
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[ The Cloudflare Blog ]]></title>
        <description><![CDATA[ Get the latest news on how products at Cloudflare are built, technologies used, and join the teams helping to build a better Internet. ]]></description>
        <link>https://blog.cloudflare.com</link>
        <atom:link href="https://blog.cloudflare.com/" rel="self" type="application/rss+xml"/>
        <language>en-us</language>
        <image>
            <url>https://blog.cloudflare.com/favicon.png</url>
            <title>The Cloudflare Blog</title>
            <link>https://blog.cloudflare.com</link>
        </image>
        <lastBuildDate>Sat, 04 Apr 2026 04:06:37 GMT</lastBuildDate>
        <item>
            <title><![CDATA[A wild week in phishing, and what it means for you]]></title>
            <link>https://blog.cloudflare.com/a-wild-week-in-phishing-and-what-it-means-for-you/</link>
            <pubDate>Fri, 16 Aug 2024 18:34:00 GMT</pubDate>
            <description><![CDATA[ From the U.S. elections and geopolitical conflict to tens of millions in corporate dollars lost, phishing remains the root cause of cyber damages. Learn why a comprehensive solution is the best way to stay protected. ]]></description>
            <content:encoded><![CDATA[ 
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7qPKUuIGbxmn5I3oGZ7W1E/9bd8faa76cc25b6d2ef1cb81ad920ddd/2504-1-Hero.png" />
          </figure><p>Being a bad guy on the Internet is a really good business. In more than 90% of cybersecurity incidents, phishing is the root cause of the attack, and during this third week of August phishing attacks were reported <a href="https://apnews.com/article/trump-campaign-hacking-iran-769d8411d9a13ef9a0e039c0b6c3b032"><u>against the U.S. elections</u></a>, in the <a href="https://blog.google/threat-analysis-group/iranian-backed-group-steps-up-phishing-campaigns-against-israel-us/"><u>geopolitical conflict</u></a> between the U.S., Israel, and Iran, and to cause <a href="https://www.sec.gov/Archives/edgar/data/1609804/000095014224002170/eh240519238_8k.htm"><u>$60M in corporate losses</u></a>.</p><p>You might think that after 30 years of email being the top vector for attack and risk we are helpless to do anything about it, but that would be giving too much credit to bad actors, and a misunderstanding of how defenders focused on detections can take control and win. </p><p>Phishing isn’t about email exclusively, or any specific protocol for that matter. Simply put, it is an attempt to get a person, like you or me, to take an action that unwittingly leads to damages. These attacks work because they appear to be authentic, <a href="https://blog.cloudflare.com/50-most-impersonated-brands-protect-phishing"><u>visually</u></a> or organizationally, such as pretending to be the CEO or CFO of your company, and when you break it down they are <a href="https://blog.cloudflare.com/2023-phishing-report"><u>three main attack vectors that Cloudflare has seen most impactfu</u></a>l from the bad emails we protect our customers from: 1. Clicking links (deceptive links are 35.6% of threat indicators) 2. Downloading files or malware  (malicious attachments are 1.9% of threat indicators) 3. Business email compromise (BEC) phishing that elicits money or intellectual property with no links or files (0.5% of threat indicators).</p><p>Today, we at Cloudflare see an increase in what we’ve termed multi-channel phishing. What other channels are there to send links, files and elicit BEC actions? There’s <a href="https://en.wikipedia.org/wiki/SMS"><u>SMS</u></a> (text messaging) and public and private messaging applications, which are increasingly common attack vectors that take advantage of the ability to send links over those channels, and also how people consume information and work. There’s cloud collaboration, where attackers rely on links, files, and BEC phishing on commonly used collaboration tools like Google Workspace, Atlassian, and Microsoft Office 365. And finally, there’s web and social phishing targeting people on LinkedIn and X. Ultimately, any attempt to stop phishing needs to be comprehensive enough to detect and protect against these different vectors.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/79OaEpiIHsCnTgkj7k89Yi/6f7f413ec1bca40e6e00b60863ee2e4e/2504-2.png" />
          </figure><p><sub><i>Learn more about these technologies and products </i></sub><a href="https://www.cloudflare.com/zero-trust/products/"><sub><i><u>here</u></i></sub></a><sub></sub></p>
    <div>
      <h3>A real example</h3>
      <a href="#a-real-example">
        
      </a>
    </div>
    <p>It’s one thing to tell you this, but we’d love to give you an example of how a multi-channel phish plays out with a sophisticated attacker.</p><p>Here’s an email message that an executive notices is in their junk folder. That’s because our <a href="https://www.cloudflare.com/zero-trust/products/email-security/"><u>Email Security</u></a> product noticed there’s something off about it and moved it there, but it relates to a project the executive is working on, so the executive thinks it’s legitimate. There’s a request for a company org chart, and the attacker knows that this is the kind of thing that’s going to be caught if they continue on email, so they include a link to a real Google form:</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3RyRiXtEtUg4PsZZ7yoEpY/c0a09b8d47d09b3b306b99d4cc5b667b/2504-3.png" />
          </figure><ul><li><p>The executive clicks the link, and because it is a legitimate Google form, it displays the following:</p></li></ul>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2szWX4dGovtdUjDzcRMQxt/6e0e5414ed84cac77c17667e668933a1/2504-4.png" />
          </figure><ul><li><p>There’s a request to upload the org chart here, and that’s what they try to do:</p></li></ul><div>
  
</div><ul><li><p>The executive drags it in, but it doesn’t finish uploading because in the document there is an “internal only” watermark that our <a href="https://www.cloudflare.com/zero-trust/products/gateway/"><u>Gateway</u></a> and <a href="https://www.cloudflare.com/zero-trust/products/dlp/"><u>digital loss prevention (DLP)</u></a> engine detected, which in turn prevented the upload.</p></li><li><p>Sophisticated attackers use urgency to drive better outcomes. Here, the attackers know the executive has an upcoming deadline for the consultant to report back to the CEO. Unable to upload the document, they respond back to the attacker. The attacker suggests that they try another method of upload or, in the worst case scenario, send the document on WhatsApp. </p></li></ul>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1nbwpRTramjxvyjgNzYQam/3e1d75596edd0c5b4fcf8323feb242e4/2504-5.png" />
          </figure><ul><li><p>The executive attempts to upload the org chart to the website they were provided in the second email, not knowing that this site would have loaded malware, but because it was loaded in Cloudflare’s <a href="https://www.cloudflare.com/zero-trust/products/browser-isolation/"><u>Browser Isolation</u></a>, it kept the executive’s device safe. Most importantly, when trying to upload sensitive company documents, the action is stopped again:</p></li></ul><div>
  
</div><ul><li><p>Finally they try WhatsApp, and again, we block it:</p></li></ul><div>
  
</div>

    <div>
      <h3>Ease of use</h3>
      <a href="#ease-of-use">
        
      </a>
    </div>
    <p>Setting up a security solution and maintaining it is critical to long term protection. However, having IT administration teams constantly tweak each product, configuration, and monitor each users’ needs is not only costly but risky as well, as it puts a large amount of overhead on these teams. </p><p>Protecting the executive in the example above required just four steps:</p><ol><li><p>Install and login to Cloudflare’s device agent for protection 
</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4jy0exbLu47wyT9AvqdTDb/17b48aaf93df0631a48b24aac58cc727/2504-6.png" />
          </figure><p>
With just a few clicks, anyone with the device agent client can be protected against multi-channel phish, making it easy for end users and administrators. For organizations that don’t allow clients to be installed, an <a href="https://developers.cloudflare.com/cloudflare-one/connections/connect-devices/agentless/"><u>agentless deployment</u></a> is also available.  </p></li><li><p>Configure policies that apply to all your user traffic routed through our secure web gateway. These policies can block access outright to high risk sites, such as those known to participate in phishing campaigns. For sites that may be suspicious, such as newly registered domains, isolated browser access allows users to access the website, but limits their interaction.
</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/43DsyYCbb0prLm14DHN8GA/4f67cd52ff31b3eee121898ca7b4e89f/2504-7.png" />
          </figure><p>The executive was also unable to upload the org chart to a free cloud storage service because their organization is using Cloudflare One’s <a href="https://www.cloudflare.com/zero-trust/products/gateway/"><u>Gateway</u></a> and <a href="https://developers.cloudflare.com/cloudflare-one/policies/browser-isolation/setup/"><u>Browser Isolation</u></a> solutions that were configured to load any free cloud storage websites in a remote isolated environment, which not only prevented the upload but also removed the ability to copy and paste information as well.

Also, while the executive was able to converse with the bad actor over WhatsApp, their files were blocked because of Cloudflare One’s Gateway solution, configured by the administrator to block all uploads and downloads on WhatsApp. </p></li><li><p>Set up DLP policies based on what shouldn’t be uploaded, typed, or copied and pasted.
</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4qeRPgGDjHHli36PXUrxm1/492df3aa3f132e05ffc365937c9e22a4/2504-8.png" />
          </figure><p>The executive was unable to upload the org chart to the Google form because the organization is using Cloudflare One’s Gateway and DLP solutions. This protection is implemented by configuring <a href="https://developers.cloudflare.com/cloudflare-one/policies/gateway/"><u>Gateway</u></a> to block any <a href="https://developers.cloudflare.com/cloudflare-one/policies/data-loss-prevention/dlp-profiles/"><u>DLP</u></a> infraction, even on a valid website like Google.</p></li><li><p>Deploy Email Security and set up auto-move rules based on the types of emails detected.
</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/19E5AjXPzOqi4u2wY6AvWA/da3e58b7dcc3d33684a3900f85aeab50/2504-9.png" />
          </figure></li></ol><p></p><p>In the example above, the executive never received any of the multiple malicious emails that were sent to them because Cloudflare’s Email Security was protecting their inbox. The phishing emails that did arrive were put into their Junk folder because the email was impersonating someone that didn’t match the signature in the email, and the configuration in Email Security automatically moved it there because of a <a href="https://developers.cloudflare.com/email-security/email-configuration/retract-settings/"><u>one-click configuration</u></a> set by the executive’s IT administrator.</p><p>But even with best-in-class detections, it goes without saying that it is important to have the ability to drill down on any metric to learn about individual users that are being impacted by an ongoing attack. Below is a mockup of our upcoming improved email security monitoring dashboard.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3JyRhqVbppIpAQAIGkVGil/67e3d44df3353b26ec1190dde4a915ff/2504-10.png" />
          </figure><p></p>
    <div>
      <h3>What’s next</h3>
      <a href="#whats-next">
        
      </a>
    </div>
    <p>While phishing, despite being around for three decades, continues to be a clear and present danger, effective detections in a seamless and comprehensive solution are really the only way to stay protected these days. </p><p>If you’re simply thinking about purchasing email security by itself, you can see why that just isn’t enough. Multi-layered protection is absolutely necessary to protect modern workforces, because work and data don’t just sit in email. They’re everywhere and on every device. Your phishing protection needs to be as well.</p><p>While you can do this by stitching together multiple vendors, it just won’t all work together. And besides the cost, a multi-vendor approach also usually increases overhead for investigation, maintenance, and uniformity for IT teams that are already stretched thin.</p><p>Whether or not you are at the start of your journey with Cloudflare, you can see how getting different parts of the Cloudflare One product suite can help holistically with phishing. And if you are already deep in your journey with Cloudflare, and are looking for 99.99% effective email detections trusted by the Fortune 500, global organizations, and even government entities, you can see how our Email Security helps. </p><p>If you’re running Office 365, and you’d like to see what we can catch that your current provider cannot, you can start right now with <a href="https://developers.cloudflare.com/email-security/deployment/api/setup/email-retro-scan/"><u>Retro Scan</u></a>.</p><p>And if you are using our Email Security solution already, you can learn more about our comprehensive protection <a href="https://www.cloudflare.com/zero-trust/products/"><u>here</u></a>.</p> ]]></content:encoded>
            <category><![CDATA[Cloudflare One]]></category>
            <category><![CDATA[Email Security]]></category>
            <category><![CDATA[Remote Browser Isolation]]></category>
            <category><![CDATA[DLP]]></category>
            <category><![CDATA[Secure Web Gateway]]></category>
            <category><![CDATA[Phishing]]></category>
            <guid isPermaLink="false">12yQcvcZoP7GDmh89iFg24</guid>
            <dc:creator>Pete Pang</dc:creator>
        </item>
        <item>
            <title><![CDATA[Disrupting FlyingYeti's campaign targeting Ukraine]]></title>
            <link>https://blog.cloudflare.com/disrupting-flyingyeti-campaign-targeting-ukraine/</link>
            <pubDate>Thu, 30 May 2024 13:00:38 GMT</pubDate>
            <description><![CDATA[ In April and May 2024, Cloudforce One employed proactive defense measures to successfully prevent Russia-aligned threat actor FlyingYeti from launching their latest phishing campaign targeting Ukraine ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Cloudforce One is publishing the results of our investigation and real-time effort to detect, deny, degrade, disrupt, and delay threat activity by the Russia-aligned threat actor FlyingYeti during their latest phishing campaign targeting Ukraine. At the onset of Russia’s invasion of Ukraine on February 24, 2022, Ukraine introduced a moratorium on evictions and termination of utility services for unpaid debt. The moratorium ended in January 2024, resulting in significant debt liability and increased financial stress for Ukrainian citizens. The FlyingYeti campaign capitalized on anxiety over the potential loss of access to housing and utilities by enticing targets to open malicious files via debt-themed lures. If opened, the files would result in infection with the PowerShell malware known as <a href="https://cert.gov.ua/article/6277849?ref=news.risky.biz">COOKBOX</a>, allowing FlyingYeti to support follow-on objectives, such as installation of additional payloads and control over the victim’s system.</p><p>Since April 26, 2024, Cloudforce One has taken measures to prevent FlyingYeti from launching their phishing campaign – a campaign involving the use of Cloudflare Workers and GitHub, as well as exploitation of the WinRAR vulnerability <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-38831">CVE-2023-38831</a>. Our countermeasures included internal actions, such as detections and code takedowns, as well as external collaboration with third parties to remove the actor’s cloud-hosted malware. Our effectiveness against this actor prolonged their operational timeline from days to weeks. For example, in a single instance, FlyingYeti spent almost eight hours debugging their code as a result of our mitigations. By employing proactive defense measures, we successfully stopped this determined threat actor from achieving their objectives.</p>
    <div>
      <h3>Executive Summary</h3>
      <a href="#executive-summary">
        
      </a>
    </div>
    <ul><li><p>On April 18, 2024, Cloudforce One detected the Russia-aligned threat actor FlyingYeti preparing to launch a phishing espionage campaign targeting individuals in Ukraine.</p></li><li><p>We discovered the actor used similar tactics, techniques, and procedures (TTPs) as those detailed in <a href="https://cert.gov.ua/article/6278620">Ukranian CERT's article on UAC-0149</a>, a threat group that has primarily <a href="https://cert.gov.ua/article/6277849?ref=news.risky.biz">targeted Ukrainian defense entities with COOKBOX malware since at least the fall of 2023</a>.</p></li><li><p>From mid-April to mid-May, we observed FlyingYeti conduct reconnaissance activity, create lure content for use in their phishing campaign, and develop various iterations of their malware. We assessed that the threat actor intended to launch their campaign in early May, likely following Orthodox Easter.</p></li><li><p>After several weeks of monitoring actor reconnaissance and weaponization activity (<a href="https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html">Cyber Kill Chain Stages 1 and 2</a>), we successfully disrupted FlyingYeti’s operation moments after the final COOKBOX payload was built.</p></li><li><p>The payload included an exploit for the WinRAR vulnerability CVE-2023-38831, which FlyingYeti will likely continue to use in their phishing campaigns to infect targets with malware.</p></li><li><p>We offer steps users can take to defend themselves against FlyingYeti phishing operations, and also provide recommendations, detections, and indicators of compromise.</p></li></ul>
    <div>
      <h2>Who is FlyingYeti?</h2>
      <a href="#who-is-flyingyeti">
        
      </a>
    </div>
    <p>FlyingYeti is the <a href="https://www.merriam-webster.com/dictionary/cryptonym">cryptonym</a> given by <a href="/introducing-cloudforce-one-threat-operations-and-threat-research">Cloudforce One</a> to the threat group behind this phishing campaign, which overlaps with UAC-0149 activity tracked by <a href="https://cert.gov.ua/">CERT-UA</a> in <a href="https://cert.gov.ua/article/6277849?ref=news.risky.biz">February</a> and <a href="https://cert.gov.ua/article/6278620">April</a> 2024. The threat actor uses dynamic DNS (<a href="https://www.cloudflare.com/learning/dns/glossary/dynamic-dns/">DDNS</a>) for their infrastructure and leverages cloud-based platforms for hosting malicious content and for malware command and control (C2). Our investigation of FlyingYeti TTPs suggests this is likely a Russia-aligned threat group. The actor appears to primarily focus on targeting Ukrainian military entities. Additionally, we observed Russian-language comments in FlyingYeti’s code, and the actor’s operational hours falling within the UTC+3 time zone.</p>
    <div>
      <h2>Campaign background</h2>
      <a href="#campaign-background">
        
      </a>
    </div>
    <p>In the days leading up to the start of the campaign, Cloudforce One observed FlyingYeti conducting reconnaissance on payment processes for Ukrainian communal housing and utility services:</p><ul><li><p>April 22, 2024 – research into changes made in 2016 that introduced the use of QR codes in payment notices</p></li><li><p>April 22, 2024 – research on current developments concerning housing and utility debt in Ukraine</p></li><li><p>April 25, 2024 – research on the legal basis for restructuring housing debt in Ukraine as well as debt involving utilities, such as gas and electricity</p></li></ul><p>Cloudforce One judges that the observed reconnaissance is likely due to the Ukrainian government’s payment moratorium introduced at the start of the full-fledged invasion in February 2022. Under this moratorium, outstanding debt would not lead to evictions or termination of provision of utility services. However, on January 9, 2024, the <a href="https://en.interfax.com.ua/news/economic/959388.html">government lifted this ban</a>, resulting in increased pressure on Ukrainian citizens with outstanding debt. FlyingYeti sought to capitalize on that pressure, leveraging debt restructuring and payment-related lures in an attempt to increase their chances of successfully targeting Ukrainian individuals.</p>
    <div>
      <h2>Analysis of the Komunalka-themed phishing site</h2>
      <a href="#analysis-of-the-komunalka-themed-phishing-site">
        
