2023-phishing-report"><u>three main attack vectors that Cloudflare has seen most impactfu</u></a>l from the bad emails we protect our customers from: 1. Clicking links (deceptive links are 35.6% of threat indicators) 2. Downloading files or malware  (malicious attachments are 1.9% of threat indicators) 3. Business email compromise (BEC) phishing that elicits money or intellectual property with no links or files (0.5% of threat indicators).</p><p>Today, we at Cloudflare see an increase in what we’ve termed multi-channel phishing. What other channels are there to send links, files and elicit BEC actions? There’s <a href="https://en.wikipedia.org/wiki/SMS"><u>SMS</u></a> (text messaging) and public and private messaging applications, which are increasingly common attack vectors that take advantage of the ability to send links over those channels, and also how people consume information and work. There’s cloud collaboration, where attackers rely on links, files, and BEC phishing on commonly used collaboration tools like Google Workspace, Atlassian, and Microsoft Office 365. And finally, there’s web and social phishing targeting people on LinkedIn and X. Ultimately, any attempt to stop phishing needs to be comprehensive enough to detect and protect against these different vectors.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/79OaEpiIHsCnTgkj7k89Yi/6f7f413ec1bca40e6e00b60863ee2e4e/2504-2.png" />
          </figure><p><sub><i>Learn more about these technologies and products </i></sub><a href="https://www.cloudflare.com/zero-trust/products/"><sub><i><u>here</u></i></sub></a><sub></sub></p>
    <div>
      <h3>A real example</h3>
      <a href="#a-real-example">
        
      </a>
    </div>
    <p>It’s one thing to tell you this, but we’d love to give you an example of how a multi-channel phish plays out with a sophisticated attacker.</p><p>Here’s an email message that an executive notices is in their junk folder. That’s because our <a href="https://www.cloudflare.com/zero-trust/products/email-security/"><u>Email Security</u></a> product noticed there’s something off about it and moved it there, but it relates to a project the executive is working on, so the executive thinks it’s legitimate. There’s a request for a company org chart, and the attacker knows that this is the kind of thing that’s going to be caught if they continue on email, so they include a link to a real Google form:</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3RyRiXtEtUg4PsZZ7yoEpY/c0a09b8d47d09b3b306b99d4cc5b667b/2504-3.png" />
          </figure><ul><li><p>The executive clicks the link, and because it is a legitimate Google form, it displays the following:</p></li></ul>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2szWX4dGovtdUjDzcRMQxt/6e0e5414ed84cac77c17667e668933a1/2504-4.png" />
          </figure><ul><li><p>There’s a request to upload the org chart here, and that’s what they try to do:</p></li></ul><div>
  
</div><ul><li><p>The executive drags it in, but it doesn’t finish uploading because in the document there is an “internal only” watermark that our <a href="https://www.cloudflare.com/zero-trust/products/gateway/"><u>Gateway</u></a> and <a href="https://www.cloudflare.com/zero-trust/products/dlp/"><u>digital loss prevention (DLP)</u></a> engine detected, which in turn prevented the upload.</p></li><li><p>Sophisticated attackers use urgency to drive better outcomes. Here, the attackers know the executive has an upcoming deadline for the consultant to report back to the CEO. Unable to upload the document, they respond back to the attacker. The attacker suggests that they try another method of upload or, in the worst case scenario, send the document on WhatsApp. </p></li></ul>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1nbwpRTramjxvyjgNzYQam/3e1d75596edd0c5b4fcf8323feb242e4/2504-5.png" />
          </figure><ul><li><p>The executive attempts to upload the org chart to the website they were provided in the second email, not knowing that this site would have loaded malware, but because it was loaded in Cloudflare’s <a href="https://www.cloudflare.com/zero-trust/products/browser-isolation/"><u>Browser Isolation</u></a>, it kept the executive’s device safe. Most importantly, when trying to upload sensitive company documents, the action is stopped again:</p></li></ul><div>
  
</div><ul><li><p>Finally they try WhatsApp, and again, we block it:</p></li></ul><div>
  
</div>

    <div>
      <h3>Ease of use</h3>
      <a href="#ease-of-use">
        
      </a>
    </div>
    <p>Setting up a security solution and maintaining it is critical to long term protection. However, having IT administration teams constantly tweak each product, configuration, and monitor each users’ needs is not only costly but risky as well, as it puts a large amount of overhead on these teams. </p><p>Protecting the executive in the example above required just four steps:</p><ol><li><p>Install and login to Cloudflare’s device agent for protection 
</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4jy0exbLu47wyT9AvqdTDb/17b48aaf93df0631a48b24aac58cc727/2504-6.png" />
          </figure><p>
With just a few clicks, anyone with the device agent client can be protected against multi-channel phish, making it easy for end users and administrators. For organizations that don’t allow clients to be installed, an <a href="https://developers.cloudflare.com/cloudflare-one/connections/connect-devices/agentless/"><u>agentless deployment</u></a> is also available.  </p></li><li><p>Configure policies that apply to all your user traffic routed through our secure web gateway. These policies can block access outright to high risk sites, such as those known to participate in phishing campaigns. For sites that may be suspicious, such as newly registered domains, isolated browser access allows users to access the website, but limits their interaction.
</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/43DsyYCbb0prLm14DHN8GA/4f67cd52ff31b3eee121898ca7b4e89f/2504-7.png" />
          </figure><p>The executive was also unable to upload the org chart to a free cloud storage service because their organization is using Cloudflare One’s <a href="https://www.cloudflare.com/zero-trust/products/gateway/"><u>Gateway</u></a> and <a href="https://developers.cloudflare.com/cloudflare-one/policies/browser-isolation/setup/"><u>Browser Isolation</u></a> solutions that were configured to load any free cloud storage websites in a remote isolated environment, which not only prevented the upload but also removed the ability to copy and paste information as well.

Also, while the executive was able to converse with the bad actor over WhatsApp, their files were blocked because of Cloudflare One’s Gateway solution, configured by the administrator to block all uploads and downloads on WhatsApp. </p></li><li><p>Set up DLP policies based on what shouldn’t be uploaded, typed, or copied and pasted.
</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4qeRPgGDjHHli36PXUrxm1/492df3aa3f132e05ffc365937c9e22a4/2504-8.png" />
          </figure><p>The executive was unable to upload the org chart to the Google form because the organization is using Cloudflare One’s Gateway and DLP solutions. This protection is implemented by configuring <a href="https://developers.cloudflare.com/cloudflare-one/policies/gateway/"><u>Gateway</u></a> to block any <a href="https://developers.cloudflare.com/cloudflare-one/policies/data-loss-prevention/dlp-profiles/"><u>DLP</u></a> infraction, even on a valid website like Google.</p></li><li><p>Deploy Email Security and set up auto-move rules based on the types of emails detected.
</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/19E5AjXPzOqi4u2wY6AvWA/da3e58b7dcc3d33684a3900f85aeab50/2504-9.png" />
          </figure></li></ol><p></p><p>In the example above, the executive never received any of the multiple malicious emails that were sent to them because Cloudflare’s Email Security was protecting their inbox. The phishing emails that did arrive were put into their Junk folder because the email was impersonating someone that didn’t match the signature in the email, and the configuration in Email Security automatically moved it there because of a <a href="https://developers.cloudflare.com/email-security/email-configuration/retract-settings/"><u>one-click configuration</u></a> set by the executive’s IT administrator.</p><p>But even with best-in-class detections, it goes without saying that it is important to have the ability to drill down on any metric to learn about individual users that are being impacted by an ongoing attack. Below is a mockup of our upcoming improved email security monitoring dashboard.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3JyRhqVbppIpAQAIGkVGil/67e3d44df3353b26ec1190dde4a915ff/2504-10.png" />
          </figure><p></p>
    <div>
      <h3>What’s next</h3>
      <a href="#whats-next">
        
      </a>
    </div>
    <p>While phishing, despite being around for three decades, continues to be a clear and present danger, effective detections in a seamless and comprehensive solution are really the only way to stay protected these days. </p><p>If you’re simply thinking about purchasing email security by itself, you can see why that just isn’t enough. Multi-layered protection is absolutely necessary to protect modern workforces, because work and data don’t just sit in email. They’re everywhere and on every device. Your phishing protection needs to be as well.</p><p>While you can do this by stitching together multiple vendors, it just won’t all work together. And besides the cost, a multi-vendor approach also usually increases overhead for investigation, maintenance, and uniformity for IT teams that are already stretched thin.</p><p>Whether or not you are at the start of your journey with Cloudflare, you can see how getting different parts of the Cloudflare One product suite can help holistically with phishing. And if you are already deep in your journey with Cloudflare, and are looking for 99.99% effective email detections trusted by the Fortune 500, global organizations, and even government entities, you can see how our Email Security helps. </p><p>If you’re running Office 365, and you’d like to see what we can catch that your current provider cannot, you can start right now with <a href="https://developers.cloudflare.com/email-security/deployment/api/setup/email-retro-scan/"><u>Retro Scan</u></a>.</p><p>And if you are using our Email Security solution already, you can learn more about our comprehensive protection <a href="https://www.cloudflare.com/zero-trust/products/"><u>here</u></a>.</p> ]]></content:encoded>
            <category><![CDATA[Cloudflare One]]></category>
            <category><![CDATA[Email Security]]></category>
            <category><![CDATA[Remote Browser Isolation]]></category>
            <category><![CDATA[DLP]]></category>
            <category><![CDATA[Secure Web Gateway]]></category>
            <category><![CDATA[Phishing]]></category>
            <guid isPermaLink="false">12yQcvcZoP7GDmh89iFg24</guid>
            <dc:creator>Pete Pang</dc:creator>
        </item>
        <item>
            <title><![CDATA[How Cloudflare Cloud Email Security protects against the evolving threat of QR phishing]]></title>
            <link>https://blog.cloudflare.com/how-cloudflare-cloud-email-security-protects-against-the-evolving-threat-of-qr-phishing/</link>
            <pubDate>Wed, 17 Apr 2024 13:00:44 GMT</pubDate>
            <description><![CDATA[ Learn about how Cloudflare's Cloud Email Security tackles QR phishing, why attackers favor QR codes, and Cloudflare's proactive defense strategy against evolving threats ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/vqiqKMC9TcbN2grgE4JNX/bde05e055953c24da09e4bf4f0194324/image12-1.png" />
            
            </figure><p>In the ever-evolving landscape of cyber threats, a subtle yet potent form of phishing has emerged — <a href="https://www.cloudflare.com/learning/security/what-is-quishing/">quishing</a>, short for QR phishing. It has been <a href="https://www.microsoft.com/en-us/microsoft-365-life-hacks/privacy-and-safety/brief-history-qr-codes">30 years since the invention of QR codes</a>, yet quishing still poses a significant risk, especially after the era of COVID, when QR codes became the norm to check statuses, register for events, and even order food.</p><p>Since 2020, <a href="https://developers.cloudflare.com/email-security/">Cloudflare’s cloud email security solution (previously known as Area 1)</a> has been at the forefront of fighting against quishing attacks, taking a proactive stance in dissecting them to better protect our customers. Let’s delve into the mechanisms behind QR phishing, explore why QR codes are a preferred tool for attackers, and review how Cloudflare contributes to the fight against this evolving threat.</p>
    <div>
      <h2>How quishing works</h2>
      <a href="#how-quishing-works">
        
      </a>
    </div>
    <p>The impact of phishing and quishing are quite similar, as both can result in users having their credentials compromised, devices compromised, or even financial loss. They also leverage malicious attachments or websites to provide bad actors the ability to access something they normally wouldn’t be able to. Where they differ is that quishing is typically highly targeted and uses a QR code to further obfuscate itself from detection.</p><p>Since phish detection engines require inputs like URLs or attachments inside an email in order to detect, quish succeeds by hampering the detection of these inputs. In Example A below, the phish’s URL was crawled and after two redirects landed on a malicious website that automatically tries to run key logging malware that copies login names and passwords. For Example A, this clearly sets off the detectors, but Example B has no link to crawl and therefore the same detections that worked on Example A are rendered inert.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1jABZ5PmTIPdOp78Kaq5ZH/e9c93303b5187c80a31d7a41901e1f85/Screenshot-2024-04-16-at-13.33.49.png" />
            
            </figure><p>Strange you say, if my phone can scan that QR code then can’t a detection engine recognize the QR code as well? Simply put, no, because phish detection engines are optimized for catching phish, but to identify and scan QR codes requires a completely different engine – a computer vision engine. This brings us to why QR codes are a preferred tool for attackers.</p>
    <div>
      <h2>Why QR codes for phishing?</h2>
      <a href="#why-qr-codes-for-phishing">
        
      </a>
    </div>
    <p>There are three main reasons QR codes are popular in <a href="https://www.cloudflare.com/learning/access-management/phishing-attack/">phishing attacks</a>. First, QR codes boast strong error correction capabilities, allowing them to withstand resizing, pixel shifting, variations in lighting, partial cropping, and other distortions. Indeed, computer vision models can scan QR codes, but identifying which section of an email, image, or webpage linked in an email has a QR code is quite difficult for a machine, and even more so if the QR codes have been obfuscated to hide themselves from some computer vision models. For example, by inverting them, blending them with other colors or images, or making them extremely small, computer vision models will have trouble even identifying the presence of QR codes, much less even being able to scan them. Though filters and additional processing can be applied to any image, not knowing what or where to apply makes the deobfuscation of a QR code an extremely expensive computational problem. This not only makes catching all quish hard, but is likely to cause frustration for an end user who won’t get their emails quickly because an image or blob of text looks similar to a QR code, resulting in delivery delays.</p><p>Even though computer vision models may have difficulty deobfuscating QR codes, we have discovered from experience that when a human encounters these obfuscated QR codes, with enough time and effort, they are usually able to scan the QR code. By doing everything from increasing the brightness of their screen, to printing out the email, to resizing the codes themselves, they can make a QR code that has been hidden from machines scan successfully.</p><p><i>Don’t believe us? Try it for yourself with the QR codes that have been obfuscated for machines. They all link to</i> <a href="/"><i>https://blog.cloudflare.com/</i></a></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1q4lolcNSXKWznwHGZMIFh/5e43d3d517b9c7eedf5afe6a9f5b11c3/Screenshot-2024-04-16-at-13.35.32.png" />
            
            </figure><p><i>(</i><a href="https://www.freepik.com/free-photo/old-textured-brick-wall-background_18998169.htm#query=brick%20wall&amp;position=0&amp;from_view=keyword&amp;track=ais&amp;uuid=5fc175de-b992-4443-aad7-730f83770fbb"><i>Brick wall image by rawpixel.com on Freepik</i></a><i>)</i></p><p>If you scanned any of the example QR codes above, you have just proven the next reason bad actors favor quish. The devices used for accessing QR codes are typically personal devices with a limited security posture, making them susceptible to exploitation. While secured corporate devices typically have measures to warn, stop, or sandbox users when they access malicious links, these protections are not available natively on personal devices. This can be especially worrisome, as we have seen a trend towards custom QR codes targeting executives in organizations.</p><p>QR codes can also be seamlessly layered in with other obfuscation techniques, such as encrypted attachments, mirrors that mimic well-known websites, validations to prove you are human before malicious content is revealed, and more. This versatility makes them an attractive choice for cybercriminals seeking innovative ways to deceive unsuspecting users by adding QR codes to previously successful phishing vectors that have now been blocked by security products.</p>
    <div>
      <h2>Cloudflare's protection strategy</h2>
      <a href="#cloudflares-protection-strategy">
        