      </a>
    </div>
    <p>The disrupted phishing campaign would have directed FlyingYeti targets to an actor-controlled GitHub page at hxxps[:]//komunalka[.]github[.]io, which is a spoofed version of the Kyiv Komunalka communal housing site <a href="https://www.komunalka.ua">https://www.komunalka.ua</a>. Komunalka functions as a payment processor for residents in the Kyiv region and allows for payment of utilities, such as gas, electricity, telephone, and Internet. Additionally, users can pay other fees and fines, and even donate to Ukraine’s defense forces.</p><p>Based on past FlyingYeti operations, targets may be directed to the actor’s Github page via a link in a phishing email or an encrypted Signal message. If a target accesses the spoofed Komunalka platform at hxxps[:]//komunalka[.]github[.]io, the page displays a large green button with a prompt to download the document “Рахунок.docx” (“Invoice.docx”), as shown in Figure 1. This button masquerades as a link to an overdue payment invoice but actually results in the download of the malicious archive “Заборгованість по ЖКП.rar” (“Debt for housing and utility services.rar”).</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/22Rnm7YOnwnJocG98RMFDa/def10039081f7e9c6df15980a8b855ac/image4-5.png" />
            
            </figure><p>Figure 1: Prompt to download malicious archive “Заборгованість по ЖКП.rar”</p><p>A series of steps must take place for the download to successfully occur:</p><ul><li><p>The target clicks the green button on the actor’s GitHub page hxxps[:]//komunalka.github[.]io</p></li><li><p>The target’s device sends an HTTP POST request to the Cloudflare Worker worker-polished-union-f396[.]vqu89698[.]workers[.]dev with the HTTP request body set to “user=Iahhdr”</p></li><li><p>The Cloudflare Worker processes the request and evaluates the HTTP request body</p></li><li><p>If the request conditions are met, the Worker fetches the RAR file from hxxps[:]//raw[.]githubusercontent[.]com/kudoc8989/project/main/Заборгованість по ЖКП.rar, which is then downloaded on the target’s device</p></li></ul><p>Cloudforce One identified the infrastructure responsible for facilitating the download of the malicious RAR file and remediated the actor-associated Worker, preventing FlyingYeti from delivering its malicious tooling. In an effort to circumvent Cloudforce One's mitigation measures, FlyingYeti later changed their malware delivery method. Instead of the Workers domain fetching the malicious RAR file, it was loaded directly from GitHub.</p>
    <div>
      <h2>Analysis of the malicious RAR file</h2>
      <a href="#analysis-of-the-malicious-rar-file">
        
      </a>
    </div>
    <p>During remediation, Cloudforce One recovered the RAR file “Заборгованість по ЖКП.rar” and performed analysis of the malicious payload. The downloaded RAR archive contains multiple files, including a file with a name that contains the unicode character “U+201F”. This character appears as whitespace on Windows devices and can be used to “hide” file extensions by adding excessive whitespace between the filename and the file extension. As highlighted in blue in Figure 2, this cleverly named file within the RAR archive appears to be a PDF document but is actually a malicious CMD file (“Рахунок на оплату.pdf[unicode character U+201F].cmd”).</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/55Vjmg9VLEnAFv3RZQoZ2l/866016a2489f2a6c780c9f3971dd28ca/image2-11.png" />
            
            </figure><p>Figure 2: Files contained in the malicious RAR archive “Заборгованість по ЖКП.rar” (“Housing Debt.rar”)</p><p>FlyingYeti included a benign PDF in the archive with the same name as the CMD file but without the unicode character, “Рахунок на оплату.pdf” (“Invoice for payment.pdf”). Additionally, the directory name for the archive once decompressed also contained the name “Рахунок на оплату.pdf”. This overlap in names of the benign PDF and the directory allows the actor to exploit the WinRAR vulnerability <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-38831">CVE-2023-38831</a>. More specifically, when an archive includes a benign file with the same name as the directory, the entire contents of the directory are opened by the WinRAR application, resulting in the execution of the malicious CMD. In other words, when the target believes they are opening the benign PDF “Рахунок на оплату.pdf”, the malicious CMD file is executed.</p><p>The CMD file contains the FlyingYeti PowerShell malware known as <a href="https://cert.gov.ua/article/6277849?ref=news.risky.biz">COOKBOX</a>. The malware is designed to persist on a host, serving as a foothold in the infected device. Once installed, this variant of COOKBOX will make requests to the DDNS domain postdock[.]serveftp[.]com for C2, awaiting PowerShell <a href="https://learn.microsoft.com/en-us/powershell/scripting/powershell-commands?view=powershell-7.4">cmdlets</a> that the malware will subsequently run.</p><p>Alongside COOKBOX, several decoy documents are opened, which contain hidden tracking links using the <a href="https://canarytokens.com/generate">Canary Tokens</a> service. The first document, shown in Figure 3 below, poses as an agreement under which debt for housing and utility services will be restructured.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/20vFV9kNTMmwxFXvpQoJTc/12542fb7a7d2108d49607f2a23fc7575/image5-10.png" />
            
            </figure><p>Figure 3: Decoy document Реструктуризація боргу за житлово комунальні послуги.docx</p><p>The second document (Figure 4) is a user agreement outlining the terms and conditions for the usage of the payment platform komunalka[.]ua.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1VHSTwqfrXWXvoryg8lOcE/68eb096bc82f18c7edcb4c88c1ed6d2c/image3-6.png" />
            
            </figure><p>Figure 4: Decoy document Угода користувача.docx <i>(User Agreement.docx)</i></p><p>The use of relevant decoy documents as part of the phishing and delivery activity are likely an effort by FlyingYeti operators to increase the appearance of legitimacy of their activities.</p><p>The phishing theme we identified in this campaign is likely one of many themes leveraged by this actor in a larger operation to target Ukrainian entities, in particular their defense forces. In fact, the threat activity we detailed in this blog uses many of the same techniques outlined in a <a href="https://cert.gov.ua/article/6278620">recent FlyingYeti campaign</a> disclosed by CERT-UA in mid-April 2024, where the actor leveraged United Nations-themed lures involving Peace Support Operations to target Ukraine’s military. Due to Cloudforce One’s defensive actions covered in the next section, this latest FlyingYeti campaign was prevented as of the time of publication.</p>
    <div>
      <h2>Mitigating FlyingYeti activity</h2>
      <a href="#mitigating-flyingyeti-activity">
        
      </a>
    </div>
    <p>Cloudforce One mitigated FlyingYeti’s campaign through a series of actions. Each action was taken to increase the actor’s cost of continuing their operations. When assessing which action to take and why, we carefully weighed the pros and cons in order to provide an effective active defense strategy against this actor. Our general goal was to increase the amount of time the threat actor spent trying to develop and weaponize their campaign.</p><p>We were able to successfully extend the timeline of the threat actor’s operations from hours to weeks. At each interdiction point, we assessed the impact of our mitigation to ensure the actor would spend more time attempting to launch their campaign. Our mitigation measures disrupted the actor’s activity, in one instance resulting in eight additional hours spent on debugging code.</p><p>Due to our proactive defense efforts, FlyingYeti operators adapted their tactics multiple times in their attempts to launch the campaign. The actor originally intended to have the Cloudflare Worker fetch the malicious RAR file from GitHub. After Cloudforce One interdiction of the Worker, the actor attempted to create additional Workers via a new account. In response, we disabled all Workers, leading the actor to load the RAR file directly from GitHub. Cloudforce One notified GitHub, resulting in the takedown of the RAR file, the GitHub project, and suspension of the account used to host the RAR file. In return, FlyingYeti began testing the option to host the RAR file on the file sharing sites <a href="https://pixeldrain.com/">pixeldrain</a> and <a href="https://www.filemail.com/">Filemail</a>, where we observed the actor alternating the link on the Komunalka phishing site between the following:</p><ul><li><p>hxxps://pixeldrain[.]com/api/file/ZAJxwFFX?download=one</p></li><li><p>hxxps://1014.filemail[.]com/api/file/get?filekey=e_8S1HEnM5Rzhy_jpN6nL-GF4UAP533VrXzgXjxH1GzbVQZvmpFzrFA&amp;pk_vid=a3d82455433c8ad11715865826cf18f6</p></li></ul><p>We notified GitHub of the actor’s evolving tactics, and in response GitHub removed the Komunalka phishing site. After analyzing the files hosted on pixeldrain and Filemail, we determined the actor uploaded dummy payloads, likely to monitor access to their phishing infrastructure (FileMail logs IP addresses, and both file hosting sites provide view and download counts). At the time of publication, we did not observe FlyingYeti upload the malicious RAR file to either file hosting site, nor did we identify the use of alternative phishing or malware delivery methods.</p><p>A timeline of FlyingYeti’s activity and our corresponding mitigations can be found below.</p>
    <div>
      <h3>Event timeline</h3>
      <a href="#event-timeline">
        
      </a>
    </div>
    
<div><table><colgroup>
<col></col>
<col></col>
</colgroup>
<thead>
  <tr>
    <th><span>Date</span></th>
    <th><span>Event Description</span></th>
  </tr></thead>
<tbody>
  <tr>
    <td><span>2024-04-18 12:18</span></td>
    <td><span>Threat Actor (TA) creates a Worker to handle requests from a phishing site</span></td>
  </tr>
  <tr>
    <td><span>2024-04-18 14:16</span></td>
    <td><span>TA creates phishing site komunalka[.]github[.]io on GitHub</span></td>
  </tr>
  <tr>
    <td><span>2024-04-25 12:25</span></td>
    <td><span>TA creates a GitHub repo to host a RAR file</span></td>
  </tr>
  <tr>
    <td><span>2024-04-26 07:46</span></td>
    <td><span>TA updates the first Worker to handle requests from users visiting komunalka[.]github[.]io</span></td>
  </tr>
  <tr>
    <td><span>2024-04-26 08:24</span></td>
    <td><span>TA uploads a benign test RAR to the GitHub repo</span></td>
  </tr>
  <tr>
    <td><span>2024-04-26 13:38</span></td>
    <td><span>Cloudforce One identifies a Worker receiving requests from users visiting komunalka[.]github[.]io, observes its use as a phishing page</span></td>
  </tr>
  <tr>
    <td><span>2024-04-26 13:46</span></td>
    <td><span>Cloudforce One identifies that the Worker fetches a RAR file from GitHub (the malicious RAR payload is not yet hosted on the site)</span></td>
  </tr>
  <tr>
    <td><span>2024-04-26 19:22</span></td>
    <td><span>Cloudforce One creates a detection to identify the Worker that fetches the RAR</span></td>
  </tr>
  <tr>
    <td><span>2024-04-26 21:13</span></td>
    <td><span>Cloudforce One deploys real-time monitoring of the RAR file on GitHub</span></td>
  </tr>
  <tr>
    <td><span>2024-05-02 06:35</span></td>
    <td><span>TA deploys a weaponized RAR (CVE-2023-38831) to GitHub with their COOKBOX malware packaged in the archive</span></td>
  </tr>
  <tr>
    <td><span>2024-05-06 10:03</span></td>
    <td><span>TA attempts to update the Worker with link to weaponized RAR, the Worker is immediately blocked</span></td>
  </tr>
  <tr>
    <td><span>2024-05-06 10:38</span></td>
    <td><span>TA creates a new Worker, the Worker is immediately blocked</span></td>
  </tr>
  <tr>
    <td><span>2024-05-06 11:04</span></td>
    <td><span>TA creates a new account (#2) on Cloudflare</span></td>
  </tr>
  <tr>
    <td><span>2024-05-06 11:06</span></td>
    <td><span>TA creates a new Worker on account #2 (blocked)</span></td>
  </tr>
  <tr>
    <td><span>2024-05-06 11:50</span></td>
    <td><span>TA creates a new Worker on account #2 (blocked)</span></td>
  </tr>
  <tr>
    <td><span>2024-05-06 12:22</span></td>
    <td><span>TA creates a new modified Worker on account #2</span></td>
  </tr>
  <tr>
    <td><span>2024-05-06 16:05</span></td>
    <td><span>Cloudforce One disables the running Worker on account #2</span></td>
  </tr>
  <tr>
    <td><span>2024-05-07 22:16</span></td>
    <td><span>TA notices the Worker is blocked, ceases all operations</span></td>
  </tr>
  <tr>
    <td><span>2024-05-07 22:18</span></td>
    <td><span>TA deletes original Worker first created to fetch the RAR file from the GitHub phishing page</span></td>
  </tr>
  <tr>
    <td><span>2024-05-09 19:28</span></td>
    <td><span>Cloudforce One adds phishing page komunalka[.]github[.]io to real-time monitoring</span></td>
  </tr>
  <tr>
    <td><span>2024-05-13 07:36</span></td>
    <td><span>TA updates the github.io phishing site to point directly to the GitHub RAR link</span></td>
  </tr>
  <tr>
    <td><span>2024-05-13 17:47</span></td>
    <td><span>Cloudforce One adds COOKBOX C2 postdock[.]serveftp[.]com to real-time monitoring for DNS resolution</span></td>
  </tr>
  <tr>
    <td><span>2024-05-14 00:04</span></td>
    <td><span>Cloudforce One notifies GitHub to take down the RAR file</span></td>
  </tr>
  <tr>
    <td><span>2024-05-15 09:00</span></td>
    <td><span>GitHub user, project, and link for RAR are no longer accessible</span></td>
  </tr>
  <tr>
    <td><span>2024-05-21 08:23</span></td>
    <td><span>TA updates Komunalka phishing site on github.io to link to pixeldrain URL for dummy payload (pixeldrain only tracks view and download counts)</span></td>
  </tr>
  <tr>
    <td><span>2024-05-21 08:25</span></td>
    <td><span>TA updates Komunalka phishing site to link to FileMail URL for dummy payload (FileMail tracks not only view and download counts, but also IP addresses)</span></td>
  </tr>
  <tr>
    <td><span>2024-05-21 12:21</span></td>
    <td><span>Cloudforce One downloads PixelDrain document to evaluate payload</span></td>
  </tr>
  <tr>
    <td><span>2024-05-21 12:47</span></td>
    <td><span>Cloudforce One downloads FileMail document to evaluate payload</span></td>
  </tr>
  <tr>
    <td><span>2024-05-29 23:59</span></td>
    <td><span>GitHub takes down Komunalka phishing site</span></td>
  </tr>
  <tr>
    <td><span>2024-05-30 13:00</span></td>
    <td><span>Cloudforce One publishes the results of this investigation</span></td>
  </tr>
</tbody></table></div>
    <div>
      <h2>Coordinating our FlyingYeti response</h2>
      <a href="#coordinating-our-flyingyeti-response">
        
      </a>
    </div>
    <p>Cloudforce One leveraged industry relationships to provide advanced warning and to mitigate the actor’s activity. To further protect the intended targets from this phishing threat, Cloudforce One notified and collaborated closely with GitHub’s Threat Intelligence and Trust and Safety Teams. We also notified CERT-UA and Cloudflare industry partners such as CrowdStrike, Mandiant/Google Threat Intelligence, and Microsoft Threat Intelligence.</p>
    <div>
      <h3>Hunting FlyingYeti operations</h3>
      <a href="#hunting-flyingyeti-operations">
        
      </a>
    </div>
    <p>There are several ways to hunt FlyingYeti in your environment. These include using PowerShell to hunt for WinRAR files, deploying Microsoft Sentinel analytics rules, and running Splunk scripts as detailed below. Note that these detections may identify activity related to this threat, but may also trigger unrelated threat activity.</p>
    <div>
      <h3>PowerShell hunting</h3>
      <a href="#powershell-hunting">
        
      </a>
    </div>
    <p>Consider running a PowerShell script such as <a href="https://github.com/IR-HuntGuardians/CVE-2023-38831-HUNT/blob/main/hunt-script.ps1">this one</a> in your environment to identify exploitation of CVE-2023-38831. This script will interrogate WinRAR files for evidence of the exploit.</p>
            <pre><code>CVE-2023-38831
Description:winrar exploit detection 
open suspios (.tar / .zip / .rar) and run this script to check it 

function winrar-exploit-detect(){
$targetExtensions = @(".cmd" , ".ps1" , ".bat")
$tempDir = [System.Environment]::GetEnvironmentVariable("TEMP")
$dirsToCheck = Get-ChildItem -Path $tempDir -Directory -Filter "Rar*"
foreach ($dir in $dirsToCheck) {
    $files = Get-ChildItem -Path $dir.FullName -File
    foreach ($file in $files) {
        $fileName = $file.Name
        $fileExtension = [System.IO.Path]::GetExtension($fileName)
        if ($targetExtensions -contains $fileExtension) {
            $fileWithoutExtension = [System.IO.Path]::GetFileNameWithoutExtension($fileName); $filename.TrimEnd() -replace '\.$'
            $cmdFileName = "$fileWithoutExtension"
            $secondFile = Join-Path -Path $dir.FullName -ChildPath $cmdFileName
            
            if (Test-Path $secondFile -PathType Leaf) {
                Write-Host "[!] Suspicious pair detected "
                Write-Host "[*]  Original File:$($secondFile)" -ForegroundColor Green 
                Write-Host "[*] Suspicious File:$($file.FullName)" -ForegroundColor Red

                # Read and display the content of the command file
                $cmdFileContent = Get-Content -Path $($file.FullName)
                Write-Host "[+] Command File Content:$cmdFileContent"
            }
        }
    }
}
}
winrar-exploit-detect</code></pre>
            