      </a>
    </div>
    <p>Cloudflare has been at the forefront of defending against quishing attacks. We employ a multi-faceted approach, and instead of focusing on archaic, layered email configuration rules, we have trained our machine learning (ML) detection models on almost a decade’s worth of detection data and have a swath of proactive computer vision models to ensure all of our customers start with a turnkey solution.</p><p>For quish detections, we break it into two parts: 1) identification and scanning of QR codes 2) analysis of decoded QR codes.</p><p>The first part is solved by our own QR code detection heuristics that inform how, when, and where for our computer vision models to execute. We then leverage the newest libraries and tools to help identify, process, and most importantly decode QR codes. While it is relatively easy for a human to identify a QR code, there is almost no limit to how many ways they can be obfuscated to machines. The examples we provided above are just a small sample of what we’ve seen in the wild, and bad actors are constantly discovering new methods to make QR codes hard to quickly find and identify, making it a constant cat and mouse game that requires us to regularly update our tools for the trending obfuscation technique.</p><p>The second part, analysis of decoded QR codes, goes through all the same treatment we apply to phish and then some. We have engines that deconstruct complex URLs and drill down to the final URL, from redirect to redirect, whether they are automatic or not. Along the way, we scan for malicious attachments and malicious websites and log findings for future detections to cross-reference. If we encounter any files or content that are encrypted or password protected, we leverage another group of engines that attempt to decrypt and unprotect them, so we can identify if there was any obfuscated malicious content. Most importantly, with all of this information, we continuously update our databases with this new data, including the obfuscation of the QR code, to make better assessments of similar attacks that leverage the methods we have documented.</p><p>However, even with a well-trained suite of phish detection tools, quite often the malicious content is at the end of a long chain of redirects that prevent automated web crawlers from identifying anything at all, much less malicious content. In between redirects, there might be a hard block that requires human validation, such as a <a href="https://www.cloudflare.com/learning/bots/how-captchas-work/">CAPTCHA</a>, which makes it virtually impossible for an automated process to crawl past, and therefore unable to classify any content at all. Or there might be a conditional block with campaign identification requirements, so if anyone is outside the original target’s region or has a web browser and operating system version that doesn’t meet the campaign requirements, they would simply view a benign website, while the target would be exposed to the malicious content. Over the years, we have built tools to identify and pass these validations, so we can determine malicious content that may be there.</p><p>However, even with all the technologies we’ve built over the years, there are cases where we aren’t able to easily get to the final content. In those cases, our link reputation machine learning models, which have been trained on multiple years of scanned links and their metadata, have proven to be quite valuable and are easily applied after QR codes are decoded as well. By correlating things like domain metadata, URL structure, URL query strings, and our own historical data sets, we are able to make inferences to protect our customers. We also take a proactive approach and leverage our ML models to tell us where to hunt for QR codes, even if they aren’t immediately obvious, and by scrutinizing domains, sentiment, context, IP addresses, historical use, and social patterns between senders and recipients, Cloudflare identifies and neutralizes potential threats before they can inflict harm.</p>
    <div>
      <h2>Creative examples and real world instances</h2>
      <a href="#creative-examples-and-real-world-instances">
        
      </a>
    </div>
    <p>With the thousands of QR codes we process daily, we see some interesting trends. Notable companies, including Microsoft and DocuSign, have frequently been the subjects of impersonation for quishing attacks. What makes this more confusing for users, and even more likely to scam them, is that these companies actually use QR codes in their legitimate workflows. This further underscores the urgency for organizations to fortify their defenses against this evolving threat.</p><p>Below are three examples of the most interesting quish we have found and compared against the real use cases by the respective companies. The QR codes used in these emails have been masked.</p>
    <div>
      <h3>Microsoft Authenticator</h3>
      <a href="#microsoft-authenticator">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/26vhSfHns8YkKs1DtB1p9n/3b39f16fb2feeab377679ad1466f5084/Screenshot-2024-04-16-at-13.37.12.png" />
            
            </figure><p>Microsoft uses QR codes as a faster way to complete <a href="https://www.cloudflare.com/learning/access-management/what-is-multi-factor-authentication/">MFA</a> instead of sending six digit SMS codes to users’ phones that can be delayed and are also considered safer, as SMS MFA can be intercepted through SIM swap attacks. Users would have independently registered their devices and would have previously seen the registration screen on the right, so receiving an email that says they need to re-authenticate doesn’t seem especially odd.</p>
    <div>
      <h3>DocuSign</h3>
      <a href="#docusign">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/167XX59i4v1Im47dNhjxUm/adc13cc6a4aba177c1d009e18567ad30/Screenshot-2024-04-16-at-13.38.14.png" />
            
            </figure><p>DocuSign uses QR codes to make it easier for users to download their mobile app tosign documents, <a href="https://support.docusign.com/s/document-item?language=en_US&amp;bundleId=ced1643229641057&amp;topicId=iww1578456547699.html&amp;_LANG=enus">identity verification</a> via a mobile device to take photos, and supports embedding DocuSign features in <a href="https://support.docusign.com/s/document-item?language=en_US&amp;rsc_301=&amp;bundleId=yca1573855023892&amp;topicId=xhc1615577299246.html&amp;_LANG=enus">third party apps</a> which have their own QR code scanning functionality. The use of QR codes in native DocuSign apps and non-native apps makes it confusing for frequent DocuSign users and not at all peculiar for users that rarely use DocuSign. While the QR code for downloading the DocuSign app is not used in signature requests, to a frequent user, it might just seem like a fast method to open the request in the app they already have downloaded on their mobile device.</p>
    <div>
      <h3>Microsoft Teams</h3>
      <a href="#microsoft-teams">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7j7KenKXtrmjJlNnHBPy2O/40cc68d61e198e8181fa4ccf6f12ecb4/Screenshot-2024-04-16-at-13.38.53.png" />
            
            </figure><p>Microsoft uses QR codes for Teams to allow users to quickly join a team via a mobile device, and while Teams doesn’t use QR codes for voicemails, it does have a voicemail feature. The email on the left seems like a reminder to check voicemail in Teams and combines the two real use cases on the right.</p>
    <div>
      <h2>How you can help prevent quishing</h2>
      <a href="#how-you-can-help-prevent-quishing">
        
      </a>
    </div>
    <p>As we confront the persistent threat of quishing, it's crucial for individuals and organizations to be vigilant.  While no solution can guarantee 100% protection, collective diligence can significantly reduce the risk, and we encourage collaboration in the fight against quishing.</p><p>If you are already a Cloud Email Security customer, we remind you to <a href="https://developers.cloudflare.com/email-security/email-configuration/phish-submissions/">submit instances</a> of quish from within our portal to help stop current threats and enhance the capabilities of future machine learning models, leading to more proactive defense strategies. If you aren’t a customer, you can still submit original quish samples as an attachment in <a href="https://docs.fileformat.com/email/eml/">EML</a> format to <a>quish@cloudflare.com</a>, and remember to leverage your email security provider’s submission process to inform them of these quishing vectors as well.</p><p>The battle against quishing is ongoing, requiring continuous innovation and collaboration. To support submissions of quish, we are developing new methods for customers to provide targeted feedback to our models and also adding additional transparency to our metrics to facilitate tracking a variety of vectors, including quish.</p> ]]></content:encoded>
            <category><![CDATA[Cloud Email Security]]></category>
            <category><![CDATA[Email Security]]></category>
            <category><![CDATA[Email]]></category>
            <category><![CDATA[Phishing]]></category>
            <guid isPermaLink="false">4U4At0ve95ZFEqtwjjVm10</guid>
            <dc:creator>Pete Pang</dc:creator>
        </item>
        <item>
            <title><![CDATA[Security Week 2024 wrap up]]></title>
            <link>https://blog.cloudflare.com/security-week-2024-wrap-up/</link>
            <pubDate>Mon, 11 Mar 2024 14:00:05 GMT</pubDate>
            <description><![CDATA[ A summary of the blog posts and product announcements released during Security Week 2024 ]]></description>
            <content:encoded><![CDATA[ 
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1ziJdd54D7lhcTnOu7hPK1/a2aac4fd6b20f12106e557a8e4579a42/image2-29.png" />
            
            </figure><p>The next 12 months have the potential to reshape the global political landscape with elections occurring in more than 80 nations, in 2024, while new technologies, such as AI, capture our imagination and pose new security challenges.</p><p>Against this backdrop, the role of CISOs has never been more important. <a href="/why-i-joined-cloudflare-as-chief-security-officer">Grant Bourzikas</a>, Cloudflare’s Chief Security Officer, shared his views on what the biggest challenges currently facing the security industry are in the Security Week opening <a href="/welcome-to-security-week-2024">blog</a>.</p><p>Over the past week, we announced a number of new products and features that align with what we believe are <a href="https://www.cloudflare.com/ciso/">the most crucial challenges for CISOs</a> around the globe. We released features that span Cloudflare’s product portfolio, ranging from application security to securing employees and cloud infrastructure. We have also published a few stories on how we take a Customer Zero approach to using Cloudflare services to manage security at Cloudflare.</p><p>We hope you find these stories interesting and are excited by the new Cloudflare products. In case you missed any of these announcements, here is a recap of <a href="https://www.cloudflare.com/security-week/">Security Week</a>:</p>
    <div>
      <h3>Responding to opportunity and risk from AI</h3>
      <a href="#responding-to-opportunity-and-risk-from-ai">
        
      </a>
    </div>
    
<table>
<thead>
  <tr>
    <th><span>Title</span></th>
    <th><span>Excerpt</span></th>
  </tr>
</thead>
<tbody>
  <tr>
    <td><a href="http://staging.blog.mrk.cfdata.org/firewall-for-ai/"><span>Cloudflare announces Firewall for AI</span></a></td>
    <td><span>Cloudflare announced the development of Firewall for AI, a protection layer that can be deployed in front of Large Language Models (LLMs) to identify abuses and attacks. </span></td>
  </tr>
  <tr>
    <td><a href="http://staging.blog.mrk.cfdata.org/defensive-ai/"><span>Defensive AI: Cloudflare’s framework for defending against next-gen threats</span></a></td>
    <td><span>Defensive AI is the framework Cloudflare uses when integrating intelligent systems into its solutions. Cloudflare’s AI models look at customer traffic patterns, providing that organization with a tailored defense strategy unique to their environment. </span></td>
  </tr>
  <tr>
    <td><a href="http://staging.blog.mrk.cfdata.org/security-analytics-ai-assistant/"><span>Cloudflare launches AI Assistant for Security Analytics </span></a></td>
    <td><span>We released a natural language assistant as part of Security Analytics. Now it is easier than ever to get powerful insights about your applications by exploring log and security events using the new natural language query interface.</span></td>
  </tr>
  <tr>
    <td><a href="http://staging.blog.mrk.cfdata.org/dispelling-the-generative-ai-fear-how-cloudflare-secures-inboxes-against-ai-enhanced-phishing/"><span>Dispelling the Generative AI fear: how Cloudflare secures inboxes against AI-enhanced phishing</span></a></td>
    <td><span>Generative AI is being used by malicious actors to make phishing attacks much more convincing. Learn how Cloudflare’s email security systems are able to see past the deception using advanced machine learning models.</span></td>
  </tr>
</tbody>
</table>
    <div>
      <h3>Maintaining visibility and control as applications and clouds change</h3>
      <a href="#maintaining-visibility-and-control-as-applications-and-clouds-change">
        
      </a>
    </div>
    
<table>
<thead>
  <tr>
    <th><span>Title</span></th>
    <th><span>Excerpt</span></th>
  </tr>
</thead>
<tbody>
  <tr>
    <td><a href="http://staging.blog.mrk.cfdata.org/introducing-magic-cloud-networking"><span>Magic Cloud Networking simplifies security, connectivity, and management of public clouds</span></a></td>
    <td><span>Introducing Magic Cloud Networking, a new set of capabilities to visualize and automate cloud networks to give our customers easy, secure, and seamless connection to public cloud environments.</span></td>
  </tr>
  <tr>
    <td><a href="http://staging.blog.mrk.cfdata.org/security-insights-quick-ciso-view/"><span>Secure your unprotected assets with Security Center: quick view for CISOs</span></a></td>
    <td><span>Security Center now includes new tools to address a common challenge: ensuring comprehensive deployment of Cloudflare products across your infrastructure. Gain precise insights into where and how to optimize your security posture.</span></td>
  </tr>
  <tr>
    <td><a href="http://staging.blog.mrk.cfdata.org/dlp-ocr-sourcecode/"><span>Announcing two highly requested DLP enhancements: Optical Character Recognition (OCR) and Source Code Detections</span></a></td>
    <td><span>Cloudflare One now supports Optical Character Recognition and detects source code as part of its Data Loss Prevention service. These two features make it easier for organizations to protect their sensitive data and reduce the risks of breaches.</span></td>
  </tr>
  <tr>
    <td><a href="http://staging.blog.mrk.cfdata.org/cf1-user-risk-score/"><span>Introducing behavior-based user risk scoring in Cloudflare One</span></a></td>
    <td><span>We are introducing user risk scoring as part of Cloudflare One, a new set of capabilities to detect risk based on user behavior, so that you can improve security posture across your organization.</span></td>
  </tr>
  <tr>
    <td><a href="http://staging.blog.mrk.cfdata.org/eliminate-vpn-vulnerabilities-with-cloudflare-one/"><span>Eliminate VPN vulnerabilities with Cloudflare One</span></a></td>
    <td><span>The Cybersecurity &amp; Infrastructure Security Agency issued an Emergency Directive due to the Ivanti Connect Secure and Policy Secure vulnerabilities. In this post, we discuss the threat actor tactics exploiting these vulnerabilities and how Cloudflare One can mitigate these risks. </span></td>
  </tr>
  <tr>
    <td><a href="http://staging.blog.mrk.cfdata.org/zero-trust-warp-with-a-masque/"><span>Zero Trust WARP: tunneling with a MASQUE</span></a></td>
    <td><span>This blog discusses the introduction of MASQUE to Zero Trust WARP and how Cloudflare One customers will benefit from this modern protocol. </span></td>
  </tr>
  <tr>
    <td><a href="http://staging.blog.mrk.cfdata.org/collect-all-your-cookies-in-one-jar/"><span>Collect all your cookies in one jar with Page Shield Cookie Monitor</span></a></td>
    <td><span>Protecting online privacy starts with knowing what cookies are used by your websites. Our client-side security solution, Page Shield, extends transparent monitoring to HTTP cookies.</span></td>
  </tr>
  <tr>
    <td><a href="http://staging.blog.mrk.cfdata.org/gatway-protocol-detection"><span>Protocol detection with Cloudflare Gateway</span></a><span> </span></td>
    <td><span>Cloudflare Secure Web Gateway now supports the detection, logging, and filtering of network protocols using packet payloads without the need for inspection. </span></td>
  </tr>
  <tr>
    <td><a href="http://staging.blog.mrk.cfdata.org/threat-intel-rfi-pir/"><span>Introducing Requests for Information (RFIs) and Priority Intelligence Requirements (PIRs) for threat intelligence teams</span></a></td>
    <td><span>Our Security Center now houses Requests for Information and Priority Intelligence Requirements. These features are available via API as well and Cloudforce One customers can start leveraging them today for enhanced security analysis. </span></td>
  </tr>
</tbody>
</table>
    <div>
      <h3>Consolidating to drive down costs</h3>
      <a href="#consolidating-to-drive-down-costs">
        
      </a>
    </div>
    
<table>
<thead>
  <tr>
    <th><span>Title</span></th>
    <th><span>Excerpt</span></th>
  </tr>
</thead>
<tbody>
  <tr>
    <td><a href="http://staging.blog.mrk.cfdata.org/log-explorer/"><span>Log Explorer: monitor security events without third-party storage</span></a></td>
    <td><span>With the combined power of Security Analytics and Log Explorer, security teams can analyze, investigate, and monitor logs natively within Cloudflare, reducing time to resolution and overall cost of ownership by eliminating the need of third-party logging systems.</span></td>
  </tr>
  <tr>
    <td><a href="http://staging.blog.mrk.cfdata.org/deskope-program-and-asdp-for-descaler/"><span>Simpler migration from Netskope and Zscaler to Cloudflare: introducing Deskope and a Descaler partner update</span></a></td>
    <td><span>Cloudflare expands the Descaler program to Authorized Service Delivery Partners (ASDPs). Cloudflare is also launching Deskope, a new set of tooling to help migrate existing Netskope customers to Cloudflare One.</span></td>
  </tr>
  <tr>
    <td><a href="http://staging.blog.mrk.cfdata.org/protecting-apis-with-jwt-validation/"><span>Protecting APIs with JWT Validation</span></a></td>
    <td><span>Cloudflare customers can now protect their APIs from broken authentication attacks by validating incoming JSON Web Tokens with API Gateway.</span></td>
  </tr>
  <tr>
    <td><a href="http://staging.blog.mrk.cfdata.org/announcing-express-cni"><span>Simplifying how enterprises connect to Cloudflare with Express Cloudflare Network Interconnect</span></a></td>
    <td><span>Express Cloudflare Network Interconnect makes it fast and easy to connect your network to Cloudflare. Customers can now order Express CNIs directly from the Cloudflare dashboard.</span></td>
  </tr>
  <tr>
    <td><a href="http://staging.blog.mrk.cfdata.org/treating-sase-anxiety/"><span>Cloudflare treats SASE anxiety for VeloCloud customers</span></a></td>
    <td><span>The turbulence in the SASE market is driving many customers to seek help. We’re doing our part to help VeloCloud customers who are caught in the crosshairs of shifting strategies.</span></td>
  </tr>
  <tr>
    <td><a href="http://staging.blog.mrk.cfdata.org/free-network-monitoring-for-enterprise"><span>Free network flow monitoring for all enterprise customers</span></a></td>
    <td><span>Announcing a free version of Cloudflare’s network flow monitoring product, Magic Network Monitoring. Now available to all Enterprise customers.</span></td>
  </tr>
  <tr>
    <td><a href="http://staging.blog.mrk.cfdata.org/guide-to-cloudflare-pages-and-turnstile-plugin/"><span>Building secure websites: a guide to Cloudflare Pages and Turnstile Plugin</span></a></td>
    <td><span>Learn how to use Cloudflare Pages and Turnstile to deploy your website quickly and easily while protecting it from bots, without compromising user experience. </span></td>
  </tr>
  <tr>
    <td><a href="http://staging.blog.mrk.cfdata.org/waf-content-scanning-for-malware-detection/"><span>General availability for WAF Content Scanning for file malware protection</span></a></td>
    <td><span>Announcing the General Availability of WAF Content Scanning, protecting your web applications and APIs from malware by scanning files in-transit.</span></td>
  </tr>
</tbody>
</table>
    <div>
      <h3>How can we help make the Internet better?</h3>
      <a href="#how-can-we-help-make-the-internet-better">
        