    <div>
      <h3></h3>
      <a href="#">
        
      </a>
    </div>
    <p>Microsoft Sentinel</p><p>In Microsoft Sentinel, consider deploying the rule provided below, which identifies WinRAR execution via cmd.exe. Results generated by this rule may be indicative of attack activity on the endpoint and should be analyzed.</p>
            <pre><code>DeviceProcessEvents
| where InitiatingProcessParentFileName has @"winrar.exe"
| where InitiatingProcessFileName has @"cmd.exe"
| project Timestamp, DeviceName, FileName, FolderPath, ProcessCommandLine, AccountName
| sort by Timestamp desc</code></pre>
            
    <div>
      <h3></h3>
      <a href="#">
        
      </a>
    </div>
    <p>Splunk</p><p>Consider using <a href="https://research.splunk.com/endpoint/d2f36034-37fa-4bd4-8801-26807c15540f/">this script</a> in your Splunk environment to look for WinRAR CVE-2023-38831 execution on your Microsoft endpoints. Results generated by this script may be indicative of attack activity on the endpoint and should be analyzed.</p>
            <pre><code>| tstats `security_content_summariesonly` count min(_time) as firstTime max(_time) as lastTime from datamodel=Endpoint.Processes where Processes.parent_process_name=winrar.exe `windows_shells` OR Processes.process_name IN ("certutil.exe","mshta.exe","bitsadmin.exe") by Processes.dest Processes.user Processes.parent_process_name Processes.parent_process Processes.process_name Processes.process Processes.process_id Processes.parent_process_id 
| `drop_dm_object_name(Processes)` 
| `security_content_ctime(firstTime)` 
| `security_content_ctime(lastTime)` 
| `winrar_spawning_shell_application_filter`</code></pre>
            
    <div>
      <h2>Cloudflare product detections</h2>
      <a href="#cloudflare-product-detections">
        
      </a>
    </div>
    
    <div>
      <h3>Cloudflare Email Security</h3>
      <a href="#cloudflare-email-security">
        
      </a>
    </div>
    <p>Cloudflare Email Security (CES) customers can identify FlyingYeti threat activity with the following detections.</p><ul><li><p>CVE-2023-38831</p></li><li><p>FLYINGYETI.COOKBOX</p></li><li><p>FLYINGYETI.COOKBOX.Launcher</p></li><li><p>FLYINGYETI.Rar</p></li></ul>
    <div>
      <h2>Recommendations</h2>
      <a href="#recommendations">
        
      </a>
    </div>
    <p>Cloudflare recommends taking the following steps to mitigate this type of activity:</p><ul><li><p>Implement Zero Trust architecture foundations:    </p></li><li><p>Deploy Cloud Email Security to ensure that email services are protected against phishing, BEC and other threats</p></li><li><p>Leverage browser isolation to separate messaging applications like LinkedIn, email, and Signal from your main network</p></li><li><p>Scan, monitor and/or enforce controls on specific or sensitive data moving through your network environment with data loss prevention policies</p></li><li><p>Ensure your systems have the latest WinRAR and Microsoft security updates installed</p></li><li><p>Consider preventing WinRAR files from entering your environment, both at your Cloud Email Security solution and your Internet Traffic Gateway</p></li><li><p>Run an Endpoint Detection and Response (EDR) tool such as CrowdStrike or Microsoft Defender for Endpoint to get visibility into binary execution on hosts</p></li><li><p>Search your environment for the FlyingYeti indicators of compromise (IOCs) shown below to identify potential actor activity within your network.</p></li></ul><p>If you’re looking to uncover additional Threat Intelligence insights for your organization or need bespoke Threat Intelligence information for an incident, consider engaging with Cloudforce One by contacting your Customer Success manager or filling out <a href="https://www.cloudflare.com/zero-trust/lp/cloudforce-one-threat-intel-subscription/">this form</a>.</p>
    <div>
      <h2>Indicators of Compromise</h2>
      <a href="#indicators-of-compromise">
        
      </a>
    </div>
    
<div><table><colgroup>
<col></col>
<col></col>
</colgroup>
<thead>
  <tr>
    <th><span>Domain / URL</span></th>
    <th><span>Description</span></th>
  </tr></thead>
<tbody>
  <tr>
    <td><span>komunalka[.]github[.]io</span></td>
    <td><span>Phishing page</span></td>
  </tr>
  <tr>
    <td><span>hxxps[:]//github[.]com/komunalka/komunalka[.]github[.]io</span></td>
    <td><span>Phishing page</span></td>
  </tr>
  <tr>
    <td><span>hxxps[:]//worker-polished-union-f396[.]vqu89698[.]workers[.]dev</span></td>
    <td><span>Worker that fetches malicious RAR file</span></td>
  </tr>
  <tr>
    <td><span>hxxps[:]//raw[.]githubusercontent[.]com/kudoc8989/project/main/Заборгованість по ЖКП.rar</span></td>
    <td><span>Delivery of malicious RAR file</span></td>
  </tr>
  <tr>
    <td><span>hxxps[:]//1014[.]filemail[.]com/api/file/get?filekey=e_8S1HEnM5Rzhy_jpN6nL-GF4UAP533VrXzgXjxH1GzbVQZvmpFzrFA&amp;pk_vid=a3d82455433c8ad11715865826cf18f6</span></td>
    <td><span>Dummy payload</span></td>
  </tr>
  <tr>
    <td><span>hxxps[:]//pixeldrain[.]com/api/file/ZAJxwFFX?download=</span></td>
    <td><span>Dummy payload</span></td>
  </tr>
  <tr>
    <td><span>hxxp[:]//canarytokens[.]com/stuff/tags/ni1cknk2yq3xfcw2al3efs37m/payments.js</span></td>
    <td><span>Tracking link</span></td>
  </tr>
  <tr>
    <td><span>hxxp[:]//canarytokens[.]com/stuff/terms/images/k22r2dnjrvjsme8680ojf5ccs/index.html</span></td>
    <td><span>Tracking link</span></td>
  </tr>
  <tr>
    <td><span>postdock[.]serveftp[.]com</span></td>
    <td><span>COOKBOX C2</span></td>
  </tr>
</tbody></table></div> ]]></content:encoded>
            <category><![CDATA[Cloud Email Security]]></category>
            <category><![CDATA[Cloudflare Workers]]></category>
            <category><![CDATA[Cloudforce One]]></category>
            <category><![CDATA[CVE]]></category>
            <category><![CDATA[Exploit]]></category>
            <category><![CDATA[GitHub]]></category>
            <category><![CDATA[Intrusion Detection]]></category>
            <category><![CDATA[Malware]]></category>
            <category><![CDATA[Microsoft]]></category>
            <category><![CDATA[Phishing]]></category>
            <category><![CDATA[Remote Browser Isolation]]></category>
            <category><![CDATA[Russia]]></category>
            <category><![CDATA[Serverless]]></category>
            <category><![CDATA[Threat Data]]></category>
            <category><![CDATA[Threat Intelligence]]></category>
            <category><![CDATA[Threat Operations]]></category>
            <category><![CDATA[Ukraine]]></category>
            <category><![CDATA[Vulnerabilities]]></category>
            <guid isPermaLink="false">5JO10nXN3tLVG2C1EttkiH</guid>
            <dc:creator>Cloudforce One</dc:creator>
        </item>
        <item>
            <title><![CDATA[Email Link Isolation: your safety net for the latest phishing attacks]]></title>
            <link>https://blog.cloudflare.com/area1-eli-ga/</link>
            <pubDate>Wed, 11 Jan 2023 13:01:00 GMT</pubDate>
            <description><![CDATA[ Email Link Isolation is your safety net for the odd links that end up in people’s inboxes, and they may click. This added protection turns Cloudflare Area 1 into the most comprehensive email security solution when it comes to protecting against phishing attacks. ]]></description>
            <content:encoded><![CDATA[ <p><i></i></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4ebDbzAoZi18H8cP1ypwtC/7e6c377e1ad9672bda44b7c866f59243/image3-13.png" />
            
            </figure><p>Email is one of the most ubiquitous and also most exploited tools that businesses use every single day. Baiting users into clicking malicious links within an email has been a particularly long-standing tactic for the vast majority of bad actors, from the most sophisticated criminal organizations to the least experienced attackers.</p><p>Even though this is a commonly known approach to gain account access or <a href="https://www.cloudflare.com/learning/email-security/what-is-email-fraud/">commit fraud</a>, users are still being tricked into clicking malicious links that, in many cases, lead to exploitation. The reason is simple: even the best trained users (and security solutions) cannot always distinguish a good link from a bad link.</p><p>On top of that, securing employees' mailboxes often results in multiple vendors, complex deployments, and a huge drain of resources.</p><p>Email Link Isolation turns <a href="https://www.cloudflare.com/products/zero-trust/email-security/">Cloudflare Area 1</a> into the most comprehensive <a href="https://www.cloudflare.com/zero-trust/products/email-security/">email security solution</a> when it comes to <a href="https://www.cloudflare.com/learning/email-security/how-to-prevent-phishing/">protecting against phishing attacks</a>. It rewrites links that could be exploited, keeps users vigilant by alerting them of the uncertainty around the website they’re about to visit, and protects against malware and vulnerabilities through the user-friendly <a href="https://www.cloudflare.com/products/zero-trust/browser-isolation/">Cloudflare Browser Isolation service</a>. Also, in true Cloudflare fashion,  it’s a one-click deployment.</p>
    <div>
      <h3>Protecting against deceptive links</h3>
      <a href="#protecting-against-deceptive-links">
        
      </a>
    </div>
    <p>With more than a couple dozen customers in beta and over one million links protected (so far), we can now clearly see the significant value and potential that this solution can deliver. To extend these benefits to more customers and continue to expand on the multitude of ways we can apply this technology, <b>we’re making Email Link Isolation generally available (GA) starting today</b>.</p><p>Email Link Isolation is included with Cloudflare Area 1 enterprise plan at no extra cost, and can be enabled with three clicks:</p><p>1. Log in to the Area 1 portal.</p><p>2. Go to Settings (the gear icon).</p><p>3. On Email Configuration, go to Email Policies &gt; Link Actions.</p><p>4. Scroll to Email Link Isolation and enable it.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6w3slBSqFADNmJi4LbnRUt/b2d8da9f9a91daffe7f8857f538ea517/image5-6.png" />
            
            </figure>
    <div>
      <h3>Defense in layers</h3>
      <a href="#defense-in-layers">
        
      </a>
    </div>
    <p>Applying multiple layers of defense becomes ever more critical as threat actors continuously look for ways to navigate around each security measure and develop more complex attacks. One of the best examples that demonstrates these evolving techniques is a deferred phishing attack, where an embedded URL is benign when the email reaches your email security stack and eventually your users’ inbox, but is later weaponized post-delivery.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3x69sIoIeC3ld5laLWAgEt/e8e4687cfb460e0749d1e4c367c03c24/image4-10.png" />
            
            </figure><p>To combat evolving email-borne threats, such as malicious links, Area 1 continually updates its <a href="https://www.cloudflare.com/learning/ai/what-is-machine-learning/">machine learning (ML) models</a> to account for all potential attack vectors, and leverages post-delivery scans and retractions as additional layers of defense. And now, customers on the <a href="https://www.cloudflare.com/plans/enterprise/">Enterprise plan</a> also have access to Email Link Isolation as one last defense - a safety net.</p><p>The key to successfully adding layers of security is to use <a href="https://zerotrustroadmap.org/">a strong Zero Trust suite</a>, not a disjointed set of products from multiple vendors. Users need to be kept safe without disrupting their productivity - otherwise they’ll start seeing important emails being quarantined or run into a poor experience when accessing websites, and soon enough they’ll be the ones looking for ways around the company’s security measures.</p>
    <div>
      <h3>Built to avoid productivity impacts</h3>
      <a href="#built-to-avoid-productivity-impacts">
        
      </a>
    </div>
    <p>Email Link Isolation provides an additional layer of security with virtually no disruption to the user experience. It’s smart enough to decide which links are safe, which are malicious, and which are still dubious. Those dubious links are then changed (rewritten to be precise) and Email Link Isolation keeps evaluating them until it reaches a verdict with a high degree of confidence. When a user clicks on one of those rewritten links, Email Link Isolation checks for a verdict (benign or malign) and takes the corresponding action - benign links open in the local browser as if they hadn’t been changed, while malign links are prevented from opening altogether.</p><p>Most importantly, when Email Link Isolation is unable to confidently determine a verdict based on all available intelligence, an interstitial page is presented to ask the user to be extra vigilant. The interstitial page calls out that the website is suspicious, and that the user should refrain from entering any personal information and passwords unless they know and fully trust the website. Over the last few months of beta, we’ve seen that over two thirds of users don’t proceed to the website after seeing this interstitial - that’s a good thing!</p><p>For the users that still want to navigate to the website after seeing the interstitial page, Email Link Isolation uses Cloudflare Browser Isolation to automatically open the link in an isolated browser running in Cloudflare’s closest data center to the user. This delivers an experience virtually indistinguishable from using the local browser, thanks to our Network Vector Rendering (NVR) technology and Cloudflare’s expansive, low-latency network. By opening the suspicious link in an isolated browser, the user is protected against potential browser attacks (including malware, zero days, and other types of malicious code execution).</p><p><b>In a nutshell, the interstitial page is displayed when Email Link Isolation is uncertain about the website, and provides another layer of awareness and protection against phishing attacks. Then, Cloudflare Browser Isolation is used to protect against malicious code execution when a user decides to still proceed to such a website.</b></p>
    <div>
      <h3>What we’ve seen in the beta</h3>
      <a href="#what-weve-seen-in-the-beta">
        
      </a>
    </div>
    <p>As expected, the percentage of rewritten links that users actually click is quite small (single digit percentage). That’s because the majority of such links are not delivered in messages the users are expecting, and aren’t coming from trusted colleagues or partners of theirs. So, even when a user clicks on such a link, they will often see the interstitial page and decide not to proceed any further. We see that less than half of all clicks lead to the user actually visiting the website (in Browser Isolation, to protect against malicious code that could otherwise be executing behind the scenes).</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/472qL0UBYcnHd1n1oFTegD/67264b3613f47281febb5a50b63e8ca5/image1-24.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7iB2Pyy7fHHerMwX7GCbrJ/8991046688880e6eef97ae7ec130dd3d/image2-16.png" />
            
            </figure><p>You may be wondering why we’re not seeing a larger amount of clicks on these rewritten links. The answer is quite simply that link Email Link Isolation is indeed that last layer of protection against attack vectors that may have evaded other lines of defense. Virtually all the well crafted phishing attacks that try and trick users into clicking malicious links are already being stopped by the Area 1 email security, and such messages don’t reach users’ inboxes.</p><p>The balance is very positive. From all the customers using Email Link Isolation beta in production, some Fortune 500, we received no negative feedback on the user experience. <b>That means that we’re meeting one of the most challenging goals - to provide additional security without negatively affecting users and without adding the burden of tuning/administration to the SOC and IT teams.</b></p><p>One interesting thing we uncover is how valuable our customers are finding our click-time inspection of link shorteners. The fact that a shortened URL (e.g. bit.ly) can be modified at any time to point to a different website has been making some of our customers anxious. Email Link Isolation inspects the link at time-of-click, evaluates the actual website that it’s going to open, and proceeds to open locally, block or present the interstitial page as adequate. We’re now working on full link shortener coverage through Email Link Isolation.</p>
    <div>
      <h3>All built on Cloudflare</h3>
      <a href="#all-built-on-cloudflare">
        
      </a>
    </div>
    <p>Cloudflare’s intelligence is driving the decisions of what gets rewritten. We have earlier signals than others.</p><p>Email Link Isolation has been built on Cloudflare’s unique capabilities in many areas.</p><p>First, because Cloudflare sees enough Internet traffic for us to confidently identify new/low confidence and potentially dangerous domains earlier than anyone else - leveraging the Cloudflare intelligence for this early signal is key to the user experience, to not add speed bumps to legitimate websites that are part of our users’ daily routines. Next, we’re using <a href="https://workers.cloudflare.com/">Cloudflare Workers</a> to process this data and serve the interstitial without introducing frustrating delays to the user. And finally, only <a href="https://www.cloudflare.com/products/zero-trust/browser-isolation/">Cloudflare Browser Isolation</a> can protect against malicious code with a low-latency experience that is invisible to end users and feels like a local browser.</p><p>If you’re not yet a Cloudflare Area 1 customer, start your free trial and phishing risk assessment <a href="https://www.cloudflare.com/lp/emailsecurity/">here</a>.</p> ]]></content:encoded>
            <category><![CDATA[CIO Week]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Cloud Email Security]]></category>
            <category><![CDATA[Email]]></category>
            <category><![CDATA[Remote Browser Isolation]]></category>
            <category><![CDATA[SASE]]></category>
            <guid isPermaLink="false">5s7YqaliwrZdTs3OtmUwUQ</guid>
            <dc:creator>João Sousa Botto</dc:creator>
        </item>
        <item>
            <title><![CDATA[One-click data security for your internal and SaaS applications]]></title>
            <link>https://blog.cloudflare.com/one-click-zerotrust-isolation/</link>
            <pubDate>Wed, 11 Jan 2023 13:00:00 GMT</pubDate>
            <description><![CDATA[ Protect sensitive data on any Access app for any user on any device. ]]></description>
            <content:encoded><![CDATA[ 
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6nirO70ymZjx0rcbyHmdCZ/f3d0ccc97a06762128e8c0c6126fdba6/image3-17.png" />
            