      </a>
    </div>
    
<table>
<thead>
  <tr>
    <th><span>Title</span></th>
    <th><span>Excerpt</span></th>
  </tr>
</thead>
<tbody>
  <tr>
    <td><a href="http://staging.blog.mrk.cfdata.org/protecting-global-democracy-against-threats-from-emerging-technology"><span>Cloudflare protects global democracy against threats from emerging technology during the 2024 voting season</span></a></td>
    <td><span>At Cloudflare, we’re actively supporting a range of players in the election space by providing security, performance, and reliability tools to help facilitate the democratic process.</span></td>
  </tr>
  <tr>
    <td><a href="http://staging.blog.mrk.cfdata.org/navigating-the-maze-of-magecart/"><span>Navigating the maze of Magecart: a cautionary tale of a Magecart impacted website</span></a></td>
    <td><span>Learn how a sophisticated Magecart attack was behind a campaign against e-commerce websites. This incident underscores the critical need for a strong client side security posture.</span></td>
  </tr>
  <tr>
    <td><a href="http://staging.blog.mrk.cfdata.org/building-urlscanner/"><span>Cloudflare’s URL Scanner, new features, and the story of how we built it</span></a></td>
    <td><span>Discover the enhanced URL Scanner API, now integrated with the Security Center Investigate Portal. Enjoy unlisted scans, multi-device screenshots, and seamless integration with the Cloudflare ecosystem. </span></td>
  </tr>
  <tr>
    <td><a href="http://staging.blog.mrk.cfdata.org/secure-by-design-principles/"><span>Changing the industry with CISA’s Secure by Design principles</span></a></td>
    <td><span>Security considerations should be an integral part of software’s design, not an afterthought. Explore how Cloudflare adheres to Cybersecurity &amp; Infrastructure Security Agency’s Secure by Design principles to shift the industry.</span></td>
  </tr>
  <tr>
    <td><a href="http://staging.blog.mrk.cfdata.org/pq-2024/"><span>The state of the post-quantum Internet</span></a></td>
    <td><span>Nearly two percent of all TLS 1.3 connections established with Cloudflare are secured with post-quantum cryptography. In this blog post we discuss where we are now in early 2024, what to expect for the coming years, and what you can do today.</span></td>
  </tr>
  <tr>
    <td><a href="http://staging.blog.mrk.cfdata.org/advanced-dns-protection/"><span>Advanced DNS Protection: mitigating sophisticated DNS DDoS attacks</span></a></td>
    <td><span>Introducing the Advanced DNS Protection system, a robust defense mechanism designed to protect against the most sophisticated DNS-based DDoS attacks.</span></td>
  </tr>
</tbody>
</table>
    <div>
      <h3>Sharing the Cloudflare way</h3>
      <a href="#sharing-the-cloudflare-way">
        
      </a>
    </div>
    
<table>
<thead>
  <tr>
    <th><span>Title</span></th>
    <th><span>Excerpt</span></th>
  </tr>
</thead>
<tbody>
  <tr>
    <td><a href="http://staging.blog.mrk.cfdata.org/linux-kernel-hardening/"><span>Linux kernel security tunables everyone should consider adopting</span></a></td>
    <td><span>This post illustrates some of the Linux kernel features that are helping Cloudflare keep its production systems more secure. We do a deep dive into how they work and why you should consider enabling them.</span></td>
  </tr>
  <tr>
    <td><a href="http://staging.blog.mrk.cfdata.org/securing-cloudflare-with-cloudflare-zero-trust"><span>Securing Cloudflare with Cloudflare: a Zero Trust journey</span></a></td>
    <td><span>A deep dive into how we have deployed Zero Trust at Cloudflare while maintaining user privacy.</span></td>
  </tr>
  <tr>
    <td><a href="http://staging.blog.mrk.cfdata.org/network-performance-update-security-week-2024"><span>Network performance update: Security Week 2024</span></a><span> </span></td>
    <td><span>Cloudflare is the fastest provider for 95th percentile connection time in 44% of networks around the world. We dig into the data and talk about how we do it.</span></td>
  </tr>
  <tr>
    <td><a href="http://staging.blog.mrk.cfdata.org/harnessing-office-chaos"><span>Harnessing chaos in Cloudflare offices</span></a><span> </span></td>
    <td><span>This blog discusses the new sources of “chaos” that have been added to LavaRand and how you can make use of that harnessed chaos in your next application.</span></td>
  </tr>
  <tr>
    <td><a href="http://staging.blog.mrk.cfdata.org/email-security-insights-on-cloudflare-radar"><span>Launching email security insights on Cloudflare Radar</span></a><span> </span></td>
    <td><span>The new Email Security section on Cloudflare Radar provides insights into the latest trends around threats found in malicious email, sources of spam and malicious email, and the adoption of technologies designed to prevent abuse of email.</span></td>
  </tr>
</tbody>
</table>
    <div>
      <h3>A final word</h3>
      <a href="#a-final-word">
        
      </a>
    </div>
    <p>Thanks for joining us this week, and stay tuned for our next Innovation Week in early April, focused on the developer community.</p>
    <div>
      <h3>Watch on Cloudflare TV</h3>
      <a href="#watch-on-cloudflare-tv">
        
      </a>
    </div>
    <div>
  
</div>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3S3nnZ6qfB6QnJAe9OwthD/05721dea96b2b756c5ab1989660293e3/image1-31.png" />
            
            </figure><p></p> ]]></content:encoded>
            <category><![CDATA[Security Week]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[Application Security]]></category>
            <category><![CDATA[Email Security]]></category>
            <category><![CDATA[AI]]></category>
            <guid isPermaLink="false">19BXuTqacKLPSyjHFzhyxF</guid>
            <dc:creator>Daniele Molteni</dc:creator>
            <dc:creator>Ankur Aggarwal</dc:creator>
        </item>
        <item>
            <title><![CDATA[Launching email security insights on Cloudflare Radar]]></title>
            <link>https://blog.cloudflare.com/email-security-insights-on-cloudflare-radar/</link>
            <pubDate>Fri, 08 Mar 2024 14:00:58 GMT</pubDate>
            <description><![CDATA[ The new Email Security section on Cloudflare Radar provides insights into the latest trends around threats found in malicious email, sources of spam and malicious email, and the adoption of technologies designed to prevent abuse of email ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/67tt8jiqO9RDouWNc2IuIg/97e9e9233a7b20d7e134c0bc8083a014/image2-28.png" />
            
            </figure><p>During 2021's Birthday Week, we <a href="/introducing-email-routing">announced</a> our <a href="https://www.cloudflare.com/learning/email-security/what-is-email-routing/">Email Routing</a> service, which allows users to direct different types of email messages (such as marketing, transactional, or administrative) to separate accounts based on criteria such as the recipient’s address or department. Its capabilities and the volume of messages routed have <a href="/email-routing-subdomains">grown significantly</a> since launch.</p><p>Just a few months later, on February 23, 2022, we announced our intent to acquire Area 1 Security to protect users from phishing attacks in email, web, and network environments. Since the completion of the acquisition on April 1, 2022, Area 1's email security capabilities have been integrated into Cloudflare's <a href="https://www.cloudflare.com/learning/access-management/what-is-sase/">secure access service edge (SASE)</a> solution portfolio, and now processes tens of millions of messages daily.</p><p>Processing millions of email messages each day on behalf of our customers gives us a unique perspective on the threats posed by malicious emails, spam volume, the adoption of <a href="https://www.cloudflare.com/learning/email-security/dmarc-dkim-spf/">email authentication methods like SPF, DMARC, and DKIM</a>, and the use of IPv4/IPv6 and TLS by email servers. Today, we are launching a new <a href="https://radar.cloudflare.com/email-security">Email Security section</a> on <a href="https://radar.cloudflare.com/">Cloudflare Radar</a> to share these perspectives with you. The insights in this new section can help you better understand the state of email security as viewed across various metrics, as well as understanding real-time trends in email-borne threats. (For instance, correlating an observed increase within your organization in messages containing malicious links with a similar increase observed by Cloudflare.) Below, we review the new metrics that are now available on Radar.</p>
    <div>
      <h3>Tracking malicious email</h3>
      <a href="#tracking-malicious-email">
        
      </a>
    </div>
    <p>As Cloudflare’s <a href="https://www.cloudflare.com/zero-trust/products/email-security/">email security</a> service processes email messages on behalf of customers, we are able to identify and classify offending messages as malicious. As examples, malicious emails may attempt to trick recipients into sharing personal information like login details, or the messages could attempt to spread malware through embedded images, links, or attachments. The new Email Security section on Cloudflare Radar now <a href="https://radar.cloudflare.com/email-security">provides insight</a> at a global level into the aggregate share of processed messages that we have classified as malicious over the selected timeframe. During <a href="https://radar.cloudflare.com/email-security?dateStart=2024-02-01&amp;dateEnd=2024-02-29">February 2024</a>, as shown in the figure below, we found that an average of 2.1% of messages were classified as being malicious. Spikes in malicious email volume were seen on February 10 and 11, accounting for as much as 29% of messages. These spikes occurred just ahead of the Super Bowl, in line with <a href="/super-bowl-lviii">previous observations</a> of increases in malicious email volume in the week ahead of the game. Other notable (but lower) spikes were seen on February 13, 15, 17, 24, and 25. The <a href="https://developers.cloudflare.com/api/operations/radar-get-email-security-summary-by-malicious">summary</a> and <a href="https://developers.cloudflare.com/api/operations/radar-get-email-security-timeseries-group-by-malicious">time series</a> data for malicious email share are available through the Radar API.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/39j34s8TPPt3cQj6j2ZTsF/73ec05c40f900a2c6f6ca37817fc2574/pasted-image-0-6.png" />
            
            </figure>
    <div>
      <h3>Threat categorization</h3>
      <a href="#threat-categorization">
        
      </a>
    </div>
    <p>The <a href="https://radar.cloudflare.com/year-in-review/2023#top-email-threats">Cloudflare Radar 2023 Year in Review</a> highlighted some of the techniques used by attackers when carrying out attacks using malicious email messages. As noted above, these can include links or attachments leading to malware, as well as approaches like identity deception, where the message appears to be coming from a trusted contact, and brand impersonation, where the message appears to be coming from a trusted brand. In analyzing malicious email messages, Cloudflare’s <a href="https://www.cloudflare.com/zero-trust/solutions/email-security-services/">email security service</a> categorizes the threats that it finds these messages contain. (Note that a single message can contain multiple types of threats — the sender could be impersonating a trusted contact while the body of the email contains a link leading to a fake login page.)</p><p>Based on these assessments, Cloudflare Radar now <a href="https://radar.cloudflare.com/email-security#malicious-email-threat-categories">provides insights</a> into trends observed across several different groups of threat types including “Attachment”, “Link”, “Impersonation”, and “Other”. “Attachment” groups individual threat types where the attacker has attached a file to the email message, “Link” groups individual threat types where the attacker is trying to get the user to click on something, and “Impersonation” groups individual threat types where the attacker is impersonating a trusted brand or contact. The “Other” grouping includes other threat types not covered by the previous three.</p><p>During February 2024 for the “Link” grouping, as the figure below illustrates, link-based threats were unsurprisingly the most common, and were found in 58% of malicious emails. Since the display text for a link (i.e., hypertext) in HTML can be arbitrarily set, attackers can make a URL appear as if it links to a benign site when, in fact, it is actually malicious. Nearly a third of malicious emails linked to something designed to harvest user credentials. The <a href="https://developers.cloudflare.com/api/operations/radar-get-email-security-summary-by-threat-category">summary</a> and <a href="https://developers.cloudflare.com/api/operations/radar-get-email-security-timeseries-group-by-threat-category">time series</a> data for these threat categories are available through the Radar API.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5ZVsVPQccuYKQjUpKcOoEq/88456640a317da1779b6867a77acdc64/pasted-image-0--1--3.png" />
            
            </figure><p>For the “Attachment” grouping, during February 2024, nearly 13% of messages were found to have a malicious attachment that when opened or executed in the context of an attack, includes a call-to-action (e.g. lures target to click a link) or performs a series of actions set by an attacker. The share spiked several times throughout the month, reaching as high as 70%. The attachments in nearly 6% of messages attempted to download additional software (presumably malware) once opened.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7Akp5aqpIDDj99BdAsZ82C/f6dcf92dde82ff1fc72d58788b11240d/pasted-image-0--2--2.png" />
            
            </figure><p>If an email message appears to be coming from a trusted brand, users may be more likely to open it and take action, like checking the shipping status of a package or reviewing a financial transaction. During February 2024, on average, over a quarter of malicious emails were sent by attackers attempting to impersonate well-known brands. Similar to other threat categories, this one also saw a number of significant spikes, reaching as high as 88% of February 17. Just over 18% of messages were found to be trying to extort users in some fashion. It appears that such campaigns were very active in the week ahead of Valentine's Day (February 14), although the peak was seen on February 15, at over 95% of messages.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7H5mYJCU0Z2mWmY2zOoH7b/448feba0321f99e1079dc24db24e7911/Impersonation.png" />
            
            </figure><p>Identity deception occurs when an attacker or someone with malicious intent sends an email claiming to be someone else, whether through use of a similar-looking domain or display name manipulation. This was the top threat category for the “Other” grouping, seen in over 36% of malicious emails during February 2024. The figure below shows three apparent “waves” of the use of this technique — the first began at the start of the month, the second around February 9, and the third around February 20. Over 11% of messages were categorized as malicious because of the reputation of the network (<a href="https://www.cloudflare.com/learning/network-layer/what-is-an-autonomous-system/">autonomous system</a>) that they were sent from; some network providers are well-known sources of malicious and unwanted email.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3YFNUNtGqXHm2ORhNgIS0e/be2f047756c5bd6766c9336cb101d259/pasted-image-0--3--1.png" />
            
            </figure>
    <div>
      <h3>Dangerous domains</h3>
      <a href="#dangerous-domains">
        
      </a>
    </div>
    <p><a href="https://www.cloudflare.com/learning/dns/top-level-domain/">Top-level domains, also known as TLDs</a>, are found in the right-most portion of a hostname. For example, <code>radar.cloudflare.com</code> is in the <code>.com</code> <a href="https://icannwiki.org/Generic_top-level_domain">generic Top Level Domain (gTLD)</a>, while <code>bbc.co.uk</code> is in the <code>.uk</code> <a href="https://icannwiki.org/Country_code_top-level_domain">country code Top Level Domain (ccTLD)</a>. As of February 2024, there are nearly 1600 Top Level Domains listed in the <a href="https://www.iana.org/domains/root/db">IANA Root Zone Database</a>. Over the last 15 years or so, several reports have been published that look at the “most dangerous TLDs” — that is, which TLDs are most favored by threat actors. The “top” TLDs in these reports are often a mix of ccTLDs from smaller counties and <a href="https://icannwiki.org/All_New_gTLD_Applications">newer gTLDs</a>. On Radar, we are now sharing our own perspective on these dangerous TLDs, highlighting those where we have observed the largest shares of malicious and spam emails. The analysis is based on the sending domain’s TLD, found in the <code>From:</code> header of an email message. For example, if a message came from <code>joe@example.com</code>, then <code>example.com</code> is the sending domain, and <code>.com</code> is the associated TLD.</p><p>On Radar, users can view shares of spam and malicious email, and can also filter by timeframe and “type” of TLD, with options to view all (the complete list), ccTLDs (country codes), or “classic” TLDs (the original set of gTLDs specified in <a href="https://www.rfc-editor.org/rfc/rfc1591.txt">RFC 1591</a>). Note that spam percentages shown here may be lower than those published in other industry analyses. Cloudflare cloud email security customers may be performing initial spam filtering before messages arrive at Cloudflare for processing, resulting in a lower percentage of messages characterized as spam by Cloudflare.</p><p>Looking back across February 2024, we found that new gTLD <code>associates</code> and the ccTLD <code>zw</code> (Zimbabwe) were the TLDs with domains originating the largest shares of malicious email, at over 85% each. New TLDs <code>academy</code>, <code>directory</code>, and <code>bar</code> had the largest shares of spam in email sent by associated domains, at upwards of 95%.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2tvfVUvg028MjExbUn6DuB/bbe1206da0ba754aa03a41fcc87ab7f8/pasted-image-0--4-.png" />
            
            </figure><p><i>TLDs with the highest percentage of malicious email in February 2024</i></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1VeBDm1f5fYRJqZdq0ho3b/fa692e8a0ec2d3ec8970d838fdd7b0c0/pasted-image-0--5-.png" />
            
            </figure><p><i>TLDs with the highest percentage of spam email in February 2024</i></p><p>The figure below breaks out ccTLDs, where we found that at least half of the messages coming from domains in <code>zw</code> (Zimbabwe, at 85%) and <code>bd</code> (Bangladesh, at 50%) were classified as malicious. While the share of malicious email vastly outweighed the share of spam seen from <code>zw</code> domains, it was much more balanced in <code>bd</code> and <code>pw</code> (Palau). A total of 80 ccTLDs saw fewer than 1% of messages classified as malicious in February 2024.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6ngA84qYZiS1djPnyAN9K9/e7ddc092a349634b6a934ee4b8a5755e/pasted-image-0--6-.png" />
            
            </figure><p><i>ccTLDs with the highest percentage of malicious email in February 2024</i></p><p>Among the “classic” TLDs, we can see that the shares of both malicious emails and spam are relatively low. Perhaps unsurprisingly, as the largest TLD, <code>com</code> has the largest shares of both in February 2024. Given the restrictions around registering <a href="https://www.iana.org/domains/int"><code>int</code></a> and <a href="https://get.gov/domains/requirements/"><code>gov</code></a> domains, it is interesting to see that even 2% of the messages from associated domains are classified as malicious.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2iWhtYDtbuSikcDtmgGtn4/9c370938fe219018a75c13380ecb7ec7/pasted-image-0--7-.png" />
            
            </figure><p><i>Classic TLDs with the highest percentage of malicious email in February 2024.</i></p><p>The reasons that some TLDs are responsible for a greater share of malicious and/or spam email vary — some may have loose or non-existent registration requirements, some may be more friendly to so-called “<a href="https://icannwiki.org/Domain_tasting">domain tasting</a>”, and some may have particularly low domain registration fees.The <a href="https://developers.cloudflare.com/api/operations/radar-get-email-security-top-tlds-by-malicious">malicious</a> and <a href="https://developers.cloudflare.com/api/operations/radar-get-email-security-top-tlds-by-spam">spam</a> summary shares per TLD are available through the Radar API.</p>
    <div>
      <h3>Adoption of email authentication methods</h3>
      <a href="#adoption-of-email-authentication-methods">
        
      </a>
    </div>
    <p><a href="https://www.cloudflare.com/en-gb/learning/email-security/dmarc-dkim-spf/">SPF, DKIM, and DMARC</a> are three email <a href="https://www.cloudflare.com/learning/access-management/what-is-authentication/">authentication</a> methods and when used together, they help prevent spammers, <a href="https://www.cloudflare.com/learning/access-management/phishing-attack/">phishers</a>, and other unauthorized parties from sending <a href="https://www.cloudflare.com/learning/email-security/what-is-email/">emails</a> on behalf of a <a href="https://www.cloudflare.com/learning/dns/glossary/what-is-a-domain-name/">domain</a> they do not own.</p><p>Sender Policy Framework (SPF) is a way for a domain to list all the servers they send emails from, with <a href="https://www.cloudflare.com/learning/dns/dns-records/dns-spf-record/">SPF records</a> in the DNS listing the <a href="https://www.cloudflare.com/learning/dns/glossary/what-is-my-ip-address/">IP addresses</a> of all the servers that are allowed to send emails from the domain. Mail servers that receive an email message can check it against the SPF record before passing it on to the recipient's inbox. DomainKeys Identified Mail (DKIM) enables domain owners to automatically "sign" emails from their domain with a digital “signature” that uses cryptography to mathematically verify that the email came from the domain. Domain-based Message Authentication Reporting and Conformance (DMARC) tells a receiving email server what to do, given the results after checking SPF and DKIM. A domain's DMARC policy, stored in <a href="https://www.cloudflare.com/learning/dns/dns-records/dns-dmarc-record/">DMARC records</a>, can be set in a variety of ways, instructing mail servers to quarantine emails that fail SPF or DKIM (or both), to reject such emails, or to deliver them.</p><p>These authentication methods have recently taken on increased importance, as both <a href="https://blog.google/products/gmail/gmail-security-authentication-spam-protection/">Google</a> and <a href="https://blog.postmaster.yahooinc.com/post/730172167494483968/more-secure-less-spam">Yahoo!</a> have announced that during the first quarter of 2024, as part of a more aggressive effort to reduce spam, they will require bulk senders to follow <a href="https://senders.yahooinc.com/best-practices/">best practices</a> that include implementing stronger email authentication using standards like SPF, DKIM, and DMARC. When a given email message is evaluated against these three methods, the potential outcomes are PASS, FAIL, and NONE. The first two are self-explanatory, while NONE means that there was no associated SPF/DKIM/DMARC policy associated with the message’s sending domain.</p><p>Reviewing the average shares across February 2024, we find that over 93% of messages passed SPF authentication, while just 2.7% failed. When considering this metric, FAIL is the outcome of greater interest because SPF is easier to spoof than DKIM, and also because failure may be driven by “shadow IT” situations, such as when a company’s Marketing department uses a third party to send email on behalf of the company, but fails to add that third party to the associated SPF records. An average of 88.5% of messages passed DKIM evaluation in February, while just 2.1% failed. For DKIM, the focus should be on PASS, as there are potential non-malicious reasons that a given signature may fail to verify. For DMARC, 86.5% of messages passed authentication, while 4.2% failed, and the combination of PASS and FAIL is the focus, as the presence of an associated policy is of greatest interest for this metric, and whether the message passed or failed less so. For all three methods in this section, NONE indicates the lack of an associated policy. SPF (<a href="https://developers.cloudflare.com/api/operations/radar-get-email-security-summary-by-spf">summary</a>, <a href="https://developers.cloudflare.com/api/operations/radar-get-email-security-timeseries-group-by-spf">time series</a>), DKIM (<a href="https://developers.cloudflare.com/api/operations/radar-get-email-security-summary-by-dkim">summary</a>, <a href="https://developers.cloudflare.com/api/operations/radar-get-email-security-timeseries-group-by-dkim">time series</a>), and DMARC (<a href="https://developers.cloudflare.com/api/operations/radar-get-email-security-summary-by-dmarc">summary</a>, <a href="https://developers.cloudflare.com/api/operations/radar-get-email-security-timeseries-group-by-dmarc">time series</a>) data is available through the Radar API.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7D1Kfig1lHwIgoEJ3XGx8i/9ceba12b2bff559d648382e53e0412d2/Screenshot-2024-03-08-at-12.51.49.png" />
            
            </figure>
    <div>
      <h3>Protocol usage</h3>
      <a href="#protocol-usage">
        
      </a>
    </div>
    <p>Cloudflare has <a href="/introducing-cloudflares-automatic-ipv6-gatewa/">long evangelized IPv6 adoption</a>, although it has largely been focused on making Web resources available via this <a href="https://datatracker.ietf.org/doc/html/rfc2460">not-so-new version</a> of the protocol. However, it’s also important that other Internet services begin to support and use IPv6, and this is an area where <a href="/ipv6-from-dns-pov/">our recent research</a> shows that providers may be lacking.</p><p>Through analysis of inbound connections from senders’ mail servers to Cloudflare’s email servers, we can gain insight into the distribution of these connections across IPv4 and IPv6. Looking at this distribution for February 2024, we find that 95% of connections were made over IPv4, while only 5% used IPv6. This distribution is in sharp contrast to the share of IPv6 requests for IPv6-capable (dual stacked) Web content, which was 37% <a href="https://radar.cloudflare.com/adoption-and-usage?dateStart=2024-02-01&amp;dateEnd=2024-02-29#i-pv4-vs-i-pv6">for the same time period</a>. The <a href="https://developers.cloudflare.com/api/operations/radar-get-email-routing-summary-by-ip-version">summary</a> and <a href="https://developers.cloudflare.com/api/operations/radar-get-email-routing-timeseries-group-by-ip-version">time series</a> data for IPv4/v6 distribution are available through the Radar API.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2BLLzGXJ18q7LFhuRteSmG/762a81b2a5a590a69c6efd6cf0e02f02/Screenshot-2024-03-08-at-12.52.26.png" />
            
            </figure><p>Cloudflare has also been a long-time advocate for secure connections, launching <a href="/introducing-universal-ssl/">Universal SSL</a> during 2014’s Birthday Week, to enable secure connections between end users and Cloudflare for all of our customers’ sites (which numbered ~2 million at the time). Over the last 10 years, SSL has completed its evolution to <a href="https://www.cloudflare.com/learning/ssl/transport-layer-security-tls/">TLS</a>, and although many think of TLS as only being relevant for Web content, possibly due to years of being told to look for the 🔒 padlock in our browser’s address bar, TLS is also used to encrypt client/server connections across other protocols including SMTP (email), FTP (file transfer), and XMPP (messaging).</p><p>Similar to the IPv4/v6 analysis discussed above, we can also calculate the share of inbound connections to Cloudflare’s email servers that are using TLS. Messages are encrypted in transit when the connection is made over TLS, while messages sent over unencrypted connections can potentially be read or modified in transit. Fortunately, the vast majority of messages received by Cloudflare’s email servers are made over encrypted connections, with just 6% sent unencrypted during February 2024. The <a href="https://developers.cloudflare.com/api/operations/radar-get-email-security-summary-by-tls-version">summary</a> and <a href="https://developers.cloudflare.com/api/operations/radar-get-email-security-timeseries-group-by-tls-version">time series</a> data for TLS usage are available through the Radar API.</p>
    <div>
      <h3>Conclusion</h3>
      <a href="#conclusion">
        
      </a>
    </div>
    <p>Although younger Internet users may eschew email in favor of communicating through a variety of messaging apps, email remains an absolutely essential Internet service, relied on by individuals, enterprises, online and offline retailers, governments, and more. However, because email is so ubiquitous, important, and inexpensive, it has also become an attractive threat vector. Cloudflare’s email <a href="https://www.cloudflare.com/developer-platform/email-routing/">routing</a> and <a href="https://www.cloudflare.com/zero-trust/products/email-security/">security</a> services help customers manage and secure their email, and Cloudflare Radar’s new <a href="https://radar.cloudflare.com/email-security">Email Security section</a> can help security researchers, email administrators, and other interested parties understand the latest trends around threats found in malicious email, sources of spam and malicious email, and the adoption of technologies designed to prevent abuse of email.</p><p>If you have any questions about this new section, you can contact the Cloudflare Radar team at <a>radar@cloudflare.com</a> or on social media at <a href="https://twitter.com/CloudflareRadar">@CloudflareRadar</a> (X/Twitter), <a href="https://noc.social/@cloudflareradar">https://noc.social/@cloudflareradar</a> (Mastodon), and <a href="https://bsky.app/profile/radar.cloudflare.com">radar.cloudflare.com</a> (Bluesky).</p><div>
  
</div><p>Tune in for more news, announcements and thought-provoking discussions! Don't miss the full <a href="https://cloudflare.tv/shows/security-week">Security Week hub page</a>.</p> ]]></content:encoded>
            <category><![CDATA[Security Week]]></category>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[Email]]></category>
            <category><![CDATA[Email Routing]]></category>
            <category><![CDATA[Email Security]]></category>
            <category><![CDATA[Trends]]></category>
            <guid isPermaLink="false">7oGmED46jTkj7AiKDzGujo</guid>
            <dc:creator>David Belson</dc:creator>
        </item>
        <item>
            <title><![CDATA[Cloudflare Email Security now works with CrowdStrike Falcon LogScale]]></title>
            <link>https://blog.cloudflare.com/cloudflare-email-security-now-works-with-crowdstrike-falcon-logscale/</link>
            <pubDate>Thu, 21 Sep 2023 13:00:27 GMT</pubDate>
            <description><![CDATA[ With this integration, joint customers who have both Falcon LogScale and Cloudflare Email Security can now send detection data to be ingested and displayed within their Falcon LogScale dashboard ]]></description>
            <content:encoded><![CDATA[ 
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/FquuHyDPsMcYwbXrqCMn8/0c5b2fec070a0ddf8eb8df42fdcc668a/image5-1.png" />
            
            </figure><p>We are excited to announce an extended partnership between CrowdStrike and Cloudflare to bring together <a href="https://www.cloudflare.com/zero-trust/products/email-security/">Cloudflare Email Security</a> and CrowdStrike Falcon® LogScale. With this integration, joint customers who have both Falcon LogScale and Cloudflare Email Security can now send detection data to be ingested and displayed within their Falcon LogScale dashboard.</p>
    <div>
      <h3>What is CrowdStrike Falcon LogScale?</h3>
      <a href="#what-is-crowdstrike-falcon-logscale">
        
      </a>
    </div>
    <p>CrowdStrike Falcon LogScale enables organizations to ingest, aggregate and analyze massive volumes of streaming log data from a wide array of sources at petabyte scale. It offers search and visualization capabilities, enabling users to easily query and explore their log data to gain valuable insights and identify security threats or anomalies.</p><p>Falcon LogScale helps customers by providing:</p><p><b>Log Ingestion</b> It supports the collection of logs from diverse sources and can handle high volumes of log data in real time.</p><p><b>Real-Time Search</b> Users can perform fast searches across their log data, enabling quick detection and investigation of security incidents or operational issues.</p><p><b>Dashboards and Visualizations</b> Falcon LogScale offers customizable dashboards and visualizations to help teams gain insights from their log data.</p><p>All of these capabilities enable proactive threat hunting by leveraging advanced analytics. It helps security teams identify potential threats, detect anomalies, and quickly remediate security incidents. Falcon LogScale is designed to handle large-scale log data ingestion and analysis. It can scale to accommodate <a href="https://www.cloudflare.com/learning/performance/log-retention-best-practices/">growing log volumes</a> and provide consistent performance.</p><p>Falcon LogScale is the solution for organizations that are looking to consolidate their log management and analysis efforts. It makes monitoring and securing their environments effective and efficient.</p>
    <div>
      <h3>How Cloudflare Email works with Falcon LogScale</h3>
      <a href="#how-cloudflare-email-works-with-falcon-logscale">
        
      </a>
    </div>
    <p>Customers who have both Cloudflare Email Security and CrowdStrike Falcon LogScale can now send detection data to Falcon LogScale. Within Falcon LogScale, this detection information can be visualized and queried.</p><p>To set up Cloudflare Email Security detections to flow into Falcon LogScale, navigate to the Settings section and choose the Marketplace tab in the lefthand toolbar, as shown in the screenshot below.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4WABmFgLPIpepczMvGOlFh/69ac599cc39729cad37b28430a446070/image2.png" />
            
            </figure><p>After installing the package, an ingest token needs to be generated. Navigate to the “Ingest Tokens” tab under Settings and create one.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5gV4sogmc8QmbhHzFsrYCO/23d16e335db132bacabd9bb7b735ddd0/image4-1.png" />
            