            </figure><p>Most of the CIOs we talk to want to replace dozens of point solutions as they start their own Zero Trust journey. <a href="https://www.cloudflare.com/cloudflare-one/">Cloudflare One</a>, our comprehensive <a href="https://www.cloudflare.com/learning/access-management/what-is-sase/">Secure Access Service Edge (SASE)</a> platform can help teams of any size rip out all the legacy appliances and services that tried to keep their data, devices, and applications safe without compromising speed.</p><p>We also built those products to work better together. Today, we’re bringing Cloudflare’s best-in-class <a href="https://www.cloudflare.com/products/zero-trust/browser-isolation/">browser isolation</a> technology to our industry-leading Zero Trust <a href="https://www.cloudflare.com/learning/access-management/what-is-access-control/">access control</a> product. Your team can now control the data in any application, and what a user can do in the application, with a single click in the Cloudflare dashboard. We’re excited to help you replace your private networks, virtual desktops, and data control boxes with a <a href="https://www.cloudflare.com/zero-trust/solutions/">single, faster Zero Trust solution</a>.</p>
    <div>
      <h3>Zero Trust access control is just the first step</h3>
      <a href="#zero-trust-access-control-is-just-the-first-step">
        
      </a>
    </div>
    <p>Most organizations begin their <a href="https://www.cloudflare.com/learning/access-management/how-to-implement-zero-trust/">Zero Trust migration</a> by replacing a virtual private network (VPN). VPN deployments trust too many users by default. In most configurations, any user on a private network can reach any resource on that same network.</p><p>The consequences vary. On one end of the spectrum, employees in marketing can accidentally stumble upon payroll amounts for the entire organization. At the other end, attackers who compromise the credentials of a support agent can move through a network to reach trade secrets or customer production data.</p><p>Zero Trust access control replaces this model by inverting the security posture. A Zero Trust network trusts no one by default. Every user and each request or connection, must prove they can reach a specific resource. Administrators can build granular rules and monitor comprehensive logs to prevent incidental or malicious access incidents.</p><p><a href="/cloudflare-one-one-year-later/">Over 10,000 teams</a> have adopted Cloudflare One to replace their own private network with a <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust model</a>. We offer those teams rules that go beyond just identity. Security teams can <a href="/require-hard-key-auth-with-cloudflare-access/">enforce hard key authentication</a> for specific applications as a second factor. Sensitive production systems can require users to <a href="https://developers.cloudflare.com/cloudflare-one/policies/access/require-purpose-justification/">provide the reason</a> they need <a href="/announcing-access-temporary-authentication/">temporary access</a> while they request permission from a senior manager. We integrate with just about <a href="https://developers.cloudflare.com/cloudflare-one/identity/devices/">every device posture provider</a>, or you can <a href="/6-new-ways-to-validate-device-posture/">build your own</a>, to ensure that only corporate devices connect to your systems.</p><p>The teams who deploy this solution improve the security of their enterprise overnight while also making their applications faster and more usable for employees in any region. However, once users pass all of those checks we still rely on the application to decide what they can and cannot do.</p><p>In some cases, that means Zero Trust access control is not sufficient. An employee planning to leave tomorrow could download customer contact info. A contractor connecting from an unmanaged device can screenshot schematics. As enterprises evolve on their SASE migration, they need to extend Zero Trust control to application usage and data.</p>
    <div>
      <h3>Isolate sessions without any client software</h3>
      <a href="#isolate-sessions-without-any-client-software">
        
      </a>
    </div>
    <p>Cloudflare’s browser isolation technology gives teams the ability to control usage and data without making the user experience miserable. Legacy approaches to <a href="https://www.cloudflare.com/learning/access-management/what-is-browser-isolation/">browser isolation</a> relied on one of two methods to secure a user on the public Internet:</p><ul><li><p><b>Document Object Model (DOM) manipulation</b> - unpack the webpage, inspect it, hope you caught the vulnerability, attempt to repack the webpage, deliver it. This model leads to thousands of broken webpages and total misses on zero days and other threats.</p></li><li><p><b>Pixel pushing</b> - stream a browser running far away to the user, like a video. This model leads to user complaints due to performance and a long tail of input incompatibilities.</p></li></ul><p><a href="/cloudflare-and-remote-browser-isolation/">Cloudflare’s approach is different</a>. We run headless versions of Chromium, the open source project behind Google Chrome and Microsoft Edge and other browsers, in our data centers around the world. We send the final rendering of the webpage, the draw commands, to a user's local device.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2Rub7G6NKrhsrrE7sI5DJZ/1ce7980c948d40b75d120867a96f3733/image2-18.png" />
            
            </figure><p>The user thinks it is just the Internet. Highlighting, right-clicking, videos - they all just work. Users do not need a special browser client. Cloudflare’s technology just works in any browser on mobile or desktop. For security teams, they can guarantee that code never executes on the devices in the field to stop Zero-Day attacks.</p><p>We added browser isolation to Cloudflare One to protect against attacks that leap out of a browser from the public Internet. However, controlling the browser also gives us the ability to pass that control along to security and IT departments, so they can focus on another type of risk - data misuse.</p><p>As part of this launch, when administrators <a href="https://www.cloudflare.com/application-services/solutions/">secure an application</a> with Cloudflare’s Zero Trust access control product, they can click an additional button that will force sessions into our isolated browser.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3lsdhsnQffyncOIP1jPfJJ/905858e945f787fea6e3a7d49c0e71fc/image1-28.png" />
            
            </figure><p>When the user authenticates, Cloudflare Access checks all the Zero Trust rules configured for a given application. When this isolation feature is enabled, Cloudflare will silently open the session in our isolated browser. The user does not need any special software or to be trained on any unique steps. They just navigate to the application and start doing their work. Behind the scenes, the session runs entirely in Cloudflare’s network.</p>
    <div>
      <h3>Control usage and data in sessions</h3>
      <a href="#control-usage-and-data-in-sessions">
        
      </a>
    </div>
    <p>By running the session in Cloudflare’s isolated browser, administrators can begin to build rules that replace some goals of legacy virtual desktop solutions. Some enterprises deploy virtual desktop instances (VDIs) to sandbox application usage. Those VDI platforms extended applications to employees and contractors without allowing the application to run on the physical device.</p><p>Employees and contractors tend to hate this method. The client software required is clunky and not available on every operating system. The speed slows them down. Administrators also need to invest time in maintaining the desktops and the virtualization software that power them.</p><p>We’re excited <a href="/decommissioning-virtual-desktop/">to help you replace that point solution</a>, too. Once an application is isolated in Cloudflare’s network, you can toggle additional rules that control how users interact with the resource. For example, you can disable potential data loss vectors like file downloads, printing, or copy-pasting. Add watermarks, both visible and invisible, to audit screenshot leaks.</p><p>You can extend this control beyond just data loss. Some teams have sensitive applications where you need users to connect without inputting any data, but they do not have the developer time to build a “Read Only” mode. With Cloudflare One, those teams can toggle “Disable keyboard” and allow users to reach the service while blocking any input.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7f3WOaiEPIsf8WaxShdurE/825bde4738e63ad27c2db5f06fab6f42/image5-9.png" />
            
            </figure><p>The isolated solution also integrates with <a href="/inline-dlp-ga/">Cloudflare One’s Data Loss Prevention</a> (DLP) suite. With a few additional settings, you can bring <a href="https://www.cloudflare.com/learning/cloud/what-is-dspm/">comprehensive data control</a> to your applications without any additional engineering work or point solution deployment. If a user strays too far in an application and attempts to download something that contains personal information like social security or credit card numbers, Cloudflare’s network will stop that download while still allowing otherwise approved files.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5bqHdkpi2r8Cb04Frl0geg/d1a4bf21fd0e4bd4913db9c106d84315/image4-15.png" />
            
            </figure>
    <div>
      <h3>Extend that control to SaaS applications</h3>
      <a href="#extend-that-control-to-saas-applications">
        
      </a>
    </div>
    <p>Most of the customers we hear from need to bring this level of data and usage control to their self-hosted applications. Many of the SaaS tools they rely on have more advanced role-based rules. However, that is not always the case and, even if the rules exist, they are not as comprehensive as needed and require an administrator to manage a dozen different application settings.</p><p>To avoid that hassle you can bring Cloudflare One’s one-click isolation feature to your SaaS applications, too. Cloudflare’s access control solution can be configured as an identity proxy that will force all logins to any SaaS application that supports SSO through Cloudflare’s network where additional rules, including isolation, can be applied.</p>
    <div>
      <h3>What’s next?</h3>
      <a href="#whats-next">
        
      </a>
    </div>
    <p>Today’s announcement brings together two of our customers’ favorite solutions - our Cloudflare Access solution and our browser isolation technology. Both products are available to use today. You can start building rules that force isolation or control data usage by following the guides linked <a href="https://developers.cloudflare.com/cloudflare-one/policies/browser-isolation/isolation-policies/">here</a>.</p><p>Willing to wait for the easy button? Join the <a href="https://www.cloudflare.com/lp/application-isolation-beta/">beta</a> today for the one-click version that we are rolling out to customer accounts.</p> ]]></content:encoded>
            <category><![CDATA[CIO Week]]></category>
            <category><![CDATA[Cloudflare Access]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[VDI]]></category>
            <category><![CDATA[Data Loss Prevention]]></category>
            <category><![CDATA[Remote Browser Isolation]]></category>
            <category><![CDATA[SASE]]></category>
            <guid isPermaLink="false">6ZzrmWoBfR99ZDBG4KYkAt</guid>
            <dc:creator>Tim Obezuk</dc:creator>
            <dc:creator>Kenny Johnson</dc:creator>
        </item>
        <item>
            <title><![CDATA[Click Here! (safely): Automagical Browser Isolation for potentially unsafe links in email]]></title>
            <link>https://blog.cloudflare.com/safe-email-links/</link>
            <pubDate>Thu, 29 Sep 2022 13:00:00 GMT</pubDate>
            <description><![CDATA[ There’s always a cat and mouse game between hackers and security companies. New attacks try to weaponize website links after emails have been delivered to mailboxes, and Email Link Isolation is here to revolutionize protection against those attacks. ]]></description>
            <content:encoded><![CDATA[ <p></p><p>We're often told not to click on 'odd' links in email, but what choice do we really have? With the volume of emails and the myriad of SaaS products that companies use, it's inevitable that employees find it almost impossible to distinguish a good link before clicking on it. And that's before attackers go about making links harder to inspect and hiding their URLs behind tempting "Confirm" and "Unsubscribe" buttons.</p><p>We need to let end users click on links and have a safety net for when they unwittingly click on something malicious — let’s be honest, it’s bound to happen even if you do it by mistake. That safety net is Cloudflare's Email Link Isolation.</p>
    <div>
      <h2>Email Link Isolation</h2>
      <a href="#email-link-isolation">
        
      </a>
    </div>
    <p>With Email Link Isolation, when a user clicks on a suspicious link — one that email security hasn’t identified as ‘bad’, but is still not 100% sure it’s ‘good’ — they won’t immediately be taken to that website. Instead, the user first sees an interstitial page recommending extra caution with the website they’ll visit, especially if asked for passwords or personal details.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/176fAKaEbWz4ESe4erOMOc/21dc4ffb698a1cbee7d6083be0ade544/image1-78.png" />
            
            </figure><p>From there, one may choose to not visit the webpage or to proceed and open it in a remote isolated browser that runs on Cloudflare’s global network and not on the user’s local machine. This helps protect the user and the company.</p><p>The user experience in our isolated browser is virtually indistinguishable from using one’s local browser (we’ll talk about why below), but untrusted and potentially malicious payloads will execute away from the user’s computer and your corporate network.</p><p>In summary, this solution:</p><ul><li><p>Keeps users alert to prevent credential theft and <a href="https://www.cloudflare.com/zero-trust/solutions/account-takeover-prevention/">account takeover</a></p></li><li><p>Automatically blocks dangerous downloads</p></li><li><p>Prevents malicious scripts from executing on the user’s device</p></li><li><p>Protects against zero-day exploits on the browser</p></li></ul>
    <div>
      <h2>How can I try it</h2>
      <a href="#how-can-i-try-it">
        
      </a>
    </div>
    <p><a href="https://www.cloudflare.com/products/zero-trust/email-security/">Area 1</a> is Cloudflare’s <a href="https://www.cloudflare.com/zero-trust/solutions/email-security-services/">email security solution</a>. It protects organizations from the full range of email attack types (URLs, payloads, BEC), vectors (email, web, network), and attack channels (external, internal, trusted partners) by enforcing multiple layers of protection before, during, and after the email hits the inbox. Today it adds Email Link Isolation to the protections it offers.</p><p>If you are a Cloudflare Area 1 customer you can <a href="https://www.cloudflare.com/zero-trust/lp/email-link-isolation/">request access to the Email Link Isolation beta</a> today. We have had Email Link Isolation deployed to all Cloudflare employees for the last four weeks and are ready to start onboarding customers.</p><p>During the beta it will be available for free on <a href="https://www.cloudflare.com/plans/">all plans</a>. After the beta it will still be included at no extra cost with our <a href="https://www.cloudflare.com/press-releases/2020/announcing-area-1-phishguard/">PhishGuard plan</a>.</p>
    <div>
      <h2>Under the hood</h2>
      <a href="#under-the-hood">
        
      </a>
    </div>
    <p>To create Email Link Isolation we used a few ingredients that are quite special to Cloudflare. It may seem complicated and, in a sense, the protection is complex, but we designed this so that the user experience is fast, safe, and with clear options on how to proceed.</p>
    <div>
      <h3>1. Find potentially unsafe domains</h3>
      <a href="#1-find-potentially-unsafe-domains">
        
      </a>
    </div>
    <p>First, we have created a constantly updating list of domains that the <a href="https://www.cloudflare.com/learning/dns/what-is-1.1.1.1/">Cloudflare’s DNS resolver</a> recently saw for the first time, or that are somehow potentially unsafe (leveraging classifiers from the <a href="https://www.cloudflare.com/products/zero-trust/gateway/">Cloudflare Gateway</a> and other products). These are domains that would be too disruptive for the organization to block outright, but that should still be navigated with extra caution.</p><p>For example, people acquire domains and create new businesses every day. There’s nothing wrong with that - quite the opposite. However, attackers often set up or acquire websites serving legitimate content and, days or weeks later, send a link to intended targets. The emails flow through as benign and the attacker weaponizes the website when emails are already sitting on people’s inboxes. Blocking all emails with links to new websites would cause users to surely miss important communications, and delivering the emails while making links safe to click on is a much better suited approach.</p><p>There is also hosting infrastructure from large cloud providers, such as Microsoft or Google, that prevent crawling and scanning. These are used on our day-to-day business, but attackers may deploy malicious content there. You wouldn’t want to fully block emails with links to Microsoft SharePoint, for example, but it’s certainly safer to use Email Link Isolation on them if they link to outside your organization.</p><p>Attackers are constantly experimenting with new ways of looking legitimate to their targets, and that’s why relying on the early signals that Cloudflare sees makes such a big difference.</p>
    <div>
      <h3>2. Rewrite links in emails</h3>
      <a href="#2-rewrite-links-in-emails">
        
      </a>
    </div>
    <p>The second ingredient we want to highlight is that, as Cloudflare Area 1 processes and inspects emails for security concerns, it also checks the domain of every link against the suspicious list. If an email contains a link to a suspicious domain, Cloudflare Area 1 automatically changes it (<i>rewrites</i>) so that the interstitial page is shown, and the link opens with <a href="https://www.cloudflare.com/products/zero-trust/browser-isolation/">Cloudflare Browser Isolation</a> by default.</p><p><i>Note: Rewriting email links is only possible when emails are processed inline, which is one of the options for deploying Area 1. One of the big disadvantages of any email security solution deployed as API-only is that closing this last mile gap through link rewriting isn’t a possibility.</i></p>
    <div>
      <h3>3. Opens remotely but feels local</h3>
      <a href="#3-opens-remotely-but-feels-local">
        
      </a>
    </div>
    <p>When a user clicks on one of these rewritten links, instead of directly accessing a potential threat, our systems will first check their current classification (benign, suspicious, malicious). Then, if it’s malicious, the user will be blocked from continuing to the website and see an interstitial page informing them why. No further action is required.</p><p>If the link is suspicious, the user is offered the option to open it in an isolated browser. What happens next? The link is opened with Cloudflare Browser Isolation in a nearby <a href="https://www.cloudflare.com/network/">Cloudflare data center</a> (globally within 50 milliseconds of 95% of the Internet-connect population). To ensure website compatibility and security, the target website is entirely executed in a sandboxed Chromium-based browser. Finally, the website is instantly streamed back to the user as vector instructions consumed by a lightweight HTML5-compatible remoting client in the user’s preferred web browser. These safety precautions happen with no perceivable latency to the end user.</p><p>Cloudflare Browser Isolation is an extremely secure remote browsing experience that feels just like local browsing. And delivering this is only possible by serving isolated browsers on a low latency, global network with our <a href="/cloudflare-and-remote-browser-isolation/">unique vector based streaming</a> technology. This architecture is different from legacy <a href="https://www.cloudflare.com/learning/access-management/what-is-browser-isolation/">remote browser isolation</a> solutions that rely on fragile and insecure DOM-scrubbing, or are bandwidth intensive and high latency pixel pushing techniques hosted in a few high latency data centers.</p>
    <div>
      <h3>4. Reassess (always learning)</h3>
      <a href="#4-reassess-always-learning">
        
      </a>
    </div>
    <p>Last but not least, another ingredient that makes Email Link Isolation particularly effective is that behind the scenes our services are constantly reevaluating domains and updating their reputation in Cloudflare’s systems.</p><p>When a domain on our suspicious list is confirmed to be benign, all links to it can automatically start opening with the user’s local browser instead of with Cloudflare Browser Isolation.</p><p>Similarly, if a domain on the suspicious list is identified as malign, all links to that domain can be immediately blocked from opening. So, our services are constantly learning and acting accordingly.</p>
    <div>
      <h2>Email Link Isolation at Cloudflare</h2>
      <a href="#email-link-isolation-at-cloudflare">
        