            </figure><p>Copy the ingest token to save it for later. From here, customers can navigate to the Cloudflare Email Security dashboard, go to the Settings section, select the Alert Webhooks tab and choose “+ New Webhook”. Then click the SIEM option, choose Other from the dropdown, and input the following information:</p><p><b>Auth Token:</b> Bearer [INGEST TOKEN]<b>Target:</b> <a href="https://cloud.community.humio.com/api/v1/ingest/hec/raw">https://cloud.community.humio.com/api/v1/ingest/hec/raw</a></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/gXAcCOsoN71yC2Kn9DJwV/8d1bdf8c1cf7c85b8b7bc90003dd8fbf/Screenshot-2023-09-08-at-10.31.26.png" />
            
            </figure><p>Customers can choose which events to send to Falcon LogScale by selecting the expanded option. In the screenshot above, the user has chosen to only send malicious and suspicious detections.</p><p>A few minutes after creating a new webhook, Cloudflare Email Security will start sending detection data to the Falcon LogScale instance.</p><p>When the Cloudflare Email Security package from the Falcon LogScale marketplace is installed, customers are provided with a parser for field extraction and out-of-box content through a dashboard. The parser allows the Falcon LogScale product to be able to query the detection data while the dashboard allows organizations to quickly get the relevant information about their email security. Below is what the dashboard looks like:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4uDCtxex6GqQIyBWncKjZp/4fc41be69ec551d11f0c766d8b4f94a3/image3-2.png" />
            
            </figure><p>As you can see, we have included visualizations and queries to get teams up and running quickly, but it is meant to be a starting point for customers to build on. Customers can write their own queries and use them to create their own widgets. From there, they can create their own rendition of this dashboard to fit their needs.</p><p>More information about setting up this integration can be found here: <a href="https://library.humio.com/integrations/integrations-cloudflare-package-area1.html">https://library.humio.com/integrations/integrations-cloudflare-package-area1.html</a></p>
    <div>
      <h3>What’s next</h3>
      <a href="#whats-next">
        
      </a>
    </div>
    <p>We are currently looking to expand the integration of Cloudflare products with Falcon LogScale. Our plan is to extend the integration to the remaining components of the Zero Trust Suite, enabling the relaying of logs and detection data to Falcon LogScale. This will allow customers to visualize and analyze data from these products, similar to the existing Cloudflare Email Security integration. If you are interested and would like to learn more, please reach out to your Cloudflare account contact.</p> ]]></content:encoded>
            <category><![CDATA[Email Security]]></category>
            <category><![CDATA[CrowdStrike]]></category>
            <category><![CDATA[Partners]]></category>
            <category><![CDATA[Product News]]></category>
            <guid isPermaLink="false">5AP5vOnMtPTlQoO8ixyJNs</guid>
            <dc:creator>Ayush Kumar</dc:creator>
            <dc:creator>John Smith (Guest Author)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Introducing Cloudflare's 2023 phishing threats report]]></title>
            <link>https://blog.cloudflare.com/2023-phishing-report/</link>
            <pubDate>Wed, 16 Aug 2023 09:13:17 GMT</pubDate>
            <description><![CDATA[ The 2023 Phishing Threats Report analyzes millions of malicious emails, brand impersonation examples, identity deception and other key attack trends based on email security data from a 12-month period ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4zKdGorR5BXoIDN9iE1c2y/ef2bc7e7b92d5b73dd48caba515210bb/Introducing-Cloudflare-2023-phishing-threats-report-1.png" />
            
            </figure><p>After shutting down a ‘phishing-as-a-service’ operation that impacted thousands of victims in 43 countries, INTERPOL recently <a href="https://www.interpol.int/en/News-and-Events/News/2023/Notorious-phishing-platform-shut-down-arrests-in-international-police-operation?">noted</a>, “Cyberattacks such as phishing may be borderless and virtual in nature, but their impact on victims is real and devastating.” Business email compromise (<a href="https://www.cloudflare.com/learning/email-security/business-email-compromise-bec/">BEC</a>), a type of malware-less attack that tricks recipients into transferring funds — for example — has <a href="https://www.ic3.gov/Media/Y2023/PSA230609">cost</a> victims worldwide more than $50 billion, according to the FBI.</p><p>It is estimated that 90% of successful cyber attacks <a href="https://www.cisa.gov/shields-guidance-families">start</a> with email <a href="https://www.cloudflare.com/learning/access-management/phishing-attack/">phishing</a>, which continues to be very lucrative for attackers. There is not much today that can be done to stop phishing <i>attempts</i>. However, to <a href="https://www.cloudflare.com/learning/email-security/how-to-prevent-phishing/">prevent <i>successful</i> attacks</a>, it is important to understand (and proactively address) evolving phishing trends — including the ways attackers cleverly exploit intended victims’ trust in “known” email senders. To that end, this week Cloudflare published its first <a href="https://www.cloudflare.com/lp/2023-phishing-report/">Phishing Threats Report</a>.</p><p>This report explores key phishing trends and related recommendations, based on <a href="https://www.cloudflare.com/zero-trust/products/email-security/">email security</a> data from May 2022 to May 2023. During that time, Cloudflare <b>processed approximately 13 billion emails</b>, which included blocking approximately <b>250 million malicious messages</b> from reaching customers’ inboxes. The report is also informed by a Cloudflare-commissioned <b>survey of 316 security decision-makers</b> across North America, EMEA, and APAC (you can download that separate study <a href="https://www.cloudflare.com/lp/zero-trust-to-combat-multichannel-phishing/">here</a>).</p><p>Check out the full report to understand our three key takeaways:</p><ul><li><p><b>Attackers using deceptive links as the #1 phishing tactic</b> — and how they are evolving how they get you to click and when they weaponize the link;</p></li><li><p><b>Identity deception</b> takes multiple forms (including business email compromise (BEC) and brand impersonation), <b>and can easily bypass email authentication standards;</b></p></li><li><p>Attackers pretend to be hundreds of different organizations, but they <b>primarily impersonate the entities we trust</b> and need to get work done.</p></li></ul><p>Here are a few other things to keep in mind as you read the 2023 Phishing Threats report.</p>
    <div>
      <h3>Email threat categorization</h3>
      <a href="#email-threat-categorization">
        
      </a>
    </div>
    <p>Attackers typically use a combination of <a href="https://www.cloudflare.com/learning/security/threats/social-engineering-attack/">social engineering</a> and technical obfuscation techniques to make their messages seem legitimate. Therefore, Cloudflare uses a number of advanced detection techniques to analyze “fuzzy” signals (not just content that’s visible to the naked eye) to identify unwanted emails. Those signals include:</p><ul><li><p><b>Structural analysis</b> of headers, body copy, images, links, attachments, payloads, and more, using heuristics and <a href="https://www.cloudflare.com/learning/ai/what-is-machine-learning/">machine learning models</a> specifically designed for phishing signals;</p></li><li><p><b>Sentiment analysis</b> to detect changes in patterns and behaviors (e.g., writing patterns and expressions);</p></li><li><p><b>Trust graphs</b> that evaluate partner social graphs, email sending history, and potential partner impersonations</p></li></ul><p>Our <a href="https://www.cloudflare.com/zero-trust/solutions/email-security-services/">email security service</a> also incorporates <a href="https://www.cloudflare.com/learning/security/glossary/threat-intelligence-feed/">threat intelligence</a> from Cloudflare’s global network, which blocks an average of 140 billion cyber threats each day.</p><p>Those and many other signals lead to email dispositions of malicious, BEC, spoof, or spam; our dashboard tells customers the specific reasons (i.e., the threat indicator ‘categories’) for a particular email disposition.</p><p>Below is a snapshot of the top email threat indicators we observed between May 2, 2022, to May 2, 2023. We categorize threat indicators into more than 30 different categories; over that period, the top threat indicators included <b>deceptive links</b>, <b>domain age</b> (newly registered domains), <b>identity deception</b>, <b>credential harvesting</b>, and <b>brand impersonation</b>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/JfZOoAKRayGTRMdjkwQOn/502f97161f6cdd8ba4614e299e5f6fc9/image4-6.png" />
            
            </figure><p>Below are brief descriptions of each of the top categories (detailed in more depth in the report’s appendix).</p><p>If clicked, a <b>deceptive link</b> will open the user’s default web browser and render the data referenced in the link, or open an application directly (e.g. a PDF). Since the display text for a link (i.e., hypertext) in HTML can be arbitrarily set, attackers can make a URL appear as if it links to a benign site when, in fact, it is actually malicious.</p><p><b>Domain age</b> is related to domain reputation, which is the overall score assigned to a domain.  For example, domains that send out numerous new emails immediately after domain registration will tend to have a poorer reputation, and thus a lower score.</p><p><b>Identity deception</b> occurs when an attacker or someone with malicious intent sends an email claiming to be someone else. The mechanisms and tactics of this vary widely. Some tactics include registering domains that look similar (aka domain impersonation), are spoofed, or use display name tricks to appear to be sourced from a trusted domain. Other variations include sending email using domain fronting and high-reputation web services platforms.</p><p><b>Credential harvesters</b> are set up by an attacker to deceive users into providing their login credentials. Unwitting users may enter their credentials, ultimately providing attackers with access to their accounts.</p><p><b>Brand impersonation</b> is a form of identity deception where an attacker sends a phishing message that impersonates a recognizable company or brand. Brand impersonation is conducted using a wide range of techniques.</p><p>An <b>attachment</b> to an email that, when opened or executed in the context of an attack, includes a call-to-action (e.g. lures target to click a link) or performs a series of actions set by an attacker.</p><p>Cloudflare regularly observes multiple threat indicators in one phishing email. For example, one Silicon Valley Bank-themed phishing campaign (detailed in <a href="/how-sophisticated-scammers-and-phishers-are-preying-on-customers-of-silicon-valley-bank/">this</a> March 2023 blog) combined <i>brand impersonation</i> with a <i>deceptive link</i> and <i>malicious attachment</i>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4uyngezMfEcC6gf784nyV6/225bc53f509017a05329698ccea01c74/image3-5.png" />
            
            </figure><p>The attackers leveraged the SVB brand in a DocuSign-themed template. The email included HTML code that contains an initial link and a complex redirect chain that is four deep. The included HTML file in the attack would have sent the recipient to a WordPress instance that has recursive redirection capability.</p><p>(Speaking of links, deceptive links were the <b>#1 threat category,</b> appearing in <b>35.6% of our detections</b>. And attackers aren’t just using links in email channels; the rise of multi-channel phishing threats — which exploit other applications such as SMS/text, chat, and social media — are also covered in the report).</p>
    <div>
      <h3>Trusted (and most impersonated) brands</h3>
      <a href="#trusted-and-most-impersonated-brands">
        
      </a>
    </div>
    <p>Silicon Valley Bank was just one of <b>approximately 1,000 different brands</b> we observed being impersonated in emails targeting Cloudflare customers between May 2022 and May 2023. (Cloudflare employees were directly targeted via brand impersonation in the “Oktapus” phishing attack that the <a href="https://www.cloudflare.com/cloudflare-one/">Cloudflare One</a> suite of products <a href="/2022-07-sms-phishing-attacks/">thwarted</a> in July 2022).</p><p>However, as detailed in the Phishing Threats Report, we observed that email attackers most often (51.7% of the time) impersonated one of 20 well-known global brands, with <b>Microsoft</b> being #1 on their list.</p>
<table>
<thead>
  <tr>
    <th><span>Rank</span></th>
    <th><span>Impersonated brand</span></th>
  </tr>
</thead>
<tbody>
  <tr>
    <td><span>1</span></td>
    <td><span>Microsoft</span></td>
  </tr>
  <tr>
    <td><span>2</span></td>
    <td><span>World Health Organization</span></td>
  </tr>
  <tr>
    <td><span>3</span></td>
    <td><span>Google</span></td>
  </tr>
  <tr>
    <td><span>4</span></td>
    <td><span>SpaceX</span></td>
  </tr>
  <tr>
    <td><span>5</span></td>
    <td><span>Salesforce</span></td>
  </tr>
  <tr>
    <td><span>6</span></td>
    <td><span>Apple</span></td>
  </tr>
  <tr>
    <td><span>7</span></td>
    <td><span>Amazon</span></td>
  </tr>
  <tr>
    <td><span>8</span></td>
    <td><span>T-Mobile</span></td>
  </tr>
  <tr>
    <td><span>9</span></td>
    <td><span>YouTube</span></td>
  </tr>
  <tr>
    <td><span>10</span></td>
    <td><span>MasterCard</span></td>
  </tr>
  <tr>
    <td><span>11</span></td>
    <td><span>Notion.so</span></td>
  </tr>
  <tr>
    <td><span>12</span></td>
    <td><span>Comcast</span></td>
  </tr>
  <tr>
    <td><span>13</span></td>
    <td><span>Line Pay</span></td>
  </tr>
  <tr>
    <td><span>14</span></td>
    <td><span>MasterClass</span></td>
  </tr>
  <tr>
    <td><span>15</span></td>
    <td><span>Box</span></td>
  </tr>
  <tr>
    <td><span>16</span></td>
    <td><span>Truist Financial Corp</span></td>
  </tr>
  <tr>
    <td><span>17</span></td>
    <td><span>Facebook</span></td>
  </tr>
  <tr>
    <td><span>18</span></td>
    <td><span>Instagram</span></td>
  </tr>
  <tr>
    <td><span>19</span></td>
    <td><span>AT&amp;T</span></td>
  </tr>
  <tr>
    <td><span>20</span></td>
    <td><span>Louis Vuitton</span></td>
  </tr>
</tbody>
</table>
    <div>
      <h3>Example of a Microsoft credential harvesting attempt</h3>
      <a href="#example-of-a-microsoft-credential-harvesting-attempt">
        
      </a>
    </div>
    <p>Earlier this year, Cloudflare detected and blocked a phishing campaign leveraging the Microsoft brand in an attempt to harvest credentials through a legitimate — but compromised — site.</p><p>In the email example below, there is no text in the body of the email despite its appearance. The entire body is a hyperlinked JPEG image. Thus, if the recipient clicks anywhere in the body (even if they don’t intend to click the link), they are effectively clicking the link.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7awKbnZvPkxboytqFmUaGl/7506202a224e5b3ee8736074d7d7e7d0/image1-16.png" />
            
            </figure><p>Initially, the hyperlink for this image appears to be a benign Baidu URL - hxxp://www.baidu[.]com/link?url=-yee3T9X9U41UHUa3VV6lx1j5eX2EoI6XpZqfDgDcf-2NYQ8RVpOn5OYkDTuk8Wg#&lt;recipient’s email address base64 encoded&gt;.  However, if this link is clicked, the target’s browser would be redirected to a site that had been compromised and used to host a credential harvester.</p><p>The attacker used Microsoft Office 365 branding, but attempted to circumvent any brand detection techniques by including the brand information within the image (i.e., there was no plaintext or HTML text that could be inspected to identify the brand).</p><p>However, using optical character recognition (OCR), Cloudflare successfully identified “Office 365” and “Microsoft” in the image. Using OCR, we also identified the use of suspicious account lures related to passwords.</p><p>In this example, attackers’ techniques included:</p><ul><li><p>Inclusion of only a JPEG image (impossible to detect words without OCR)</p></li><li><p>Embedding a hyperlink in that image (clicking anywhere in the body would result in clicking the link)</p></li><li><p>Hyperlinking to a Baidu URL (used to bypass reputation-based URL detection techniques)</p></li><li><p>The Baidu URL redirecting the recipient’s browser to a credential harvesting site (i.e., would circumvent other email security defenses that are not capable of deep link inspection)</p></li><li><p>Hosting the credential harvester on a legitimate site that had been compromised by the attacker (even with deep link inspection, will again attempt to bypass URL detection techniques based on reputation)</p></li></ul><p>This attack vector leverages the high reputation and authenticity of Baidu to bypass the reputation of the true host/IP where the credential harvester is hosted.</p><p>While this specific campaign focused on harvesting Microsoft credentials, we often see attackers using similar methods to bypass brand detection techniques and trick victims into downloading <a href="https://www.cloudflare.com/learning/ddos/glossary/malware/">malware</a> and other <a href="https://www.cloudflare.com/learning/security/glossary/malicious-payload/">malicious payloads</a>.</p><p>URL redirection techniques are often seen in phishing campaigns, but threat actors are continuing to refine their approach by abusing more and more legitimate domains like <a href="http://baidu.com">baidu.com</a>, <a href="http://bing.com">bing.com</a>, <a href="http://goo.gl">goo.gl</a>, etc. Our numerous detection capabilities allow us to conduct deep link inspection of URLs using redirection techniques of all kinds, including those that abuse legitimate domains.</p>
    <div>
      <h3>What about SPF, DKIM, and DMARC?</h3>
      <a href="#what-about-spf-dkim-and-dmarc">
        
      </a>
    </div>
    <p>Email authentication (specifically the <a href="https://www.cloudflare.com/learning/email-security/dmarc-dkim-spf/">SPF, DKIM, and DMARC</a> standards) are often mentioned as useful against brand impersonation: these standards help validate server and tenant origins, protect message integrity, provide policy enforcement, and more.</p><p>However, attackers can still find ways to bypass authentication to trick email suites; and we actually observed that <b>89% of unwanted messages “passed”</b> SPF, DKIM, and/or DMARC checks.</p><p>Some limitations of email authentication include:</p>
<table>
<thead>
  <tr>
    <th><span>SPF  </span><br /><span>(Sender Policy Framework)</span></th>
    <th><span>Key benefits:</span><br /><span>Validating server origin (i.e., validates where a message originates from)</span><br /><span>Defining which email servers and services are allowed to send messages on a domain owner’s behalf</span></th>
  </tr>
  <tr>
    <th><span>Limitations:</span><br /><span>Does not prevent lookalike email, domain, or display name </span><a href="https://www.cloudflare.com/learning/ssl/what-is-domain-spoofing/"><span>spoofing</span></a><br /><span>Does not validate the “From” header; uses envelope “From” to determine sending domain</span><br /><span>Validation ineffective when emails are forwarded or when messages sent to a mailing list are sent to each subscriber </span><br /><span>SPF evaluation process can be limited to a certain number of </span><a href="https://www.cloudflare.com/learning/dns/what-is-dns/"><span>DNS</span></a><span> lookups</span><br /><span>Does not protect against attacks using “validated” emails with embedded URLs, </span><a href="https://www.cloudflare.com/learning/security/glossary/malicious-payload/"><span>malicious payloads</span></a><span>, or attachments</span></th>
  </tr>
</thead>
<tbody>
  <tr>
    <td><span>DKIM </span><br /><span>(Domain Keys Identified Mail)</span></td>
    <td><span>Key benefits:</span><br /><span>Providing tenant origin validation (i.e., checks that an email was sent/authorized by the owner of the domain via a digital signature)</span><br /><span>Ensuring email is not altered while transferred from server to server; protecting message integrity</span></td>
  </tr>
  <tr>
    <td><span>Limitations:</span><br /><span>Does not prevent lookalike email, domain, or display name spoofing</span><br /><span>Does not protect against </span><a href="https://developers.cloudflare.com/magic-wan/reference/anti-replay-protection/"><span>replay attacks</span></a><span> (DKIM only signs specific parts of a message. Attackers can add other header fields to emails passing DKIM then forward them.)</span><br /><span>Does not protect against attacks using “validated” emails with embedded URLs, malicious payloads or attachments</span></td>
  </tr>
  <tr>
    <td><span>DMARC (Domain-based Message Authentication, Reporting and Conformance)</span></td>
    <td><span>Key benefits:</span><br /><span>Providing policy enforcement and reporting for SPF and DKIM</span><br /><span>Stipulating what policy to follow if an email doesn’t pass SPF or DKIM authentication (e.g. reject/delete, quarantine, no policy/send)</span><br /><span>Reporting function allows domain owners to see who is sending email on their behalf (i.e., protecting against spoofing of your own domain and brand abuse)</span></td>
  </tr>
  <tr>
    <td><span>Limitations: </span><br /><span>Does not prevent spoofing of another brand’s domain</span><br /><span>Does not prevent lookalike email, domain, or display name spoofing</span><br /><span>Domain owners specify what percentage of mail DMARC policies it applies to; application percentages of less than 100% are less effective</span><br /><span>Does not protect against attacks using “validated” emails with embedded URLs, malicious payloads or attachments</span></td>
  </tr>
</tbody>
</table>
    <div>
      <h3>Conclusions</h3>
      <a href="#conclusions">
        
      </a>
    </div>
    <p>Attackers are constantly evolving their tactics. Multiple protection layers must be enacted before, during, and after messages reach the inbox. Cloudflare never inherently “trusts” any type of email communication (whether it appears to be internal, external, or from a ‘known’ business partner).</p><p>Likewise, we recommend that — first and foremost — all organizations extend the <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust security model</a> of “never trust, always verify” not just to the network and applications, but also to the email inbox.</p><p>In addition to <a href="https://www.cloudflare.com/zero-trust/products/email-security/">securing email</a> with a Zero Trust approach, we also recommend:</p><ul><li><p><b>Augmenting cloud email with multiple anti-phishing controls.</b> As noted in <a href="https://www.forrester.com/blogs/announcing-the-forrester-wave-enterprise-email-security-q2-2023/">this</a> Forrester blog from June, <i>“The use of messaging, collaboration, file sharing, and enterprise software-as-a-service applications across multiple devices all contribute to employee productivity and experience. Many of these environments are considered ‘closed,’ but one successful phish of a supply chain partner’s credentials opens your organization up to data loss, credential theft, fraud, and ransomware attacks. Protections developed for the email inbox must extend to these environments and throughout the day-to-day workflows of your employees.”</i></p></li><li><p><b>Adopting phishing-resistant multifactor authentication (</b><a href="https://www.cloudflare.com/learning/access-management/what-is-multi-factor-authentication/"><b>MFA</b></a><b>).</b> While not all MFA provides the same layer of security, hardware security keys are among the most secure authentication methods for <a href="/how-cloudflare-implemented-fido2-and-zero-trust/">preventing successful phishing attacks</a>. They can protect networks even if attackers gain access to usernames and passwords.</p></li><li><p><b>Make it harder for humans to make mistakes.</b>  Meet employees and teams where they are by making the tools they already use more secure, and preventing them from making mistakes. For example, remote browser isolation (<a href="https://www.cloudflare.com/learning/access-management/what-is-browser-isolation/">RBI</a>) technology, when integrated with <a href="https://www.cloudflare.com/learning/email-security/what-is-email-security/">cloud email security</a>, can automatically isolate suspicious email links to prevent users from being exposed to potentially malicious web content. Keyboard inputs can also be disabled on untrusted websites, protecting users from accidentally entering sensitive information within a form fill or credential harvesting. This provides a layer of defense against multi-channel phishing attacks by effectively allowing users to safely open links without disrupting their workflow.</p></li></ul><p>If you’re interested in the full findings, you can download the 2023 Phishing Threats Report <a href="https://www.cloudflare.com/lp/2023-phishing-report/">here</a>, as well as our recommendations for preventing successful phishing attacks. And if you’d like to see Cloudflare’s email security in action, you can request a free phishing risk assessment <a href="https://www.cloudflare.com/lp/emailsecurity/">here</a>.</p> ]]></content:encoded>
            <category><![CDATA[Email Security]]></category>
            <category><![CDATA[Phishing]]></category>
            <category><![CDATA[Cloud Email Security]]></category>
            <guid isPermaLink="false">5r8tVebXSz3ESgfdLHjC7X</guid>
            <dc:creator>Elaine Dzuba</dc:creator>
            <dc:creator>Juliette Cash</dc:creator>
        </item>
        <item>
            <title><![CDATA[Cloudflare Area 1 earns SOC 2 report]]></title>
            <link>https://blog.cloudflare.com/area-1-earns-soc-2-report/</link>
            <pubDate>Thu, 08 Jun 2023 14:00:06 GMT</pubDate>
            <description><![CDATA[ Many customers want assurance that the sensitive information they send to us can be kept safe. One of the best ways to provide this assurance is a SOC 2 Type II report ]]></description>
            <content:encoded><![CDATA[ <p></p><p><a href="https://www.cloudflare.com/zero-trust/products/email-security/">Cloudflare Area 1</a> is a cloud-native <a href="https://www.cloudflare.com/zero-trust/solutions/email-security-services/">email security service</a> that identifies and blocks attacks before they hit user inboxes, enabling more effective protection against <a href="https://www.cloudflare.com/learning/access-management/spear-phishing/">spear phishing</a>, <a href="https://www.cloudflare.com/learning/email-security/business-email-compromise-bec/">Business Email Compromise</a> (BEC), and other advanced threats. Cloudflare Area 1 is part of the <a href="https://www.cloudflare.com/en-gb/zero-trust-hub/">Cloudflare Zero Trust platform</a> and an essential component of a modern security and compliance strategy, helping organizations to reduce their attackers surface, detect and respond to threats faster, and improve compliance with industry regulations and security standards.</p><p>This announcement is another step in our commitment to remaining strong in our security posture.</p>
    <div>
      <h2>Our SOC 2 Journey</h2>
      <a href="#our-soc-2-journey">
        
      </a>
    </div>
    <p>Many customers want assurance that the sensitive information they send to us can be kept safe. One of the best ways to provide this assurance is a <a href="https://us.aicpa.org/interestareas/frc/assuranceadvisoryservices/serviceorganization-smanagement">SOC 2 Type II report</a>. We decided to obtain the report as it is the best way for us to demonstrate the controls we have in place to keep Cloudflare Area 1 and its infrastructure secure and available.  </p><p>Cloudflare Area 1’s SOC 2 Type II report covers a 3 month period from 1 January 2023 to 31 March 2023. Our auditors assessed the operating effectiveness of the 70 controls we’ve implemented to meet the <a href="https://www.aicpa-cima.com/resources/download/2017-trust-services-criteria-with-revised-points-of-focus-2022">Trust Services Criteria</a> for Security, Confidentiality, and Availability.</p><p>We anticipate that the next ask from our customers will be for a SOC 2 Type II report that covers a longer reporting period, so we’ve decided to expand our scope for the Cloudflare Global Cloud Platform SOC 2 Type II report to be inclusive of Cloudflare Area 1 later on this year.</p><p>We are thrilled to reach this milestone and will continue to stay committed to be one of the most trusted platforms.</p><p>For a copy of Cloudflare Area 1’s SOC 2 Type II report, existing customers can obtain one through the <a href="https://developers.cloudflare.com/fundamentals/get-started/basic-tasks/access-compliance-docs/">Cloudflare Dashboard</a>; new customers may also request a copy from your sales representative. For the latest information about our certifications and reports, please visit <a href="https://www.cloudflare.com/trust-hub/compliance-resources/">our Trust Hub</a>.</p> ]]></content:encoded>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Compliance]]></category>
            <category><![CDATA[Certification]]></category>
            <category><![CDATA[Area 1 Security]]></category>
            <category><![CDATA[Cloud Email Security]]></category>
            <category><![CDATA[Email Security]]></category>
            <guid isPermaLink="false">3fXSrjEi1CSSNf11nivFJ</guid>
            <dc:creator>Samuel Vieira</dc:creator>
            <dc:creator>Paul East</dc:creator>
        </item>
        <item>
            <title><![CDATA[Cloudflare partners with KnowBe4 to equip organizations with real-time security coaching to avoid phishing attacks]]></title>
            <link>https://blog.cloudflare.com/knowbe4-emailsecurity-integration/</link>
            <pubDate>Fri, 17 Mar 2023 13:00:00 GMT</pubDate>
            <description><![CDATA[ Cloudflare’s Area 1 Solution works with Knowbe4 to provide customers with security and awareness training ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Today, we are very excited to announce that Cloudflare’s <a href="https://www.cloudflare.com/zero-trust/products/email-security/">cloud email security solution</a>, Area 1, now integrates with KnowBe4, a leading security awareness training and simulated phishing platform. This integration allows mutual customers to offer real-time coaching to their employees when a phishing campaign is detected by Cloudflare’s email security solution.</p><p>We are all aware that phishing attacks often use email as a vector to deliver the <a href="https://www.cloudflare.com/learning/email-security/what-is-email-fraud/">fraudulent message</a>. Cybercriminals use a range of tactics, such as posing as a trustworthy organization, using urgent or threatening language, or creating a sense of urgency to entice the recipient to click on a link or download an attachment.</p><p>Despite the increasing sophistication of these attacks and the solutions to stop them, human error remains the weakest link in this chain of events. This is because humans can be easily manipulated or deceived, especially when they are distracted or rushed. For example, an employee might accidentally click on a link in an email that looks legitimate but is actually a phishing attempt, or they might enter their password into a fake login page without realizing it. According to the 2021 Verizon Data Breach Investigations Report, phishing was the most common form of social engineering attack, accounting for 36% of all breaches. The report also noted that 85% of all breaches involved a human element, such as human error or social engineering.</p><p>Therefore, it is essential to educate and train individuals on how to recognize and avoid phishing attacks. This includes raising awareness of common phishing tactics and training individuals to scrutinize emails carefully before clicking on any links or downloading attachments.</p>
    <div>
      <h2>Area1 integrates with KnowBe4</h2>
      <a href="#area1-integrates-with-knowbe4">
        
      </a>
    </div>
    <p>Our integration allows for the seamless integration of Cloudflare’s advanced email security capabilities with KnowBe4's Security Awareness Training platform, KSMAT, and its real-time coaching product, SecurityCoach. This means that organizations using both products can now benefit from an added layer of security that detects and prevents email-based threats in real-time while also training employees to recognize and avoid such threats.</p><p>Organizations can offer real-time security coaching to their employees whenever our <a href="https://www.cloudflare.com/zero-trust/solutions/email-security-services/">email security solution</a> detects four types of events: <b>malicious attachments, malicious links, spoofed emails, and suspicious emails</b>. IT or security professionals can configure their real-time coaching campaigns to immediately deliver relevant training to their users related to a detected event.</p><blockquote><p>“KnowBe4 is proud to partner with Cloudflare to provide a seamless integration with our new SecurityCoach product, which aims to deliver real-time security coaching and advice to help end users enhance their cybersecurity knowledge and strengthen their role in contributing to a strong security culture. KnowBe4 is actively working with Cloudflare to provide an API-based integration to connect our platform with systems that IT/security professionals already utilize, making rolling out new products to their teams an easy and unified process.”- <b>Stu Sjouwerman</b>, CEO, KnowBe4</p></blockquote><p>By using the integration, organizations can ensure that their employees are not only protected by advanced security technology that detects and blocks malicious emails, but are also educated on how to identify and avoid these threats. This has been a commonly demanded feature from our customers and we have made it simple for them to implement it.</p>
    <div>
      <h2>How it works</h2>
      <a href="#how-it-works">
        
      </a>
    </div>
    
    <div>
      <h3>Create private key and public key in the Area 1 dashboard</h3>
      <a href="#create-private-key-and-public-key-in-the-area-1-dashboard">
        
      </a>
    </div>
    <p>Before you can set up this integration in your KnowBe4 (KMSAT) console, you will need to create a private key and public key with Cloudflare.</p><ul><li><p>Log in to your Cloudflare Area 1 email security console as an admin.</p></li><li><p>Click the gear icon in the top-right corner of the page, and then navigate to the Service Accounts tab.</p></li></ul>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2ey4jNQI1pauKRiKZdISs3/a4b3eb87ba6a20cf3b23b49ac4f597f1/image6-9.png" />
            
            </figure><ul><li><p>Click + Add Service Account.</p></li></ul>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/467yKdAIBCimqDsTP8zKAl/4233d948c28b71f5dc2439f35e45dc9b/image8-1.png" />
            
            </figure><ul><li><p>In the NAME field, enter a name for your new service account.</p></li></ul>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4H0CPpuEfrWdymJ2FPFIc5/6e49f1c54cfb70a515e738e9eb1a5a20/image2-21.png" />
            
            </figure><ul><li><p>Click + Create Service Account.</p></li><li><p>In the pop-up window that opens, copy and save the private key somewhere that you can easily access. You will need this key to complete the setup process in the Set Up the Integration in your KnowBe4 (KMSAT) Console section below.</p></li></ul>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4NaqxVtLLs9rKZQNliM7A4/7f8a4b304dde7dd1e87807ef59888398/image4-12.png" />
            
            </figure>
    <div>
      <h3>Set up the integration in your KnowBe4 (KMSAT) Console</h3>
      <a href="#set-up-the-integration-in-your-knowbe4-kmsat-console">
        
      </a>
    </div>
    <p>Once you have created a private key and public key in your Cloudflare Area 1 email security console, you can set up the integration in your KMSAT console. To register Cloudflare Area 1 email security with SecurityCoach in your KMSAT console, follow the steps below:</p><ul><li><p>Log in to your KMSAT console and navigate to SecurityCoach &gt; Setup &gt; Security Vendor Integrations.</p></li><li><p>Locate Cloudflare Area 1 Email Security and click Configure.</p></li></ul>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3D1GlwJNh9qoOcZJR6oi3h/cfd4141a8633f294f185625ad701de09/Screenshot-2023-03-17-at-10.41.52.png" />
            