      </a>
    </div>
    <p>It’s been four weeks since we deployed Email Link Isolation to all our 3,000+ Cloudflare employees, here’s what we saw:</p><ul><li><p>100,000 link rewrites per week on Spam and Malicious emails. Such emails were already blocked server side by Area 1 and users never see them. It’s still safer to rewrite these as they may be released from quarantine on user request.</p></li><li><p>2,500 link rewrites per week on Bulk emails. Mostly <a href="https://en.wikipedia.org/wiki/Graymail_(email)">graymail</a>, which are commercial/bulk communications the user opted into. They may end up in the users’ spam folder.</p></li><li><p>1,000 link rewrites per week on emails that do not fit any of the categories above — these are the ones that normally reach the user’s inboxes. These are almost certainly benign, but there’s still enough doubt to warrant a link rewrite.</p></li><li><p><b>25 clicks on rewritten links per week</b> (up to six per day).</p></li></ul>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1J3g2dQOVL9ZKOnxr0YEiv/96056ff6d84319ebf7dfdd407409fb50/image2-64.png" />
            
            </figure><p>As a testament to the efficacy of Cloudflare Area 1, 25 suspicious link clicks per week for a universe of over 3,000 employees is a very low number. Thanks to Email Link Isolation, users were protected against exploits.</p>
    <div>
      <h2>Better together with Cloudflare Zero Trust</h2>
      <a href="#better-together-with-cloudflare-zero-trust">
        
      </a>
    </div>
    <p>In future iterations, administrators will be able to connect Cloudflare Area 1 to their Cloudflare Zero Trust account and apply isolation policies, <a href="/inline-dlp-ga/">DLP</a> (Data Loss Protection) controls and in-line <a href="/managing-clouds-cloudflare-casb/">CASB</a> (a <a href="https://www.cloudflare.com/learning/access-management/what-is-a-casb/">cloud access security broker</a>) to email link isolated traffic.</p><p>We are starting our beta today. If you’re interested in trying Email Link Isolation and start to feel safer with your email experience, you should sign up <a href="https://www.cloudflare.com/zero-trust/lp/email-link-isolation/">here</a>.</p> ]]></content:encoded>
            <category><![CDATA[Birthday Week]]></category>
            <category><![CDATA[Email]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[Cloud Email Security]]></category>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[Remote Browser Isolation]]></category>
            <category><![CDATA[SASE]]></category>
            <guid isPermaLink="false">5YA2XnoQIqTkOoF2QWarvE</guid>
            <dc:creator>João Sousa Botto</dc:creator>
            <dc:creator>Tim Obezuk</dc:creator>
            <dc:creator>Phil Syme</dc:creator>
        </item>
        <item>
            <title><![CDATA[Isolate browser-borne threats on any network with WAN-as-a-Service]]></title>
            <link>https://blog.cloudflare.com/magic-gateway-browser-isolation/</link>
            <pubDate>Tue, 20 Sep 2022 13:15:00 GMT</pubDate>
            <description><![CDATA[ Defend any network from browser-borne threats with Cloudflare Browser Isolation by connecting legacy firewalls over IPsec / GRE ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Defending corporate networks from emerging threats is no easy task for security teams who manage complex stacks of firewalls, DNS and HTTP filters, and DLP and sandboxing appliances. Layering new defenses, such as Remote Browser Isolation to mitigate browser-borne threats that target vulnerabilities in unpatched browsers, can be complex for administrators who first have to plan how to integrate a new solution within their existing networks.</p><p>Today, we’re making it easier for administrators to integrate <a href="https://www.cloudflare.com/products/zero-trust/browser-isolation/">Cloudflare Browser Isolation</a> into their existing network from any traffic source such as IPsec and GRE via our <a href="https://www.cloudflare.com/learning/network-layer/what-is-a-wan/">WAN-as-a-service</a>, <a href="https://www.cloudflare.com/magic-wan/">Magic WAN</a>. This new capability enables administrators to connect on-premise networks to Cloudflare and protect Internet activity from browser-borne malware and zero day threats, without installing any endpoint software or nagging users to update their browsers.</p><p>Before diving into the technical details, let’s recap how Magic WAN and Browser Isolation fit into network perimeter architecture and a defense-in-depth security strategy.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4eWvHjEtNKbRnfuzqzpPCO/4276bdeb036ce854ff8c7c2898af4d6c/Magic-Gateway---BISO_diagram.png" />
            
            </figure>
    <div>
      <h2>Securing networks at scale with Magic WAN</h2>
      <a href="#securing-networks-at-scale-with-magic-wan">
        
      </a>
    </div>
    <p>Companies have <a href="/magic-wan-firewall/">historically</a> secured their networks by building a perimeter out of on-premise routers, firewalls, dedicated connectivity and additional appliances for each layer of the security stack. Expanding the security perimeter pushes networks to their limits as centralized solutions become saturated, congested and add latency, and decentralizing adds complexity, operational overhead and cost.</p><p>These challenges are further compounded as security teams introduce more sophisticated security measures such as Browser Isolation. Cloudflare eliminates the complexity, fragility and performance limitations of legacy network perimeters by displacing on-premise firewalls with cloud firewalls hosted on our global network. This enables security teams to focus on delivering a layered security approach and successfully deploy Browser Isolation without the latency and scale constraints of legacy approaches.</p>
    <div>
      <h2>Securing web browsing activity with Browser Isolation</h2>
      <a href="#securing-web-browsing-activity-with-browser-isolation">
        
      </a>
    </div>
    <p>A far cry from their humble origins as document viewers, web browsers have evolved into extraordinarily complex pieces of software capable of running untrusted code from any connected server on the planet. In 2022 alone, Chromium, the engine that powers more than 70% of all web browsing activity and is used by everyone to access sensitive data in email and internal applications has seen six disclosed zero-day vulnerabilities.</p><p>In spite of this persistent and ongoing security risk, the patching of browsers is often left to the end-user who chooses when to <i>hit update</i> (while also restarting their browser and disrupting productivity). Patching browsers typically takes days and users remain exposed to malicious website code until it is complete.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/39IcBO7YrxjuLNHIVcY0xC/7f950d1eae4649b410733b1ef0c549b0/image5-6.png" />
            
            </figure><p>To combat this risk Browser Isolation takes a <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">zero trust approach</a> to web browsing and executes all website code in a remote browser. Should malicious code be executed, it occurs remotely from the user in an isolated container. The end-user and their connected network is insulated from the impact of the attack.</p>
    <div>
      <h2>Magic WAN + Browser Isolation</h2>
      <a href="#magic-wan-browser-isolation">
        
      </a>
    </div>
    <p>Customers who have networks protected by Magic WAN can now enable Browser Isolation through HTTP policies.</p>
    <div>
      <h3>Connect your network to Cloudflare and enable Secure Web Gateway</h3>
      <a href="#connect-your-network-to-cloudflare-and-enable-secure-web-gateway">
        
      </a>
    </div>
    <p>Magic WAN enables connecting any network to Cloudflare over IPsec, GRE, Private Network connectivity. The steps for this process may vary significantly depending on your vendor. See our <a href="https://developers.cloudflare.com/magic-wan/get-started/">developer documentation</a> for more information.</p>
    <div>
      <h3>Create an isolation policy</h3>
      <a href="#create-an-isolation-policy">
        
      </a>
    </div>
    <p>Isolation policies function the same with Magic WAN as they do for traffic sourced from devices with our Roaming Client (WARP) installed.</p><p>Navigate to the Cloudflare Zero Trust dashboard → Gateway → HTTP Policies and create a new HTTP policy with an isolate action.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/COOtMQFiiiCHjZHPyBcMt/194e71dd0c2b27ab2ae4d40965e53906/image3-11.png" />
            
            </figure><p>See our developer documentation to <a href="https://developers.cloudflare.com/cloudflare-one/policies/browser-isolation/#isolate-policies">learn more about isolation policies</a>.</p>
    <div>
      <h3>Enable non-identity on-ramp support</h3>
      <a href="#enable-non-identity-on-ramp-support">
        
      </a>
    </div>
    <p>Prior to this release, Magic WAN + Browser Isolation traffic presented a block page. Existing customers will continue to see this block page. To enable Browser Isolation traffic for Magic Gateway navigate to: Cloudflare Zero Trust → Settings → Browser Isolation → Non-identity on-ramp support and select Enable.</p>
    <div>
      <h3>Configuration complete</h3>
      <a href="#configuration-complete">
        
      </a>
    </div>
    <p>Once configured traffic that matches your isolation criteria is transparently intercepted and served through a remote browser. End-users are automatically connected to a remote browser at the closest Cloudflare data center. This keeps latency to a minimum, ensuring a positive end-user experience while mitigating security threats.</p>
    <div>
      <h2>Try Cloudflare Browser</h2>
      <a href="#try-cloudflare-browser">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/AkJyD6rdgQNs6ad3r5YP0/8149c49ecccfd559ef33dd1e077e81d6/image2-18.png" />
            
            </figure><p>Interested in testing our remote browsing experience? Visit <a href="http://cloudflare.com/products/zero-trust/browser-isolation/experience">this landing page</a> to request demo access to Browser Isolation. This service is hosted on our global network, and you’ll be connected to a real remote browser hosted in a nearby Cloudflare data center.</p>
    <div>
      <h2>What’s next?</h2>
      <a href="#whats-next">
        
      </a>
    </div>
    <p>We’re excited to continue integrating new on-ramps to consistently protect users from web based threats on any device and any network. Stay tuned for updates on deploying Browser Isolation via Proxy PAC files and deploying in-line on top of self-hosted Access applications.</p>
    <div>
      <h2>Watch on Cloudflare TV</h2>
      <a href="#watch-on-cloudflare-tv">
        
      </a>
    </div>
    <div></div> ]]></content:encoded>
            <category><![CDATA[GA Week]]></category>
            <category><![CDATA[General Availability]]></category>
            <category><![CDATA[Remote Browser Isolation]]></category>
            <category><![CDATA[SASE]]></category>
            <guid isPermaLink="false">7I4LqkD6CNL9juxKQshxse</guid>
            <dc:creator>Tim Obezuk</dc:creator>
        </item>
        <item>
            <title><![CDATA[Connect to private network services with Browser Isolation]]></title>
            <link>https://blog.cloudflare.com/browser-isolation-private-network/</link>
            <pubDate>Fri, 24 Jun 2022 13:15:05 GMT</pubDate>
            <description><![CDATA[ Browser Isolation with private network connectivity enables your users to securely access private web services without installing any software or agents on an endpoint device or absorbing the management and cost overhead of serving virtual desktops ]]></description>
            <content:encoded><![CDATA[ 
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5Ue8yFX0j4bZgnXuJRdRrD/c0d4e4e4b17391afcbe08e73f43fd58d/image3-29.png" />
            
            </figure><p>If you’re working in an IT organization that has relied on virtual desktops but looking to get rid of them, we have some good news: starting today, you can connect your users to your private network via isolated remote browsers. This means you can deliver sensitive internal web applications — reducing costs without sacrificing security.</p><p><a href="https://www.cloudflare.com/learning/access-management/what-is-browser-isolation/">Browser Isolation</a> with private network connectivity enables your users to securely access private web services without installing any software or agents on an endpoint device or absorbing the management and cost overhead of serving virtual desktops. What’s even better: Browser Isolation is natively integrated into Cloudflare’s Zero Trust platform, making it easy to <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">control and monitor</a> who can access what private services from a remote browser without sacrificing performance or security.</p>
    <div>
      <h2>Deprecating virtual desktops for web apps</h2>
      <a href="#deprecating-virtual-desktops-for-web-apps">
        
      </a>
    </div>
    <p>The presence of virtual desktops in the workplace tells an interesting story about the evolution of deploying and securing enterprise applications. Serving a full virtual desktop to end-users is an expensive decision, each user requiring a dedicated virtual machine with multiple CPU cores and gigabytes of memory to run a full operating system. This cost was offset by the benefits of streamlining desktop app distribution and the security benefits of isolating unmanaged devices from the aging application.</p><p>Then the launch of Chromium/V8 surprised everyone by demonstrating that desktop-grade applications could be built entirely in web-based technologies.  Today, a vast majority of applications — either SaaS or private — exist within a web browser. With most Virtual Desktop Infrastructure (VDI) users connecting to a remote desktop just to open a web browser, VDI’s utility for distributing applications is really no longer needed and has become a tremendously expensive way to securely host a web browser.</p><p>Browser Isolation with private network connectivity enables businesses to maintain the security benefits of VDI, without the costs of hosting and operating legacy virtual desktops.</p>
    <div>
      <h3>Transparent end-user experience</h3>
      <a href="#transparent-end-user-experience">
        
      </a>
    </div>
    <p>But it doesn’t just have a better ROI. Browser Isolation also offers a better experience for your end-users, too. Serving web applications via virtual desktops is a clunky experience. Users first need to connect to their virtual desktop (either through a desktop application or web portal), open an embedded web browser. This model requires users to context-switch between local and remote web applications which adds friction, impacting user productivity.</p><p>With Browser Isolation users simply navigate to the isolated private application in their preferred web browser and use the service as if they were directly browsing the remote web browser.</p>
    <div>
      <h2>How it works</h2>
      <a href="#how-it-works">
        
      </a>
    </div>
    <p>Browser Isolation with private network connectivity works by unifying our <a href="https://www.cloudflare.com/learning/access-management/what-is-sase/">Zero Trust</a> products: Cloudflare Access and Cloudflare Tunnels.</p><p>Cloudflare Access authorizes your users via your <a href="https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/">preferred Identity Provider</a> and connects them to a remote browser without installing any software on their device. Cloudflare Tunnels securely connects your private network to remote browsers hosted on Cloudflare’s network without opening any inbound ports on your firewall.</p>
    <div>
      <h3>Monitor third-party users on private networks</h3>
      <a href="#monitor-third-party-users-on-private-networks">
        
      </a>
    </div>
    <p>Ever needed to give a <a href="https://www.cloudflare.com/products/zero-trust/third-party-access/">contractor or vendor access</a> to your network to remotely manage a web UI? Simply add the user to your Clientless Web Isolation policy, and they can connect to your internal service without installing any client software on their device. All requests to private IPs are filtered, inspected, and logged through Cloudflare Gateway.</p>
    <div>
      <h3>Apply data protection controls</h3>
      <a href="#apply-data-protection-controls">
        
      </a>
    </div>
    <p>All traffic from remote browsers into your network is inspected and filtered. Data protection controls such as disabling clipboard, printing and file upload/downloads can be granularly applied to high-risk user groups and sensitive applications.</p>
    <div>
      <h2>Get started</h2>
      <a href="#get-started">
        
      </a>
    </div>
    
    <div>
      <h3>Connect your network to Cloudflare Zero Trust</h3>
      <a href="#connect-your-network-to-cloudflare-zero-trust">
        
      </a>
    </div>
    <p>It’s <a href="/ridiculously-easy-to-use-tunnels/">ridiculously easy to connect any network</a> with outbound Internet access.</p><p>Engineers needing a web environment to debug and test services inside a private network just need to run a single command to connect their network to Browser Isolation using Cloudflare Tunnels.</p>
    <div>
      <h3>Enable Clientless Web Isolation</h3>
      <a href="#enable-clientless-web-isolation">
        
      </a>
    </div>
    <p>Clientless Web Isolation allows users to connect to a remote browser without installing any software on the endpoint device. That means company-wide deployment is seamless and transparent to end users. Follow <a href="https://developers.cloudflare.com/cloudflare-one/policies/browser-isolation/clientless-browser-isolation/">these steps</a> to enable Clientless Web Isolation and define what users are allowed to connect to a remote browser.</p>
    <div>
      <h3>Browse private IP resources</h3>
      <a href="#browse-private-ip-resources">
        
      </a>
    </div>
    <p>Now that you have your network connected to Cloudflare, and your users connected to remote browsers it’s easy for a user to connect to any RFC 1918 address in a remote browser. Simply navigate to your isolation endpoint, and you’ll be connected to your private network.</p><p>For example, if you want a user to manage a router hosted at <code>http://192.0.2.1</code>, prefix this URL with your isolation endpoint such as</p><p><code>https://&lt;authdomain&gt;.cloudflareaccess.com/browser/http://192.0.2.1</code></p><p>That’s it! Users are automatically served a remote browser in a nearby Cloudflare data center.</p><div></div>
<small>Remote browser connected to a private web service with data loss prevention policies enabled</small>

    <div>
      <h3>Define policies</h3>
      <a href="#define-policies">
        
      </a>
    </div>
    <p>At this point, your users can connect to any private resource inside your network. You may want to further control what endpoints your users can reach. To do this, navigate to Gateway → Policies → HTTP and allow / block or apply data protection controls for any private resource based on identity or destination IP address. See our <a href="https://developers.cloudflare.com/cloudflare-one/policies/filtering/http-policies/">developer documentation</a> for more information.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/KyAXA4PIstf7lIuWtNxxE/3aba916caaf5159f3f8cbd7ed7f9c105/hVXFsRY7krJgCNMz5cc121Z1WQyGp-ywBSjvaS5xbAij8f3RepQxicMViym0BUJ2XMJcF6Feb_vgzZazp-Bw60f3uxzVsU37wahuc3Ory6rvtVPlm8VVF3MU_8ll.png" />
            
            </figure><p>Additionally, isolation policies can be defined to control <i>how</i> users can interact with the remote browser to disable the clipboard, printing or file upload / downloads. See our <a href="https://developers.cloudflare.com/cloudflare-one/policies/browser-isolation/#isolate-policies">developer documentation</a> for more information.</p>
    <div>
      <h3>Logging and visibility</h3>
      <a href="#logging-and-visibility">
        
      </a>
    </div>
    <p>Finally, all remote browser traffic is logged by the <a href="https://www.cloudflare.com/learning/access-management/what-is-a-secure-web-gateway/">Secure Web Gateway</a>. Navigate to Logs → Gateway → HTTP and filter by identity or destination IP address.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4v6DQw6XLbPuYBGTGcrYYN/f91b588881a8a9177eb0102fb3becefb/image1-46.png" />
            