            </figure><ul><li><p>Enter the Public Key and Private Key that you saved in the ‘Create your private Key and public key’ section above.</p></li></ul>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2MvTlzLSse244i6zX7BEfR/bb4f252f7999163c709684d5b1144ec9/image1-39.png" />
            
            </figure><ul><li><p>Click authorize. Once you’ve successfully authorized this integration, you can manage detection rules for Cloudflare Area 1 on the ‘Detection rules subtab’ of SecurityCoach.</p></li></ul>
    <div>
      <h3>SecurityCoach in action</h3>
      <a href="#securitycoach-in-action">
        
      </a>
    </div>
    <p>Now that the SecurityCoach is set up, users within your organization will receive messages if Area 1 finds that a malicious email was sent to them. An example one can be seen below.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4FZKUgGyVx5CfraGBSWhVM/656d9ebae8714fb95de60ae8c62db045/image9-4.png" />
            
            </figure><p>This message not only alerts the user to be more scrutinous about emails they are receiving, since they now know they are being actively targeted, but also provides them with followup steps that they can take to ensure their account is as safe as possible. The image and text that shows up in the email can be configured from the KnowBe4 console giving customers full flexibility on what to communicate with their employees.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/srYnIoutzlBVaeY9Hs0gr/71c69507db0906c18b1c49c15a7d6fb7/image5-4.png" />
            
            </figure>
    <div>
      <h2>What’s next</h2>
      <a href="#whats-next">
        
      </a>
    </div>
    <p>We’ll be expanding this integration with KnowBe4 to our other <a href="https://www.cloudflare.com/zero-trust/solutions/">Zero Trust products</a> in the coming months. If you have any questions or feedback on this integration, please contact your account team at Cloudflare. We’re excited to continue closely working with technology partners to expand existing and create new integrations that help customers on their <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust</a> journey.</p> ]]></content:encoded>
            <category><![CDATA[Security Week]]></category>
            <category><![CDATA[Email Security]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[Area 1 Security]]></category>
            <guid isPermaLink="false">1v0nId9KOX5TFKER9wsKnM</guid>
            <dc:creator>Ayush Kumar</dc:creator>
            <dc:creator>Deeksha Lamba</dc:creator>
        </item>
        <item>
            <title><![CDATA[Stop brand impersonation with Cloudflare DMARC Management]]></title>
            <link>https://blog.cloudflare.com/dmarc-management/</link>
            <pubDate>Fri, 17 Mar 2023 13:00:00 GMT</pubDate>
            <description><![CDATA[ Brand impersonation continues to be a big problem globally. Setting SPF, DKIM and DMARC policies is a great way to reduce that risk, and protect your domains from being used in spoofing emails. But maintaining a correct SPF configuration can be very costly and time consuming ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4VDPUUYhG7ru1WvkSMQjEI/dc8c4470547b35874809bbc1c0486c07/Security-Center-now-includes-ZT--DLP-and-email-.png" />
            
            </figure><p>At the end of 2021 Cloudflare <a href="/security-center/">launched Security Center</a>, a unified solution that brings together our suite of security products and unique Internet intelligence. It enables security teams to quickly identify potential security risks and threats to their organizations, map their <a href="https://www.cloudflare.com/learning/security/what-is-an-attack-surface/">attack surface</a> and mitigate these risks with just a few clicks. While Security Center initially focused on <a href="https://www.cloudflare.com/application-services/solutions/">application security</a>, we are now adding crucial <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">zero trust</a> insights to further enhance its capabilities.</p><p>When your brand is loved and trusted, customers and prospects are looking forward to the emails you send them. Now picture them receiving an email from you: it has your brand, the subject is exciting, it has a link to register for something unique — how can they resist that opportunity?</p><p>But what if that email didn’t come from you? What if clicking on that link is a scam that takes them down the path of <a href="https://www.cloudflare.com/learning/email-security/what-is-email-fraud/">fraud or identity theft</a>? And what if they think you did it? The truth is, even security minded people occasionally fall for well crafted spoof emails.</p><p>That poses a risk to your business and reputation. A risk you don’t want to take - no one does. Brand impersonation is a <a href="/2022-march-hackness-phishing-bracket/">significant problem for organizations globally</a>, and that’s why we’ve built DMARC Management - available in Beta today.</p><p>With DMARC Management you have full insight on who is sending emails on your behalf. You can one-click approve each source that is a legitimate sender for your domain, and then set your <a href="https://www.cloudflare.com/learning/email-security/dmarc-dkim-spf/">DMARC</a> policy to reject any emails sent from unapproved clients.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5V4jHlhrGCxkmpTmaEwd7Y/486d9851a7ad4ded33940bee10638200/DMARC-1.jpg" />
            
            </figure><p>When the survey platform your company uses is sending emails from your domain, there’s nothing to worry about - you configured it that way. But if an unknown mail service from a remote country is sending emails using your domain that can be quite scary, and something you’ll want to address. Let’s see how.</p>
    <div>
      <h3>Anti-spoofing mechanisms</h3>
      <a href="#anti-spoofing-mechanisms">
        
      </a>
    </div>
    <p>Sender Policy Framework (SPF), DomainKeys Identified Mail (DKIM) and Domain-based Message Authentication Reporting and Conformance (DMARC) are three common email authentication methods. Together, they help <a href="https://www.cloudflare.com/learning/email-security/how-to-prevent-phishing/">prevent</a> spammers, phishers, and other unauthorized parties from sending emails on behalf of a domain they do not own.</p><p><b>SPF</b> is a way for a domain to list all the servers the company sends emails from. Think of it like a publicly available employee directory that helps someone to confirm if an employee works for an organization. <a href="https://www.cloudflare.com/learning/dns/dns-records/dns-spf-record/">SPF records</a> list all the IP addresses of all the servers that are allowed to send emails from the domain.</p><p><b>DKIM</b> enables domain owners to automatically "sign" emails from their domain. Specifically, DKIM uses <a href="https://www.cloudflare.com/learning/ssl/how-does-public-key-encryption-work/">public key cryptography</a>:</p><ol><li><p>A <a href="https://www.cloudflare.com/learning/dns/dns-records/dns-dkim-record/">DKIM record</a> stores the domain's <i>public key</i>, and mail servers receiving emails from the domain can check this record to obtain the public <a href="https://www.cloudflare.com/learning/ssl/what-is-a-cryptographic-key/">key</a>.</p></li><li><p>The <i>private key</i> is kept secret by the sender, who signs the email's header with this key.</p></li><li><p>Mail servers receiving the email can verify that the sender's private key was used by applying the public key. This also guarantees that the email was not tampered with while in transit.</p></li></ol><p><b>DMARC</b> tells a receiving email server what to do after evaluating the SPF and DKIM results. A domain's DMARC policy can be set in a variety of ways — it can instruct mail servers to quarantine emails that fail SPF or DKIM (or both), to reject such emails, or to deliver them.</p><p>It’s not trivial to configure and maintain SPF and DMARC, though. If your configuration is too strict, legitimate emails will be dropped or marked as spam. If it’s too relaxed, your domain might be misused for email spoofing. The proof is that these authentication mechanisms (SPF / DKIM / DMARC) have existed for over 10 years and still, there are still <a href="https://dmarc.org/stats/dmarc/">less than 6 million active DMARC records</a>.</p><p>DMARC reports can help, and a full solution like DMARC Management reduces the burden of creating and maintaining a proper configuration.</p>
    <div>
      <h3>DMARC reports</h3>
      <a href="#dmarc-reports">
        
      </a>
    </div>
    <p>All DMARC-compliant mailbox providers support sending DMARC aggregated reports to an email address of your choice. Those reports list the services that have sent emails from your domain and the percentage of messages that passed DMARC, SPF and DKIM. They are extremely important because they give administrators the information they need to decide how to adjust their DMARC policies — for instance, that’s how administrators know if their legitimate emails are failing SPF and DKIM, or if a spammer is trying to send illegitimate emails.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2rbeRaBvxsO0xRukkFLRHs/4a648e0386f5568f0a83b55222d318c7/pasted-image-0--1--7.png" />
            
            </figure><p>But beware, you probably don’t want to send DMARC reports to a human-monitored email address, as these come in fast and furious from virtually every email provider your organization sends messages to, and are delivered in XML format. Typically, administrators set up reports to be sent to a service like our DMARC Management, that boils them down to a more digestible form. <i>Note: These reports do not contain personal identifiable information (PII).</i></p><p>DMARC Management automatically creates an email address for those reports to be sent to, and adds the corresponding <a href="https://www.cloudflare.com/learning/dns/dns-records/dns-dmarc-record/">RUA record</a> to your Cloudflare DNS to announce to mailbox providers where to send reports to. And yes, if you’re curious, these email addresses are being created using <a href="https://www.cloudflare.com/products/email-routing/">Cloudflare Email Routing</a>.</p><p><i>Note: Today, Cloudflare DNS is a requirement for DMARC Management.</i></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/CQaK1cwJWRVbNseX4W5TV/9167d60ea6753e64eb00000abe42f49a/DMARC--1--1.jpg" />
            
            </figure><p>As reports are received in this dedicated email address, they are processed by a <a href="https://workers.cloudflare.com/">Worker</a> that extracts the relevant data, parses it and sends it over to our analytics solution. And you guessed again, that’s implemented using <a href="https://developers.cloudflare.com/email-routing/email-workers/">Email Workers</a>. You can read more about the technical implementation <a href="/how-we-built-dmarc-management/">here</a>.</p>
    <div>
      <h3>Taking action</h3>
      <a href="#taking-action">
        
      </a>
    </div>
    <p>Now that reports are coming in, you can review the data and take action.</p><p><i>Note: It may take up to 24 hours for mailbox providers to start sending reports and for these analytics to be available to you.</i></p><p>At the top of DMARC Management you have an at-a-glance view of the outbound security configuration for your domain, more specifically DMARC, DKIM, and SPF. DMARC Management will soon start reporting on inbound email security as well, which includes STARTTLS, MTA-STS, DANE, and TLS reporting.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3XFAP5YG8knRRkIj50zkJ8/00ef5789a08c69c3103b672b7521a9b4/1.jpg" />
            
            </figure><p>The middle section shows the email volume over time, with individual lines showing those that pass DMARC and those that fail.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4uciHpDAy18iUp1stqQugo/721ebb2f2f365220a86943e56ea4535a/1--1-.jpg" />
            
            </figure><p>Below, you have additional details that include the number of email messages sent by each source (per the DMARC reports), and the corresponding DMARC, SPF and DKIM statistics. You can approve (that is, include in SPF) any of these sources by clicking on “…”, and you can easily spot applications that may not have DKIM correctly configured.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4rO4J9bwiA9m0tHupExWhk/0ad0478984602bd8fcace328bdfe2681/Frame-4121.png" />
            
            </figure><p>Clicking on any source gives you the same DMARC, SPF and DKIM statistics per IP address of that source. This is how you identify if there’s an additional IP address you might need to include in your SPF record, for example.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/aItdZkn7WlVOiNtCQsXAp/9b6484590faa502e884308d2a6a65c11/DMARC--2-.jpg" />
            
            </figure><p>The ones that fail are the ones you’ll want to take action on, as they will need to either be approved (which technically means including in the <a href="https://www.cloudflare.com/learning/email-security/dmarc-dkim-spf/">SPF</a> record) if legitimate, or stay unapproved and be rejected by the receiving server when the DMARC policy is configured with p=reject.</p><p>Getting to a DMARC reject policy is the goal, but you don’t want to apply such a restrictive policy until you have high confidence that all legitimate sending services are accounted for in SPF (and DKIM, if appropriate). That may take a few weeks, depending on the number of services you have sending messages from your domain, but with DMARC Management you will quickly grasp when you’re ready to go.</p>
    <div>
      <h3>What else is needed</h3>
      <a href="#what-else-is-needed">
        
      </a>
    </div>
    <p>Once you have approved all your authorized email senders (sources) and configured DMARC to quarantine or reject, you should be confident that your brand and organization are much safer. From then on, keeping an eye on your approved sources list is a very lightweight operation that doesn’t take more than a few minutes per month from your team. Ideally, when new applications that send emails from your domain are deployed in your company, you would proactively include the corresponding IP addresses in your SPF record.</p><p>But even if you don’t, you will find new unapproved senders notices on your Security Center, under the Security Insights tab, alongside other important security issues you can review and manage.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/WUjs0E5i27cLGp1USdAgw/d12e33553da78ba00802dda73c6a610b/Screenshot-with-unapproved-senders.jpg" />
            
            </figure><p>Or you can check the unapproved list on DMARC Management every few weeks.</p><p>Whenever you see a legitimate sender source show up as unapproved, you know what to do — click “…” and mark them as approved!</p>
    <div>
      <h3>What’s coming next</h3>
      <a href="#whats-coming-next">
        
      </a>
    </div>
    <p>DMARC Management takes <a href="https://www.cloudflare.com/zero-trust/products/email-security/">email security</a> to the next level, and this is only the beginning.</p><p>We’re excited to demonstrate our investments in features that provide customers even more insight into their security. Up next we’ll be connecting security analytics from Cloudflare’s <a href="https://www.cloudflare.com/products/zero-trust/casb/">Cloud Access Security Broker</a> (CASB) into the <a href="https://www.cloudflare.com/securitycenter/">Security Center</a>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/61fj6NVQkeRVMDzJYl0SmR/b632b4000dd7a47769a91d0fe5e025fe/pasted-image-0--2--4.png" />
            
            </figure><p>This product integration will provide customers a way to understand the status of their wider <a href="https://www.cloudflare.com/learning/access-management/what-is-a-casb/">SaaS security</a> at a glance. By surfacing the makeup of CASB Findings (or security issues identified in popular SaaS apps) by severity, health of the SaaS integration, and the number of hidden issues, IT and security administrators will have a way to understand the status of their wider security surface area from a single source.</p><p>Stay tuned for more news on CASB in Security Center. In the meantime you can <a href="https://dash.cloudflare.com/?to=/:account/:zone/email/dmarc-management">join the waitlist for DMARC Management beta</a> for free today and, if you haven’t yet, we recommend you also check out Cloudflare Area 1 and <a href="https://www.cloudflare.com/lp/emailsecurity/">request a Phishing Risk Assessment</a> to block phishing, spoof and spam emails from coming into your environment.</p> ]]></content:encoded>
            <category><![CDATA[Security Week]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Email Security]]></category>
            <category><![CDATA[DMARC]]></category>
            <guid isPermaLink="false">6HHCQW1DIHAljDbWNp8sPh</guid>
            <dc:creator>João Sousa Botto</dc:creator>
        </item>
        <item>
            <title><![CDATA[How we built DMARC Management using Cloudflare Workers]]></title>
            <link>https://blog.cloudflare.com/how-we-built-dmarc-management/</link>
            <pubDate>Fri, 17 Mar 2023 13:00:00 GMT</pubDate>
            <description><![CDATA[ At Cloudflare, we use the Workers platform and our product stack to build new services. Read how we made the new DMARC Management solution entirely on top of our APIs.
 ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3P7EqcZydcPUKVhQNdVwkr/55e20a63d7ae1ce2ff638c2818d7da58/How-we-built-DMARC-Management.png" />
            
            </figure>
    <div>
      <h3>What are DMARC reports</h3>
      <a href="#what-are-dmarc-reports">
        
      </a>
    </div>
    <p><a href="https://www.cloudflare.com/en-gb/learning/dns/dns-records/dns-dmarc-record/">DMARC</a> stands for Domain-based Message Authentication, Reporting, and Conformance. It's an email authentication protocol that helps protect against email <a href="https://www.cloudflare.com/learning/access-management/phishing-attack/">phishing</a> and <a href="https://www.cloudflare.com/learning/email-security/what-is-email-spoofing/">spoofing</a>.</p><p>When an email is sent, DMARC allows the domain owner to set up a DNS record that specifies which authentication methods, such as <a href="https://www.cloudflare.com/learning/dns/dns-records/dns-spf-record/">SPF</a> (Sender Policy Framework) and <a href="https://www.cloudflare.com/learning/dns/dns-records/dns-dkim-record/">DKIM</a> (DomainKeys Identified Mail), are used to verify the email's authenticity. When the email fails these authentication checks DMARC instructs the recipient's email provider on how to handle the message, either by quarantining it or rejecting it outright.</p><p>DMARC has become increasingly important in today's Internet, where email phishing and spoofing attacks are becoming more sophisticated and prevalent. By implementing DMARC, domain owners can protect their brand and their customers from the negative impacts of these attacks, including loss of trust, reputation damage, and financial loss.</p><p>In addition to <a href="https://www.cloudflare.com/learning/dns/dns-records/protect-domains-without-email/">protecting</a> against phishing and spoofing attacks, DMARC also provides <a href="https://www.rfc-editor.org/rfc/rfc7489">reporting</a> capabilities. Domain owners can receive reports on email authentication activity, including which messages passed and failed DMARC checks, as well as where these messages originated from.</p><p>DMARC management involves the configuration and maintenance of DMARC policies for a domain. Effective DMARC management requires ongoing monitoring and analysis of email authentication activity, as well as the ability to make adjustments and updates to DMARC policies as needed.</p><p>Some key components of effective DMARC management include:</p><ul><li><p>Setting up DMARC policies: This involves configuring the domain's DMARC record to specify the appropriate authentication methods and policies for handling messages that fail authentication checks. Here’s what a DMARC DNS record looks like:</p></li></ul><p><code>v=DMARC1; p=reject; rua=mailto:dmarc@example.com</code></p><p>This specifies that we are going to use DMARC version 1, our policy is to reject emails if they fail the DMARC checks, and the email address to which providers should send DMARC reports.</p><ul><li><p>Monitoring email authentication activity: DMARC reports are an important tool for domain owners to ensure <a href="https://www.cloudflare.com/zero-trust/products/email-security/">email security</a> and deliverability, as well as compliance with industry standards and regulations. By regularly monitoring and analyzing DMARC reports, domain owners can <a href="https://www.cloudflare.com/learning/email-security/how-to-prevent-phishing/">identify email threats</a>, optimize email campaigns, and improve overall email authentication.</p></li><li><p>Making adjustments as needed: Based on analysis of DMARC reports, domain owners may need to make adjustments to DMARC policies or authentication methods to ensure that email messages are properly authenticated and protected from phishing and spoofing attacks.</p></li><li><p>Working with email providers and third-party vendors: Effective DMARC management may require collaboration with email providers and third-party vendors to ensure that DMARC policies are being properly implemented and enforced.</p></li></ul><p>Today we launched <a href="/dmarc-management">DMARC management</a>. This is how we built it.</p>
    <div>
      <h3>How we built it</h3>
      <a href="#how-we-built-it">
        
      </a>
    </div>
    <p>As a leading provider of cloud-based security and performance solutions, we at Cloudflare take a specific approach to test our products. We "dogfood" our own tools and services, which means we use them to run our business. This helps us identify any issues or bugs before they affect our customers.</p><p>We use our own products internally, such as <a href="https://workers.cloudflare.com/">Cloudflare Workers</a>, a serverless platform that allows developers to run their code on our global network. Since its launch in 2017, the Workers ecosystem has grown significantly. Today, there are thousands of developers building and deploying applications on the platform. The power of the Workers ecosystem lies in its ability to enable developers to build sophisticated applications that were previously impossible or impractical to run so close to clients. Workers can be used to build APIs, generate dynamic content, optimize images, perform real-time processing, and much more. The possibilities are virtually endless. We used Workers to power services like <a href="/technology-behind-radar2/">Radar 2.0</a>, or software packages like <a href="/welcome-to-wildebeest-the-fediverse-on-cloudflare/">Wildebeest</a>.</p><p>Recently our <a href="https://developers.cloudflare.com/email-routing/">Email Routing</a> product joined forces with Workers, enabling <a href="/announcing-route-to-workers/">processing incoming emails</a> via Workers scripts. As the <a href="https://developers.cloudflare.com/email-routing/email-workers/">documentation</a> states: “With Email Workers you can leverage the power of Cloudflare Workers to implement any logic you need to <a href="https://www.cloudflare.com/learning/email-security/what-is-email-routing/">process your emails</a> and create complex rules. These rules determine what happens when you receive an email.” Rules and verified addresses can all be configured via our <a href="https://developers.cloudflare.com/api/operations/email-routing-destination-addresses-list-destination-addresses">API</a>.</p><p>Here’s how a simple Email Worker looks like:</p>
            <pre><code>export default {
  async email(message, env, ctx) {
    const allowList = ["friend@example.com", "coworker@example.com"];
    if (allowList.indexOf(message.headers.get("from")) == -1) {
      message.setReject("Address not allowed");
    } else {
      await message.forward("inbox@corp");
    }
  }
}</code></pre>
            <p>Pretty straightforward, right?</p><p>With the ability to programmatically process incoming emails in place, it seemed like the perfect way to handle incoming DMARC report emails in a scalable and efficient manner, letting Email Routing and Workers do the heavy lifting of receiving an unbound number of emails from across the globe. A high level description of what we needed is:</p><ol><li><p>Receive email and extract report</p></li><li><p>Publish relevant details to analytics platform</p></li><li><p>Store the raw report</p></li></ol><p>Email Workers enable us to do #1 easily. We just need to create a worker with an email() handler. This handler will receive the <a href="https://www.rfc-editor.org/rfc/rfc5321">SMTP</a> envelope elements, a pre-parsed version of the email headers, and a stream to read the entire raw email.</p><p>For #2 we can also look into the Workers platform, and we will find the <a href="https://developers.cloudflare.com/analytics/analytics-engine/">Workers Analytics Engine</a>. We just need to define an appropriate schema, which depends both on what’s present in the reports and the queries we plan to do later. Afterwards we can query the data using either the <a href="https://developers.cloudflare.com/analytics/graphql-api/">GraphQL</a> or <a href="https://developers.cloudflare.com/analytics/analytics-engine/sql-api/">SQL</a> API.</p><p>For #3 we don’t need to look further than our <a href="https://www.cloudflare.com/developer-platform/products/r2/">R2 object storage</a>. It is <a href="https://developers.cloudflare.com/r2/examples/demo-worker/">trivial</a> to access R2 from a Worker. After extracting the reports from the email we will store them in R2 for posterity.</p><p>We built this as a managed service that you can enable on your zone, and added a dashboard interface for convenience, but in reality all the tools are available for you to deploy your own DMARC reports processor on top of Cloudflare Workers, in your own account, without having to worry about servers, scalability or performance.</p>
    <div>
      <h3>Architecture</h3>
      <a href="#architecture">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3d55aU3WlGrgQcuc1TKPAF/a02a34f819174b82e768b0aed5053708/Screenshot-2023-03-16-at-4.18.08-PM.png" />
            
            </figure><p><a href="https://developers.cloudflare.com/email-routing/email-workers/">Email Workers</a> is a feature of our Email Routing product. The Email Routing component runs in all our nodes, so any one of them is able to process incoming mail, which is important because we announce the Email ingress BGP prefix from all our datacenters. Sending emails to an Email Worker is as easy as setting a rule in the Email Routing dashboard.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4tgjcPuXeJ3lJ9yLxQoPxz/7c9f34dd7ae03aeb2293e64df9ebf8e6/pasted-image-0--4--3.png" />
            
            </figure><p>When the Email Routing component receives an email that matches a rule to be delivered to a Worker, it will contact our internal version of the recently open-sourced <a href="https://github.com/cloudflare/workerd">workerd</a> runtime, which also runs on all nodes. The RPC schema that governs this interaction is defined in a <a href="https://github.com/capnproto/capnproto">Capnproto</a> schema, and allows the body of the email to be streamed to Edgeworker as it’s read. If the worker script decides to forward this email, Edgeworker will contact Email Routing using a capability sent in the original request.</p>
            <pre><code>jsg::Promise&lt;void&gt; ForwardableEmailMessage::forward(kj::String rcptTo, jsg::Optional&lt;jsg::Ref&lt;Headers&gt;&gt; maybeHeaders) {
  auto req = emailFwdr-&gt;forwardEmailRequest();
  req.setRcptTo(rcptTo);

  auto sendP = req.send().then(
      [](capnp::Response&lt;rpc::EmailMetadata::EmailFwdr::ForwardEmailResults&gt; res) mutable {
    auto result = res.getResponse().getResult();
    JSG_REQUIRE(result.isOk(), Error, result.getError());
  });
  auto&amp; context = IoContext::current();
  return context.awaitIo(kj::mv(sendP));
}
</code></pre>
            <p>In the context of DMARC reports this is how we handle the incoming emails:</p><ol><li><p>Fetch the recipient of the email being processed, this is the RUA that was used. RUA is a DMARC configuration parameter that indicates where aggregate DMARC processing feedback should be reported pertaining to a certain domain. This recipient can be found in the “to” attribute of the message.</p></li></ol>
            <pre><code>const ruaID = message.to</code></pre>
            <ol><li><p>Since we handle DMARC reports for an unbounded number of domains, we use Workers KV to store some information about each one and key this information on the RUA. This also lets us know if we should be receiving these reports.</p></li></ol>
            <pre><code>const accountInfoRaw = await env.KV_DMARC_REPORTS.get(dmarc:${ruaID})</code></pre>
            <ol><li><p>At this point, we want to read the entire email into an arrayBuffer in order to parse it. Depending on the size of the report we may run into the limits of the free Workers plan. If this happens, we recommend that you switch to the <a href="https://www.cloudflare.com/workers-unbound-beta/">Workers Unbound</a> resource model which does not have this issue.</p></li></ol>
            <pre><code>const rawEmail = new Response(message.raw)
const arrayBuffer = await rawEmail.arrayBuffer()</code></pre>
            <ol><li><p>Parsing the raw email involves, among other things, parsing its MIME parts. There are multiple libraries available that allow one to do this. For example, you could use <a href="https://www.npmjs.com/package/postal-mime">postal-mime</a>:</p></li></ol>
            <pre><code>const parser = new PostalMime.default()
const email = await parser.parse(arrayBuffer)</code></pre>
            <ol><li><p>Having parsed the email we now have access to its attachments. These attachments are the DMARC reports themselves and they can be compressed. The first thing we want to do is store them in their compressed form in <a href="https://developers.cloudflare.com/r2/data-access/workers-api/workers-api-usage/">R2</a> for long-term storage. They can be useful later on for re-processing or investigating interesting reports. Doing this is as simple as calling put() on the R2 binding. In order to facilitate retrieval later we recommend that you spread the report files across directories based on the current time.</p></li></ol>
            <pre><code>await env.R2_DMARC_REPORTS.put(
    `${date.getUTCFullYear()}/${date.getUTCMonth() + 1}/${attachment.filename}`,
    attachment.content
  )</code></pre>
            <ol><li><p>We now need to look into the attachment mime type. The raw form of DMARC reports is XML, but they can be compressed. In this case we need to decompress them first. DMARC reporter files can use multiple compression algorithms. We use the MIME type to know which one to use. For <a href="https://en.wikipedia.org/wiki/Zlib">Zlib</a> compressed reports <a href="https://www.npmjs.com/package/pako">pako</a> can be used while for ZIP compressed reports <a href="https://www.npmjs.com/package/unzipit">unzipit</a> is a good choice.</p></li><li><p>Having obtained the raw XML form of the report, <a href="https://www.npmjs.com/package/fast-xml-parser">fast-xml-parser</a> has worked well for us in parsing them. Here’s how the DMARC report XML looks:</p></li></ol>
            <pre><code>&lt;feedback&gt;
  &lt;report_metadata&gt;
    &lt;org_name&gt;example.com&lt;/org_name&gt;
    &lt;emaildmarc-reports@example.com&lt;/email&gt;
   &lt;extra_contact_info&gt;http://example.com/dmarc/support&lt;/extra_contact_info&gt;
    &lt;report_id&gt;9391651994964116463&lt;/report_id&gt;
    &lt;date_range&gt;
      &lt;begin&gt;1335521200&lt;/begin&gt;
      &lt;end&gt;1335652599&lt;/end&gt;
    &lt;/date_range&gt;
  &lt;/report_metadata&gt;
  &lt;policy_published&gt;
    &lt;domain&gt;business.example&lt;/domain&gt;
    &lt;adkim&gt;r&lt;/adkim&gt;
    &lt;aspf&gt;r&lt;/aspf&gt;
    &lt;p&gt;none&lt;/p&gt;
    &lt;sp&gt;none&lt;/sp&gt;
    &lt;pct&gt;100&lt;/pct&gt;
  &lt;/policy_published&gt;
  &lt;record&gt;
    &lt;row&gt;
      &lt;source_ip&gt;192.0.2.1&lt;/source_ip&gt;
      &lt;count&gt;2&lt;/count&gt;
      &lt;policy_evaluated&gt;
        &lt;disposition&gt;none&lt;/disposition&gt;
        &lt;dkim&gt;fail&lt;/dkim&gt;
        &lt;spf&gt;pass&lt;/spf&gt;
      &lt;/policy_evaluated&gt;
    &lt;/row&gt;
    &lt;identifiers&gt;
      &lt;header_from&gt;business.example&lt;/header_from&gt;
    &lt;/identifiers&gt;
    &lt;auth_results&gt;
      &lt;dkim&gt;
        &lt;domain&gt;business.example&lt;/domain&gt;
        &lt;result&gt;fail&lt;/result&gt;
        &lt;human_result&gt;&lt;/human_result&gt;
      &lt;/dkim&gt;
      &lt;spf&gt;
        &lt;domain&gt;business.example&lt;/domain&gt;
        &lt;result&gt;pass&lt;/result&gt;
      &lt;/spf&gt;
    &lt;/auth_results&gt;
  &lt;/record&gt;
&lt;/feedback&gt;</code></pre>
            <ol><li><p>We now have all the data in the report at our fingertips. What we do from here on depends a lot on how we want to present the data. For us, the goal was to display meaningful data extracted from them in our Dashboard. Therefore we needed an Analytics platform where we could push the enriched data. Enter, <a href="https://developers.cloudflare.com/analytics/analytics-engine/">Workers Analytics Engine</a>. The Analytics engine is perfect for this task since it allows us to <a href="https://developers.cloudflare.com/analytics/analytics-engine/get-started/#3-write-data-from-your-worker">send</a> data to it from a worker, and exposes a <a href="https://developers.cloudflare.com/analytics/graphql-api/">GraphQL API</a> to interact with the data afterwards. This is how we obtain the data to show in our dashboard.</p></li></ol><p>In the future, we are also considering integrating <a href="https://developers.cloudflare.com/queues/">Queues</a> in the workflow to asynchronously process the report and avoid waiting for the client to complete it.</p><p>We managed to implement this project end-to-end relying only on the Workers infrastructure, proving that it’s possible, and advantageous, to build non-trivial apps without having to worry about scalability, performance, storage and security issues.</p>
    <div>
      <h3>Open sourcing</h3>
      <a href="#open-sourcing">
        
      </a>
    </div>
    <p>As we mentioned before, we built a managed service that you can enable and use, and we will manage it for you. But, everything we did can also be deployed by you, in your account, so that you can manage your own DMARC reports. It’s easy, and free. To help you with that, we are releasing an open-source version of a Worker that processes DMARC reports in the way described above: <a href="https://github.com/cloudflare/dmarc-email-worker">https://github.com/cloudflare/dmarc-email-worker</a></p><p>If you don’t have a dashboard where to show the data, you can also <a href="https://developers.cloudflare.com/analytics/analytics-engine/worker-querying/">query</a> the Analytics Engine from a Worker. Or, if you want to store them in a relational database, then there’s <a href="https://developers.cloudflare.com/d1/platform/client-api/">D1</a> to the rescue. The possibilities are endless and we are excited to find out what you’ll build with these tools.</p><p>Please contribute, make your own, we’ll be listening.</p>
    <div>
      <h3>Final words</h3>
      <a href="#final-words">
        
      </a>
    </div>
    <p>We hope that this post has furthered your understanding of the Workers platform. Today Cloudflare takes advantage of this platform to build most of our services, and we think you should too.</p><p>Feel free to contribute to our open-source version and show us what you can do with it.</p><p>The Email Routing is also working on expanding the Email Workers API more functionally, but that deserves another blog soon.</p> ]]></content:encoded>
            <category><![CDATA[Security Week]]></category>
            <category><![CDATA[Email Security]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[DMARC]]></category>
            <guid isPermaLink="false">HNhMxPSjzPXyTdtRLp51K</guid>
            <dc:creator>André Cruz</dc:creator>
            <dc:creator>Nelson Duarte</dc:creator>
        </item>
    </channel>
</rss>