            </figure>
    <div>
      <h2>What’s next?</h2>
      <a href="#whats-next">
        
      </a>
    </div>
    <p>We’re excited to learn how people use Browser Isolation to enable remote access to private networks and protect sensitive apps. Like always, we’re just getting started so stay tuned for improvements on configuring remote browsers and deeper connectivity with Access applications. Click <a href="https://www.cloudflare.com/products/zero-trust/browser-isolation/">here to get started</a> with Browser Isolation.</p> ]]></content:encoded>
            <category><![CDATA[Cloudflare One Week]]></category>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[Private Network]]></category>
            <category><![CDATA[VPN]]></category>
            <category><![CDATA[VDI]]></category>
            <category><![CDATA[Remote Browser Isolation]]></category>
            <category><![CDATA[SASE]]></category>
            <guid isPermaLink="false">2aw4CGc70Xd1iZqEKdPLEv</guid>
            <dc:creator>Tim Obezuk</dc:creator>
        </item>
        <item>
            <title><![CDATA[Introducing browser isolation for email links to stop modern phishing threats]]></title>
            <link>https://blog.cloudflare.com/email-link-isolation/</link>
            <pubDate>Mon, 20 Jun 2022 14:02:00 GMT</pubDate>
            <description><![CDATA[ As part of our exciting journey to integrate Area 1 into our broader Zero Trust suite, Cloudflare Gateway customers can soon enable Remote Browser Isolation for email links. With Email Link Isolation, gain an unmatched level of protection from sophisticated multi-channel email-based attacks ]]></description>
            <content:encoded><![CDATA[ 
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6YQ1f5ulfZD0daYx2dAfDk/2e897fb4a2f8b01f781b2fe0e37a31c8/image6-8.png" />
            
            </figure><p>There is an implicit and unearned trust we place in our email communications. This realization — that an organization can't truly have a Zero Trust security posture without including email — was the driving force behind <a href="/why-we-are-acquiring-area-1/">Cloudflare’s acquisition of Area 1 Security</a> earlier this year.  Today, we have taken our first step in this exciting journey of integrating Cloudflare Area 1 email security into our broader Cloudflare One platform. Cloudflare Secure Web Gateway customers can soon enable <a href="https://www.cloudflare.com/learning/access-management/what-is-browser-isolation/">Remote Browser Isolation (RBI)</a> for email links, giving them an unmatched level of protection from modern multi-channel email-based attacks.</p><p>Research from Cloudflare Area 1 found that nearly 10% of all observed malicious attacks involved credential harvesters, highlighting that victim identity is what threat actors usually seek. While commodity phishing attacks are blocked by existing security controls, modern attacks and payloads don’t have a set pattern that can reliably be matched with a block or quarantine rule. Additionally, with the growth of multi-channel phishing attacks, an effective <a href="https://www.cloudflare.com/zero-trust/products/email-security/">email security solution</a> needs the ability to detect blended campaigns spanning email and Web delivery, as well as deferred campaigns that are benign at delivery time, but weaponized at click time.</p><p>When enough “fuzzy” signals exist, isolating the destination to ensure end users are secure is the most effective solution. Now, with the integration of <a href="https://www.cloudflare.com/products/zero-trust/browser-isolation/">Cloudflare Browser Isolation</a> into Cloudflare Area 1 email security, these attacks can now be easily detected and neutralized.</p>
    <div>
      <h3>Human error is human</h3>
      <a href="#human-error-is-human">
        
      </a>
    </div>
    <p>Why do humans <a href="https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7005690/">still click</a> on malicious links? It’s not because they haven’t attended enough training sessions or are not conscious about security. It’s because they have 50 unread emails in their inbox, have another Zoom meeting to get to, or are balancing a four-year old on their shoulders. They are trying their best. Anyone, <a href="https://blog.google/threat-analysis-group/new-campaign-targeting-security-researchers/">including security researchers</a>, can fall for socially engineered attacks if the adversary is well-prepared.</p><p>If we accept that human error is here to stay, developing security workflows introduces new questions and goals:</p><ul><li><p>How can we reduce, rather than eliminate, the likelihood of human error?</p></li><li><p>How can we reduce the impact of human error when, not if, it happens?</p></li><li><p>How can security be embedded into an employee’s existing daily workflows?</p></li></ul><p>It’s these questions that we had in mind when we reached the conclusion that email needs to be a fundamental part of any <a href="https://www.cloudflare.com/zero-trust/solutions/">Zero Trust platform</a>. Humans make mistakes in email just as regularly — in fact, sometimes more so — as they make mistakes surfing the Web.</p>
    <div>
      <h3>To block, or not to block?</h3>
      <a href="#to-block-or-not-to-block">
        
      </a>
    </div>
    <p>For IT teams, that is the question they wrestle with daily to balance risk mitigation with user productivity. The <a href="https://www.cloudflare.com/learning/security/glossary/what-is-a-security-operations-center-soc/">SOC</a> team wants IT to block everything risky or unknown, whereas the business unit wants IT to allow everything not explicitly bad. If IT decides to block risky or unknown links, and it results in a false positive, they waste time manually adding URLs to allow lists — and perhaps the attacker later pivots those URLs to malicious content anyway. If IT decides to allow risky or unknown sites, best case they waste time reimaging infected devices and resetting login credentials — but all too common, they triage the damage from a data breach or <a href="/targeted-ransomware-attack/">ransomware</a> lockdown. The operational simplicity of enabling RBI with email — also known as email link isolation — saves the IT, SOC, and business unit teams significant time.</p>
    <div>
      <h3>How it works</h3>
      <a href="#how-it-works">
        
      </a>
    </div>
    <p>For a Cloudflare Area 1 customer, the initial steps involve enabling RBI within your portal:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6DB66MqCc1WgkzVLqbgB0q/27ac7d5a7619a8992949742e89ac50bb/image5-8.png" />
            
            </figure><p>With email link isolation in place, here’s the short-lived life of an email with suspicious links:</p><p><b>Step 1:</b> Cloudflare Area 1 inspects the email and determines that certain links in the messages are suspicious or on the margin</p><p><b>Step 2:</b> Suspicious URLs and hyperlinks in the email get rewritten to a custom Cloudflare Area 1 prefix URL.</p><p><b>Step 3:</b> The email is delivered to the intended inboxes.</p><p><b>Step 4:</b> If a user clicks the link in the email, Cloudflare redirects to a remote browser via <code>&lt;authdomain&gt;.cloudflareaccess.com/browser/{{url}}</code>.</p><p><b>Step 5:</b> Remote browser loads a website on a server on the Cloudflare Global Network and serves draw commands to the user's clientless browser endpoint**.**</p><p>By executing the browser code and controlling user interactions on a remote server rather than a user device, any and all malware and phishing attempts are isolated, and won't infect devices and compromise user identities. This improves both user and endpoint security when there are unknown risks and unmanaged devices, and allows users to access websites without having to connect to a VPN or having strict firewall policies.</p><p>Cloudflare’s RBI technology uses a unique patented technology called <a href="/cloudflare-and-remote-browser-isolation/">Network Vector Rendering (NVR)</a> that utilizes headless Chromium-based browsers in the cloud, transparently intercepts draw layer output, transmits the draw commands efficiency and securely over the web, and redraws them in the windows of local HTML5 browsers. Unlike legacy Browser Isolation technologies that relied on pixel pushing or DOM reconstruction, NVR is optimized for scalability, security and end user transparency, while ensuring the broadest compatibility with websites.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5QDHEc1rlX53Z5kc2k0tob/dab1e12b7103cfca3623ac75965dc599/image1-11.png" />
            
            </figure>
    <div>
      <h3>A phishing attack before email link isolation</h3>
      <a href="#a-phishing-attack-before-email-link-isolation">
        
      </a>
    </div>
    <p>Let’s look at a specific example of a deferred phishing attack, how it slips past traditional defenses, and how email link isolation addresses the threat.</p><p>As organizations look to adopt new security principles and network architectures like <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust</a>, adversaries continually come up with techniques to bypass these controls by exploiting the most used and most vulnerable application – email. Email is a good candidate for compromise because of its ubiquity and ability to be bypassed pretty easily by a motivated attacker.</p><p>Let’s take an example of a “deferred phishing attack”, without email link isolation.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2c21s9A2FUgNs7mjZOInav/b99ae23100048308c28b534bc49a4dfb/image4-9.png" />
            
            </figure><p><b>Attacker preparation: weeks before launch</b>The attacker sets up infrastructure for the phishing attempt to come. This may include:</p><ul><li><p>Registering a domain</p></li><li><p>Encrypting it with SSL</p></li><li><p>Setting up proper email authentication (<a href="https://www.cloudflare.com/learning/dns/dns-records/dns-spf-record/">SPF</a>, <a href="https://www.cloudflare.com/learning/dns/dns-records/dns-dkim-record/">DKIM</a>, <a href="https://www.cloudflare.com/learning/dns/dns-records/dns-dmarc-record/">DMARC)</a></p></li><li><p>Creating a benign web page</p></li></ul><p>At this point, there is no evidence of an attack that can be picked up by secure email gateways, authentication-based solutions, or threat intelligence that relies solely on reputation-based signals and other deterministic detection techniques.</p><p><b>Attack “launch”: Sunday afternoon</b>The attacker sends an authentic-looking email from the newly-created domain. This email includes a link to the (still benign) webpage. There’s nothing in the email to block or flag it as suspicious. The email gets delivered to intended inboxes.</p><p><b>Attack launch: Sunday evening</b>Once the attacker is sure that all emails have reached their destination, they pivot the link to a malicious destination by changing the attacker-controlled webpage, perhaps by creating a fake login page to harvest credentials.</p><p><b>Attack landing: Monday morning</b>As employees scan their inboxes to begin their week, they see the email. Maybe not all of them click the link, but some of them do. Maybe not all of those that clicked enter their credentials, but a handful do. Without email link isolation, the attack is successful.</p><p>The consequences of the attack have also just begun – once user login credentials are obtained, attackers can <a href="https://www.crn.com/news/security/solarwinds-ceo-confirms-office-365-email-compromise-played-role-in-broad-based-attack">compromise legitimate accounts</a>, distribute malware to your organization’s network, steal confidential information, and cause much more downstream damage.</p>
    <div>
      <h3>A phishing attack after email link isolation</h3>
      <a href="#a-phishing-attack-after-email-link-isolation">
        
      </a>
    </div>
    <p>The integration between Cloudflare Area 1 and Cloudflare Browser Isolation provides a critical layer of post-delivery protection that can foil attacks like the deferred phishing example described above.</p><p>If the attacker prepares for and executes the attack as stated in the previous section, our email link isolation would analyze the email link at the time of click and perform a high-level assessment on whether the user should be able to navigate to it.</p><p><b>Safe link</b> - Users will be redirected to this site transparently</p><p><b>Malicious link</b> - Users are blocked from navigating</p><p><b>Suspicious link</b> - Users are heavily discouraged to navigating and are presented with a splash warning page encouraging them to view in the link in an isolated browser</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6WinnctxUCvAnCPJsM45BE/45d9fda72b702eb51d0f39683b4b3408/image3-14.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6CAGmRXrUrW6Le2iX3yLjH/3a4889d9b6c627a9f4bd94a1a4c78361/image2-15.png" />
            
            </figure><p>While a splash warning page was the mitigation employed in the above example, email link isolation will also offer security administrators other customizable mitigation options as well, including putting the webpage in read-only mode, restricting the download and upload of files, and disabling keyboard input altogether within their Cloudflare Gateway consoles.</p><p>Email link isolation also fits into users’ existing workflows without impacting productivity or sapping their time with IT tickets. Because Cloudflare Browser Isolation is built and deployed on the Cloudflare network, with global locations in 270 cities, web browsing sessions are served as close to users as possible, minimizing latency. Additionally, Cloudflare Browser Isolation sends the final output of each webpage to a user instead of page scrubbing or sending a pixel stream, further reducing latency and not breaking browser-based applications such as SaaS.</p>
    <div>
      <h3>How do I get started?</h3>
      <a href="#how-do-i-get-started">
        
      </a>
    </div>
    <p>Existing Cloudflare Area 1 and Cloudflare Gateway customers are eligible for the beta release of email link isolation. To learn more and to express interest, <a href="http://www.cloudflare.com/zero-trust/lp/email-link-isolation">sign up for our upcoming beta</a>.</p><p>If you’d like to see what threats Cloudflare Area 1 detects on your live email traffic, request a free phishing risk assessment <a href="https://www.cloudflare.com/lp/emailsecurity/">here</a>. It takes five minutes to get started and does not impact mail flow.</p> ]]></content:encoded>
            <category><![CDATA[Cloudflare One Week]]></category>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[Phishing]]></category>
            <category><![CDATA[Cloud Email Security]]></category>
            <category><![CDATA[Remote Browser Isolation]]></category>
            <category><![CDATA[Email Security]]></category>
            <category><![CDATA[Cloudflare Zero Trust]]></category>
            <guid isPermaLink="false">22Vv0Qr11T3jQcQy2q08TS</guid>
            <dc:creator>Shalabh Mohan</dc:creator>
            <dc:creator>Tarika Srinivasan</dc:creator>
        </item>
        <item>
            <title><![CDATA[CVE-2022-1096: How Cloudflare Zero Trust provides protection from zero day browser vulnerabilities]]></title>
            <link>https://blog.cloudflare.com/cve-2022-1096-zero-trust-protection-from-zero-day-browser-vulnerabilities/</link>
            <pubDate>Tue, 29 Mar 2022 15:51:37 GMT</pubDate>
            <description><![CDATA[ CVE-2022-1096 is yet another zero day vulnerability affecting web browsers. Cloudflare zero trust mitigates the risk of zero day attacks in the browser and has been patched ]]></description>
            <content:encoded><![CDATA[ <p></p><p>On Friday, March 25, 2022, Google published an <a href="https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop_25.html">emergency security update</a> for all Chromium-based web browsers to patch a high severity vulnerability (CVE-2022-1096). At the time of writing, the specifics of the vulnerability are restricted until the majority of users have patched their local browsers.</p><p>It is important everyone takes a moment to update their local web browser. It’s one quick and easy action everyone can contribute to the <a href="https://www.cloudflare.com/learning/security/what-is-cyber-security/">cybersecurity</a> posture of their team.</p><p>Even if everyone updated their browser straight away, this remains a reactive measure to a threat that existed before the update was available. Let’s explore how Cloudflare takes a proactive approach by mitigating the impact of zero day browser threats with our <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">zero trust</a> and <a href="https://www.cloudflare.com/learning/access-management/what-is-browser-isolation/">remote browser isolation</a> services. Cloudflare’s remote browser isolation service is built from the ground up to protect against zero day threats, and all remote browsers on our global network have already been patched.</p>
    <div>
      <h3>How Cloudflare Zero Trust protects against browser zero day threats</h3>
      <a href="#how-cloudflare-zero-trust-protects-against-browser-zero-day-threats">
        
      </a>
    </div>
    <p>Cloudflare Zero Trust applies a layered defense strategy to protect users from zero day threats while browsing the Internet:</p><ol><li><p>Cloudflare’s roaming client steers Internet traffic over an encrypted tunnel to a nearby Cloudflare data center for inspection and filtration.</p></li><li><p>Cloudflare’s <a href="https://www.cloudflare.com/learning/access-management/what-is-a-secure-web-gateway/">secure web gateway</a> inspects and filters traffic based on our network intelligence, antivirus scanning and threat feeds. Requests to known malicious services are blocked and high risk or unknown traffic is automatically served by a remote browser.</p></li><li><p>Cloudflare’s browser isolation service executes all website code in a remote browser to protect unpatched devices from threats inside the unknown website.</p></li></ol>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4Azer5s8j5dpIU1WFGdxY4/d4e56aa9f99e2d0e2d55bdcd7f14d6ed/image1-109.png" />
            
            </figure>
    <div>
      <h3>Protection from the unknown</h3>
      <a href="#protection-from-the-unknown">
        
      </a>
    </div>
    <p>Zero day threats are often exploited and exist undetected in the real world and actively target users through <a href="https://www.cloudflare.com/learning/email-security/what-is-email-fraud/">risky links in emails</a> or other external communication points such as customer support tickets. This risk cannot be eliminated, but it can be reduced by using remote browser isolation to minimize the attack surface. Cloudflare’s browser isolation service is built from the ground up to protect against zero day threats:</p><ul><li><p>Prevent compromised web pages from affecting the endpoint device by executing all web code in a remote browser that is physically isolated from the endpoint device. The endpoint device only receives a thin HTML5 remoting shell from our network and <a href="/cloudflare-and-remote-browser-isolation/">vector draw commands</a> from the remote browser.</p></li><li><p>Mitigate the impact of compromise by automatically destroying and reconstructing remote browsers back to a known clean state at the end of their browser session.</p></li><li><p>Protect adjacent remote browsers by encrypting all remote browser egress traffic, segmenting remote browsers with virtualization technologies and distributing browsers across physical hardware in our global network.</p></li><li><p>Aiding Security Incident Response (SIRT) teams by logging all remote egress traffic in the integrated secure web gateway logs.</p></li></ul>
    <div>
      <h3>Patching remote browsers around the world</h3>
      <a href="#patching-remote-browsers-around-the-world">
        
      </a>
    </div>
    <p>Even with all these security controls in place, patching browsers remains critical to eliminate the risk of compromise. The process of patching local and remote browsers tells two different stories that can be the difference between compromise, and avoiding a zero day vulnerability.</p><p>Patching your workforces local browsers requires politely asking users to interrupt their work to update their browser, or apply mobile device management techniques to disrupt their work by forcing an update. Neither of these options create happy users, or deliver rapid mitigation.</p><p>Patching remote browsers is a fundamentally different process. Since the remote browser itself is running on our network, Users and Administrators do not need to intervene as security patches are automatically deployed to remote browsers on Cloudflare’s network. Then without a user restarting their local browser, any traffic to an isolated website is automatically served from a patched remote browser.</p><p>Finally, browser based vulnerabilities such as CVE-2022-1096 are not uncommon. With over 300 in 2021 and over 40 already in 2022 (according to <a href="https://www.cvedetails.com/product/15031/Google-Chrome.html?vendor_id=1224">cvedetails.com</a>) it is critical for administrators to have a plan to rapidly mitigate and patch browsers in their organization.</p>
    <div>
      <h3>Get started with Cloudflare Browser Isolation</h3>
      <a href="#get-started-with-cloudflare-browser-isolation">
        
      </a>
    </div>
    <p>Cloudflare Browser Isolation is available to both self serve and enterprise customers. Whether you’re a small startup or a massive enterprise, our network is ready to serve fast and secure remote browsing for your team, no matter where they are based.</p><p>To get started, <a href="https://www.cloudflare.com/products/zero-trust/browser-isolation/">visit our website</a> and, if you’re interested in evaluating Browser Isolation, ask our team for a <a href="https://www.cloudflare.com/products/zero-trust/interactive-demo/">demo</a> with our <a href="/clientless-web-isolation-general-availability/">Clientless Web Isolation</a>.</p> ]]></content:encoded>
            <category><![CDATA[Remote Browser Isolation]]></category>
            <category><![CDATA[Zero Day Threats]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[CVE]]></category>
            <category><![CDATA[Vulnerabilities]]></category>
            <category><![CDATA[Cloudflare Zero Trust]]></category>
            <category><![CDATA[SASE]]></category>
            <guid isPermaLink="false">PvGPusZFJAtjsz3BzTyM3</guid>
            <dc:creator>Tim Obezuk</dc:creator>
        </item>
        <item>
            <title><![CDATA[Clientless Web Isolation is now generally available]]></title>
            <link>https://blog.cloudflare.com/clientless-web-isolation-general-availability/</link>
            <pubDate>Thu, 17 Mar 2022 12:59:16 GMT</pubDate>
            <description><![CDATA[ Today, we’re excited to announce that Clientless Web Isolation is generally available ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Today, we’re excited to announce that Clientless Web Isolation is generally available. A new on-ramp for Browser Isolation that natively integrates <a href="https://www.cloudflare.com/learning/access-management/what-is-ztna/">Zero Trust Network Access (ZTNA)</a> with the zero-day, phishing and data-loss protection benefits of <a href="https://www.cloudflare.com/learning/access-management/what-is-browser-isolation/">remote browsing</a> for users on any device browsing any website, internal app or SaaS application. All without needing to install any software or configure any certificates on the endpoint device.</p><p>Cloudflare’s clientless web isolation simplifies connections to remote browsers through a hyperlink (e.g.: <code><i>https://&lt;your-auth-domain&gt;.cloudflareaccess.com/browser</i></code>). We explored use cases in detail in our <a href="/introducing-clientless-web-isolation-beta/">beta announcement post</a>, but here’s a quick refresher on the use cases that clientless isolated browsing enables:</p>
    <div>
      <h3>Share secure browsing across the entire team on any device</h3>
      <a href="#share-secure-browsing-across-the-entire-team-on-any-device">
        
      </a>
    </div>
    <p>Simply navigating to Clientless Web Isolation will land your user such as an analyst, or researcher in a remote browser, ready to securely conduct their research or investigation without exposing their public IP or device to potentially malicious code on the target website.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1sJbqtKReRhveJAvlYVOm4/675f9e44c799baf28d69c2325758e50c/image1-66.png" />
            
            </figure>
    <div>
      <h3>Deep link into isolated browsing</h3>
      <a href="#deep-link-into-isolated-browsing">
        
      </a>
    </div>
    <p>Suspicious hyperlinks and PDF documents from sensitive applications can be opened in a remote browser by rewriting the link with the clientless endpoint. For example:</p><p><code>https://&lt;authdomain&gt;.cloudflareaccess.com/browser/https://www.example.com/suspiciouslink</code></p><p>This is powerful when integrated into a security incident monitoring tool, help desk or any tool where users are clicking unknown or untrusted hyperlinks.</p>
    <div>
      <h3>Integrate Browser Isolation with a third-party secure web gateway</h3>
      <a href="#integrate-browser-isolation-with-a-third-party-secure-web-gateway">
        
      </a>
    </div>
    <p>Browser Isolation can be integrated with a legacy <a href="https://www.cloudflare.com/learning/access-management/what-is-a-secure-web-gateway/">secure web gateway</a> through the use of a redirecting custom block page. Integrating Browser Isolation with your existing secure web gateway enables safe browsing without the support burden of micromanaging block lists.</p><p>See our <a href="https://developers.cloudflare.com/cloudflare-one/policies/browser-isolation/clientless-browser-isolation">developer documentation</a> for example block pages.</p>
    <div>
      <h3>Securely access sensitive data on BYOD devices endpoints</h3>
      <a href="#securely-access-sensitive-data-on-byod-devices-endpoints">
        
      </a>
    </div>
    <p>In an ideal world, users would always access sensitive data from corporate devices. Unfortunately it’s not possible or feasible: contractors, by definition, rely on non-corporate devices. Employees may not be able to take their device home, it is unavailable due to a disaster or travel to high risk areas without their managed machine.</p><p>Historically IT departments have worked around this by adopting legacy Virtual Desktop Infrastructure (VDI). This made sense a decade ago when most business applications were desktop applications. Today this architecture makes little sense when most business applications live in the browser. VDI is a tremendously expensive method to deliver BYOD support and still requires complex network administration to connect with DNS filtering and Secure Web Gateways.</p><p>All traffic from Browser Isolation to the Internet or an Access protected application is secured and inspected by the Secure Web Gateway out of the box. It only takes a few clicks to <a href="https://developers.cloudflare.com/cloudflare-one/tutorials/require-swg/">require Gateway</a> device posture checks for users connecting over Clientless Web Isolation.</p>
    <div>
      <h3>Get started</h3>
      <a href="#get-started">
        
      </a>
    </div>
    <p>Clientless web isolation is available as a capability for all Cloudflare Zero Trust subscribers who have added Browser Isolation to their plan. If you are interested in learning more about use cases see the <a href="/introducing-clientless-web-isolation-beta/">beta announcement post</a> and our <a href="https://developers.cloudflare.com/cloudflare-one/policies/browser-isolation/clientless-browser-isolation/">developer documentation</a>.</p> ]]></content:encoded>
            <category><![CDATA[Security Week]]></category>
            <category><![CDATA[Remote Browser Isolation]]></category>
            <category><![CDATA[Clientless Web Isolation]]></category>
            <category><![CDATA[CASB]]></category>
            <category><![CDATA[Cloudflare Access]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Cloudflare Zero Trust]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[SASE]]></category>
            <guid isPermaLink="false">267VYT5VXwJYqwLC47qgJe</guid>
            <dc:creator>Tim Obezuk</dc:creator>
        </item>
        <item>
            <title><![CDATA[Introducing Clientless Web Isolation]]></title>
            <link>https://blog.cloudflare.com/introducing-clientless-web-isolation-beta/</link>
            <pubDate>Wed, 08 Dec 2021 13:59:18 GMT</pubDate>
            <description><![CDATA[ Safely browse risky and sensitive websites on any device without installing any software ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Today, we're excited to announce the beta for Cloudflare’s clientless web isolation. A new on-ramp for Browser Isolation that natively integrates <a href="https://www.cloudflare.com/learning/access-management/what-is-ztna/">Zero Trust Network Access (ZTNA)</a> with the zero-day, phishing and data-loss protection benefits of remote browsing for users on any device browsing any website, internal app or SaaS application. All without needing to install any software or configure any certificates on the endpoint device.</p>
    <div>
      <h3>Secure access for managed and unmanaged devices</h3>
      <a href="#secure-access-for-managed-and-unmanaged-devices">
        
      </a>
    </div>
    <p>In early 2021, Cloudflare announced the general availability of Browser Isolation, a fast and secure remote browser that natively integrates with Cloudflare’s Zero Trust platform. This platform — also known as <a href="https://www.cloudflare.com/teams/">Cloudflare for Teams</a> — combines secure Internet access with our Secure Web Gateway solution (<a href="https://www.cloudflare.com/teams/gateway/">Gateway</a>) and secure application access with a ZTNA solution (<a href="https://www.cloudflare.com/teams/access/">Access</a>).</p><p>Typically, admins deploy Browser Isolation by rolling out Cloudflare’s device client on endpoints, so that Cloudflare can serve as a secure DNS and HTTPS Internet proxy. This model protects users and sensitive applications when the administrator manages their team's devices. And for end users, the experience feels frictionless like a local browser: they are hardly aware that they are actually browsing on a secure machine running in a Cloudflare data center near them.</p><p>The end-to-end integration of Browser Isolation with secure Internet access makes it easy for administrators to deploy Browser Isolation across their teams without users being aware they're actually browsing on a secure machine in a nearby Cloudflare data center. However, managing endpoint clients can add configuration overhead for users on unmanaged devices, or contractors on devices managed by third-party organizations.</p><p>Cloudflare’s clientless web isolation streamlines connections to remote browsers through a hyperlink (e.g.: <code><i>https://&lt;your-auth-domain&gt;.cloudflareaccess.com/browser</i></code>). Once users are authenticated through any of Cloudflare Access's supported <a href="https://developers.cloudflare.com/cloudflare-one/identity">identity providers</a>, the user's browser uses HTML5 to establish a low-latency connection to a remote browser hosted in a nearby Cloudflare data center without installing any software. There are no servers to manage and scale, or regions to configure.</p>
    <div>
      <h3>Safely browse high risk links</h3>
      <a href="#safely-browse-high-risk-links">
        
      </a>
    </div>
    <p>The simple act of clicking a link in an email, or website causes your browser to download and execute payloads of active web content which can exploit unknown zero-day threats and compromise an endpoint.</p><p>Cloudflare’s <a href="https://www.cloudflare.com/learning/access-management/what-is-browser-isolation/">clientless web isolation</a> can be initiated through a prefixed URL (e.g., <code><i>https://&lt;your-auth-domain&gt;.cloudflareaccess.com/browser/https://www.example.com</i></code>). Simply configuring your custom block page, email gateway, or ticketing tool to prefix high-risk links with Browser Isolation will automatically send high risk clicks to a remote browser, protecting the endpoint from any malicious code that may be present on the target link.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6EB4k1iu2GaTd1KG67rBS8/48620be5cda9df5cdaa4726391825b84/image2-21.png" />
            
            </figure><p>Here at Cloudflare, we use Cloudflare's products to protect Cloudflare, and in fact, use this clientless web isolation approach for our own security investigation activities. By prefixing high risk links with our auth domain, our security team is able to safely investigate potentially malicious websites and phishing sites.</p><p>No risky code ever reaches an employee device, and at the end of their investigation, the remote browser is terminated and reset to a known clean state for their next investigation.</p>
    <div>
      <h3>Integrated Zero Trust access and remote browsing</h3>
      <a href="#integrated-zero-trust-access-and-remote-browsing">
        
      </a>
    </div>
    <p>The time when corporate data was only accessed from managed devices, inside controlled networks has long since passed. Enterprises relying on strict device posture controls to verify that application access only occurs from managed devices have had few tools to support contractor or BYOD workforces. Historically, administrators have worked around the issue by deploying costly, resource intensive Virtual Desktop Infrastructure (VDI) environments.</p><p>Moreover, when it comes to securing application access, Cloudflare Access excels in applying least-privilege, default-deny policies to web-based applications, without needing to install any client software on user devices.</p><p>Cloudflare’s clientless web isolation augments ZTNA use cases, allowing applications protected by <a href="https://developers.cloudflare.com/cloudflare-one/tutorials/require-swg#build-a-gateway-rule-in-access">Access and Gateway</a> to leverage Browser Isolation's <a href="https://docs.google.com/document/d/1YzcoC5WVxCYtVSriZW0ETeTzX9HEVxjKXdAEGeND3l8/edit#">data protection controls</a> such as local printing control, clipboard and file upload / download restrictions to prevent sensitive data from transferring onto unmanaged devices.</p><p>Isolated links can easily be added to the Access <a href="https://developers.cloudflare.com/cloudflare-one/applications/app-launcher">app launcher</a> as <a href="https://developers.cloudflare.com/cloudflare-one/applications/bookmarks">bookmarks</a> allowing your team and contractors to easily access any site with one click.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/375gS2PdEA2EOdu6iWgmub/45da00d54c415f12f3c63a7dbf9896f6/image3-13.png" />
            
            </figure><p>Finally, just because a remote browser reduces the impact of a compromise, doesn’t mean it should have unmanaged access to the Internet. All traffic from the remote browser to the target website is secured, inspected and logged by Cloudflare’s <a href="https://www.cloudflare.com/learning/access-management/what-is-a-secure-web-gateway/">SWG</a> solution (Gateway) ensuring that known threats are filtered through HTTP policies and <a href="https://developers.cloudflare.com/cloudflare-one/policies/filtering/http-policies/antivirus-scanning">anti-virus scanning</a>.</p>
    <div>
      <h3>Join the clientless web isolation beta</h3>
      <a href="#join-the-clientless-web-isolation-beta">
        
      </a>
    </div>
    <p>Clientless web isolation will be available as a capability to Cloudflare for Teams subscribers who have added Browser Isolation to their plan. We’ll be opening Cloudflare’s clientless web isolation for beta access soon. If you’re interested in participating, <a href="https://www.cloudflare.com/zero-trust/lp/clientless-web-isolation-beta/">sign up here</a> to be the first to hear from us.</p><p>We're excited about the secure browsing and application access use cases for our clientless web isolation model. Now, teams of any size, can deliver seamless <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust</a> connectivity to unmanaged devices anywhere in the world.</p> ]]></content:encoded>
            <category><![CDATA[CIO Week]]></category>
            <category><![CDATA[Remote Browser Isolation]]></category>
            <category><![CDATA[Clientless Web Isolation]]></category>
            <category><![CDATA[Cloudflare Access]]></category>
            <category><![CDATA[SASE]]></category>
            <guid isPermaLink="false">0RUyEnhZq4bBGF7HfSkyr</guid>
            <dc:creator>Tim Obezuk</dc:creator>
        </item>
        <item>
            <title><![CDATA[Control input on suspicious sites with Cloudflare Browser Isolation]]></title>
            <link>https://blog.cloudflare.com/phishing-protection-browser/</link>
            <pubDate>Tue, 07 Dec 2021 13:59:20 GMT</pubDate>
            <description><![CDATA[ Protect your team from phishing attacks by controlling user input on suspicious and sensitive websites with Cloudflare Browser Isolation. ]]></description>
            <content:encoded><![CDATA[ 
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6CcsR6mnWLmEnOGUpVHaCw/f59d366202efd422d2d450399c06be56/unnamed--1--3.png" />
            
            </figure><p>Your team can now use Cloudflare’s <a href="https://www.cloudflare.com/teams/browser-isolation/">Browser Isolation</a> service to protect against phishing attacks and credential theft inside the web browser. Users can browse more of the Internet without taking on the risk. Administrators can define <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust</a> policies to prohibit keyboard input and transmitting files during high risk browsing activity.</p><p>Earlier this year, Cloudflare Browser Isolation introduced <a href="/data-protection-browser/">data protection controls</a> that take advantage of the remote browser’s ability to manage all input and outputs between a user and any website. We’re excited to extend that functionality to apply more controls such as prohibiting keyboard input and file uploads to avert phishing attacks and credential theft on high risk and unknown websites.</p>
    <div>
      <h3>Challenges defending against unknown threats</h3>
      <a href="#challenges-defending-against-unknown-threats">
        
      </a>
    </div>
    <p>Administrators protecting their teams from threats on the open Internet typically implement a <a href="https://www.cloudflare.com/learning/access-management/what-is-a-secure-web-gateway/">Secure Web Gateway (SWG)</a> to filter Internet traffic based on threat intelligence feeds. This is effective at mitigating known threats. In reality, not all websites fit neatly into malicious or non-malicious categories.</p><p>For example, a parked domain with typo differences to an established web property could be legitimately registered for an unrelated product or become weaponized as a phishing attack. False-positives are tolerated by risk-averse administrators but come at the cost of employee productivity. Finding the balance between these needs is a fine art, and when applied too aggressively it leads to user frustration and the increased support burden of micromanaging exceptions for blocked traffic.</p><p>Legacy secure web gateways are blunt instruments that provide security teams limited options to protect their teams from threats on the Internet. Simply allowing or blocking websites is not enough, and modern security teams need more sophisticated tools to fully protect their teams without compromising on productivity.</p>
    <div>
      <h3>Intelligent filtering with Cloudflare Gateway</h3>
      <a href="#intelligent-filtering-with-cloudflare-gateway">
        
      </a>
    </div>
    <p><a href="https://www.cloudflare.com/teams/gateway/">Cloudflare Gateway</a> provides a secure web gateway to customers wherever their users work. Administrators can build rules that include blocking security risks, scanning for viruses, or restricting browsing based on SSO group identity among other options. User traffic leaves their device and arrives at a Cloudflare data center close to them, providing security and logging without slowing them down.</p><p>Unlike the blunt instruments of the past, Cloudflare Gateway applies security policies based on the unique magnitude of data Cloudflare’s network processes. For example, Cloudflare sees just over one trillion <a href="https://www.cloudflare.com/learning/dns/what-is-dns/">DNS queries</a> every day. We use that data to build a comprehensive model of what “good” DNS queries look like — and which DNS queries are anomalous and could represent DNS tunneling for data exfiltration, for example. We use our network to build more intelligent filtering and reduce false positives. You can review that research as well with <a href="https://radar.cloudflare.com/">Cloudflare Radar</a>.</p><p>However, we know some customers want to allow users to navigate to destinations in a sort of “neutral” zone. Domains that are newly registered, or newly seen by DNS resolvers, can be the home of a great new service for your team or a surprise attack to steal credentials. Cloudflare works to categorize these as soon as possible, but in those initial minutes users have to request exceptions if your team blocks these categories outright.</p>
    <div>
      <h3>Safely browsing the unknown</h3>
      <a href="#safely-browsing-the-unknown">
        
      </a>
    </div>
    <p>Cloudflare Browser Isolation shifts the risk of executing untrusted or malicious website code from the user’s endpoint to a <a href="https://www.cloudflare.com/learning/access-management/what-is-browser-isolation/">remote browser</a> hosted in a low-latency data center. Rather than aggressively blocking unknown websites, and potentially impacting employee productivity, Cloudflare Browser Isolation provides administrators control over <i>how</i> users can interact with risky websites.</p><p>Cloudflare’s network intelligence tracks higher risk Internet properties such as <a href="https://www.cloudflare.com/learning/dns/what-is-cybersquatting/">Typosquatting</a> and New Domains. Websites in these categories could be benign websites, or phishing attacks waiting to be weaponized. Risk-averse administrators can protect their teams without introducing false-positives by isolating these websites and serving the website in a read-only mode by disabling file uploads, downloads and keyboard input.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3ngYzQe2toHQLM9JhgH3Fv/6de4df86f7175575d4e8e816459858be/image1-25.png" />
            
            </figure><p>Users are able to safely browse the unknown website without risk of leaking credentials, transmitting files and falling victim to a phishing attack. Should the user have a legitimate reason to interact with an unknown website they are advised to contact their administrator to obtain elevated permissions while browsing the website.</p><p><a href="https://developers.cloudflare.com/cloudflare-one/policies/browser-isolation">See our developer documentation to learn more about remote browser policies.</a></p>
    <div>
      <h3>Getting started</h3>
      <a href="#getting-started">
        
      </a>
    </div>
    <p>Cloudflare Browser Isolation is integrated natively into Cloudflare’s Secure Web Gateway and Zero Trust Network Access services, and unlike legacy remote browser isolation solutions does not require IT teams to piece together multiple disparate solutions or force users to change their preferred web browser.</p><p>The Zero Trust threat and data protection that Browser Isolation provides make it a natural extension for any company trusting a secure web gateway to protect their business. We’re currently including it with our Cloudflare for Teams Enterprise Plan at no additional charge.<sup>1</sup> <a href="https://www.cloudflare.com/teams/browser-isolation/">Get started at our Zero Trust web page</a>.</p><hr /><p><sup>1. </sup>For the first 2,000 seats until 31 Dec 2021</p><p></p> ]]></content:encoded>
            <category><![CDATA[CIO Week]]></category>
            <category><![CDATA[Remote Browser Isolation]]></category>
            <category><![CDATA[Cloudflare Zero Trust]]></category>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[Security]]></category>
            <guid isPermaLink="false">4OfCcuRpi5gNh5GMCjAb2D</guid>
            <dc:creator>Tim Obezuk</dc:creator>
        </item>
        <item>
            <title><![CDATA[Data protection controls with Cloudflare Browser Isolation]]></title>
            <link>https://blog.cloudflare.com/data-protection-browser/</link>
            <pubDate>Fri, 20 Aug 2021 13:34:47 GMT</pubDate>
            <description><![CDATA[ Starting today, your team can use Cloudflare’s Browser Isolation service to protect sensitive data inside the web browser. Administrators can define Zero Trust policies to control who can copy, paste, and print data in any web based application. ]]></description>
            <content:encoded><![CDATA[ 
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3pfCjaLKWhg07vPGyAP50X/476b19e51dd2c0c017bc78a3edd3bfc1/image3-21.png" />
            
            </figure><p>Starting today, your team can use Cloudflare’s Browser Isolation service to protect sensitive data inside the web browser. Administrators can define <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust policies</a> to control who can copy, paste, and print data in any web based application.</p><p>In March 2021, for <a href="/welcome-to-security-week-2021/">Security Week</a>, we announced the <a href="/browser-isolation-for-teams-of-all-sizes/">general availability</a> of Cloudflare Browser Isolation as an add-on within the Cloudflare for Teams suite of Zero Trust application access and browsing services. <a href="https://www.cloudflare.com/learning/access-management/what-is-browser-isolation/">Browser Isolation</a> protects users from browser-borne malware and zero-day threats by shifting the risk of executing untrusted website code from their local browser to a secure browser hosted on our edge.</p><p>And currently, we’re democratizing browser isolation for any business by including it with our Teams Enterprise Plan at no additional charge.<sup>1</sup></p>
    <div>
      <h3>A different approach to zero trust browsing</h3>
      <a href="#a-different-approach-to-zero-trust-browsing">
        
      </a>
    </div>
    <p>Web browsers, the same tool that connects users to critical business applications, is one of the most common attack vectors and hardest to control.</p><p>Browsers started as simple tools intended to share academic documents over the Internet and over time have become sophisticated platforms that replaced virtually every desktop application in the workplace. The dominance of web-based applications in the workplace has created a challenge for security teams who race to stay patch zero-day vulnerabilities and protect sensitive data stored in self-hosted and SaaS based applications.</p><p>In an attempt to <a href="https://www.cloudflare.com/application-services/solutions/">protect users and applications from web based attacks</a>, administrators have historically relied on DNS or HTTP inspection to prevent threats from reaching the browser. These tools, while useful for protecting against <i>known threats,</i> are difficult to tune without false-positives (negatively impacting user productivity and increasing IT support burden) and ineffective against zero day vulnerabilities.</p><p>Browser isolation technologies mitigate risk by shifting the risk of executing foreign code from the endpoint to a secure environment. Historically administrators have had to make a compromise between <b>performance</b> and <b>security</b> when adopting such a solution. They could either:</p><ul><li><p><b>Prioritize</b> <b>security</b> by choosing a solution that relies on pixel pushing techniques to serve a visual representation to users. This comes at the cost of performance by introducing latency, graphical artifacts and heavy bandwidth usage.</p></li></ul><p><b><i>OR</i></b></p><ul><li><p><b>Prioritize performance</b> by choosing a solution that relies on code scrubbing techniques to unpack, inspect and repack the webpage. This model is fragile (often failing to repack leading to a broken webpage) and insecure by allowing undetected threats to compromise users.</p></li></ul><p>At Cloudflare, we know that security products do not need to come at the expense of performance. We developed a third option that delivers a remote browsing experience without needing to compromise on performance and security for users.</p><ul><li><p><b>Prioritize security</b> by never sending foreign code to the endpoint and executing it in a secure remote environment.</p></li><li><p><b>Prioritize</b> <b>performance</b> sending light-weight vector instructions (rather than pixels) over the wire and minimize remote latency on our global edge network.</p></li></ul>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/41ebdDVZfNPcZDrzSErdei/64d92c0dfee8d66ac8ec820710c5aab4/image4-14.png" />
            
            </figure><p>This unique approach delivers an isolated browser without the security or performance challenges faced by legacy solutions.</p>
    <div>
      <h3>Data control through the browser</h3>
      <a href="#data-control-through-the-browser">
        
      </a>
    </div>
    <p>Malware and zero-day threats are not the only security challenges administrators face with web browsers. The mass adoption of SaaS products has made the web browser the primary tool used to access data. Lack of control over both the application and the browser has left administrators little control over their data once it is delivered to an endpoint.</p><p>Data loss prevention tools typically rely on pattern recognition to partially or completely redact the transmission of sensitive data values. This model is useful for protecting against an unexpected breach of PII and <a href="https://www.cloudflare.com/learning/privacy/what-is-pci-dss-compliance/">PCI</a> data, such as locations and financial information but comes at the loss of visibility.</p><p>The redaction model falls short when sensitive data does not fit into easily recognizable patterns, and the end-users require visibility to do their job. In industries such as health care, redacting sensitive data is not feasible as medical professions require visibility of patient notes and appointment data.</p><p>Once data lands in the web browser it is trivial for a user to copy-paste and print sensitive data into another website, application, or physical location. These seemingly innocent actions can lead to data being misplaced by naive users leading to a data breach. Administrators have had limited options to protect data in the browser, some even going so far as to deploy virtual desktop services to <a href="https://www.cloudflare.com/learning/access-management/what-is-access-control/">control access</a> to a SaaS based customer relationship management (CRM) tool. This increased operating costs, and frustrated users who had to learn how to use computer-in-a-computer just to use a website.</p>
    <div>
      <h3>One-click to isolate data in the browser</h3>
      <a href="#one-click-to-isolate-data-in-the-browser">
        
      </a>
    </div>
    <p>Cloudflare Browser Isolation executes all website code (including HTML) in the remote browser. Since page content remains on the remote browser and draw instructions are only sent to the browser, Cloudflare Browser Isolation is in a powerful position to protect sensitive data on any website or SaaS application.</p><p>Administrators can now control copy-paste, and printing functionality with per-rule granularity with one click in the Cloudflare for Teams Dashboard. For example, now administrators can build rules that prevent users from copying information from your CRM or that stop team members from printing data from your ERP—without blocking their attempts to print from external websites where printing does not present a data loss risk.</p><p>From the user’s perspective websites look and behave normally until the user performs a restricted action.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/117OYpWOP2A2nfrdIyvKy1/78601296763701820f40fe61f69b2c89/image2-5.gif" />
            
            </figure><p>Copy-paste and printing control can be configured for both new and existing HTTP policies in the Teams Dashboard.</p><ol><li><p>Navigate to the Cloudflare for Teams dashboard.</p></li><li><p>Navigate to Gateway → Policies → HTTP.</p></li><li><p>Create/update an HTTP policy with an <b>Isolate</b> action (<a href="https://developers.cloudflare.com/cloudflare-one/policies/filtering/http-policies/#isolate">docs</a>).</p></li><li><p>Configure policy settings.</p></li></ol>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/hA5ZS9T1CskQuCcYmU0z5/041c95876666a465e1db6570119f26df/image1-34.png" />
            
            </figure><p>Administrators have flexibility with data protection controls and can enable/disable browser behaviours based on application, hostname, user identity and security risk.</p>
    <div>
      <h3>What’s next?</h3>
      <a href="#whats-next">
        
      </a>
    </div>
    <p>We’re just getting started with zero trust browsing controls. We’re hard at work building controls to protect against phishing attacks, further protect data by controlling file uploading and downloading without needing to craft complex network policies as well as support for a fully clientless browser isolation experience.</p>
    <div>
      <h3>Democratizing browser isolation for any business</h3>
      <a href="#democratizing-browser-isolation-for-any-business">
        
      </a>
    </div>
    <p>Historically, only large enterprises had justified the cost to add on remote browser isolation to their existing security deployments. And the resulting loosely-integrated solution fell short of achieving Zero Trust due to poor end-user experiences. Cloudflare has already solved these challenges, so businesses achieve full Zero Trust security including browser-based data protection controls without performance tradeoffs.</p><p>Yet it’s not always enough to democratize Zero Trust browser isolation for any business, so we’re currently including it with our Teams Enterprise Plan at no additional charge.<sup>1</sup> <a href="https://www.cloudflare.com/teams/browser-isolation/">Get started here</a>.</p><p>.......</p><p><sup>1</sup> For up to 2000 seats until 31 Dec 2021</p> ]]></content:encoded>
            <category><![CDATA[Cloudflare Zero Trust]]></category>
            <category><![CDATA[Remote Browser Isolation]]></category>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[Road to Zero Trust]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[Security]]></category>
            <guid isPermaLink="false">5TAae1DDChg8vSupwwaUQZ</guid>
            <dc:creator>Tim Obezuk</dc:creator>
        </item>
        <item>
            <title><![CDATA[Containers at the edge: it’s not what you think, or maybe it is]]></title>
            <link>https://blog.cloudflare.com/containers-on-the-edge/</link>
            <pubDate>Sat, 17 Apr 2021 13:00:00 GMT</pubDate>
            <description><![CDATA[ Today, we’re thrilled to announce that we’re exploring a new type of service at the edge: containers. If you have a use case for running containers at our edge, we’d love to know about it! ]]></description>
            <content:encoded><![CDATA[ <p></p><p>At Cloudflare, we’re committed to making it as easy as possible for developers to make their ideas come to life. Our announcements this week aim to give developers all the tools they need to build their next application on the edge. These include things like static site hosting, certificate management, and image services, just to name a few.</p><p>Today, we’re thrilled to announce that we’re exploring a new type of service at the edge: containers.</p><p>This announcement will be exciting to some and surprising to many. <a href="/cloud-computing-without-containers/">On this very blog</a>, we’ve talked about why we believe isolates — rather than containers on the edge — will be the future model for applications on the web.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7bmuoxrsRFAkAgRUtNcsyh/adc41520cab34621b224235232e4fb02/image2-21.png" />
            
            </figure>
    <div>
      <h3>Isolates are best for Distributed Systems</h3>
      <a href="#isolates-are-best-for-distributed-systems">
        
      </a>
    </div>
    <p>Let us be clear: isolates are the best way to do edge compute, period. The Worker's platform is designed to allow developers to treat our global network as one big computer. This has been a long-held dream of generations of engineers, inspiring slogans like "The Network is the Computer" — a trademark which, incidentally, we <a href="/the-network-is-the-computer/">now own</a>. Isolates and Durable Objects are finally making that vision possible.</p><p>In short, isolates excel at distributed systems. They are perfect for treating the network as one big computer.</p><p>Isolates are great for distributed systems because, by being extremely lightweight, they enable us to reduce the unit of compute to a very fine granularity. That in turn allows work to be more effectively distributed across a large network. It is completely reasonable and efficient (takes just a few milliseconds, <a href="/eliminating-cold-starts-with-cloudflare-workers/">less than a TLS handshake</a>) to spin up an isolated to handle one single HTTP request on the edge, which means we can choose the ideal location for each request to be processed. In contrast, because containers and virtual machines are heavier weight, it's necessary to centralize traffic on a few instances to achieve economies of scale.</p>
    <div>
      <h3>But there's still a place for containers</h3>
      <a href="#but-theres-still-a-place-for-containers">
        
      </a>
    </div>
    <p>Some applications are not really meant to be distributed. Consider, for example, a modern, single-player 3D video game. Such a game can be processing dozens of gigabytes of data every second, which by some measures sounds like "Big Data." Can we make games like that better by running them as a distributed system across a cluster of machines? It turns out… probably not. The problem is that all that data is being compiled down into a single output stream (video frames) which must be delivered in a specific sequence with minimal latency. With today's technology, it just doesn't make sense to distribute this work across a network. As such, isolates don't offer much benefit for this use case.</p><p>Meanwhile, at least today, isolates present a challenge when supporting legacy systems. The ecosystem of tooling and technology stacks for isolates is still young and developing. Writing a new application on isolates is great, but taking a complex existing codebase and porting it to run in isolates takes considerable effort. In the case of something like a 3D game, it may not even be possible, as the APIs to access GPUs may not be available. We expect this to improve, but it won't happen overnight.</p><table><tr><td><p><b>Isolates</b></p></td><td><p><b>Containers</b></p></td></tr><tr><td><p>Distributed/global systems</p></td><td><p>Legacy/single-user applications</p></td></tr><tr><td><p>Web application servers</p></td><td><p>3D rendering</p></td></tr><tr><td><p>Big data (e.g. MapReduce)</p></td><td><p>CI builds</p></td></tr></table>
    <div>
      <h3>We needed them too</h3>
      <a href="#we-needed-them-too">
        
      </a>
    </div>
    <p>We even have a small confession to make: we already built the capability to run containers at the edge for ourselves, specifically for our <a href="/browser-isolation-for-teams-of-all-sizes/">Browser Isolation</a> product. This product lets you run your web browser on Cloudflare's servers and stream the graphics back to your client machine, increasing security and performance. We didn't build our own browser for this — our technology is based on Chromium.</p><p>Chromium is a big existing codebase that cannot realistically run inside isolates today. In fact, the "isolate engine" that Workers is built on — V8 — is itself a piece of Chromium. It's not designed to nest within itself — maybe someday, but not today.</p><p>Moreover, a web browser is another example of an application that doesn't make sense to be "distributed." A browser is extremely complex, but serves only one user. It doesn't need to be infinitely scalable or run all around the world at once.</p><p>So, instead of trying to build Browser Isolation on Workers, we deployed a container engine to our edge to run Chromium.</p>
    <div>
      <h3>Another way to run isolates at the edge</h3>
      <a href="#another-way-to-run-isolates-at-the-edge">
        
      </a>
    </div>
    <p>“The edge”, of course, doesn’t have to mean running in all 200+ data centers all the time. We’ve also been able to use containers on the edge ourselves by running them in off-peak locations and for non-latency sensitive tasks. The scheduler for scheduled Workers, for example, runs on our internal container service. Since scheduled events don’t have an end user waiting on a timely response, we’re able to run events in data centers where it’s nighttime and the traffic levels are low.</p><p>Another great use case is running CI builds on the edge, though not for the reason you think. Web traffic in any particular location goes through daily cycles. During off-peak hours, a lot of compute is not used. These off-peak locations would be perfect for running batch work like builds in order to maximize compute efficiency.</p>
    <div>
      <h3>What about migrating my containers to the edge to make them faster?</h3>
      <a href="#what-about-migrating-my-containers-to-the-edge-to-make-them-faster">
        
      </a>
    </div>
    <p>While there are some use cases better suited for containers, moving your container workload from its centralized location to the edge may not be the silver bullet you were hoping for.</p><p>A container-based web application running in Node.js or Django, for example, is unlikely to reap the same benefits from running on the edge. Due to the high overhead required by containers, your application will experience hundreds of milliseconds and often upwards of seconds of cold starts even when running on the edge. In that context, the saved network latency becomes negligible.</p><p>Even if the average request to a warmed-up container was faster, would you be willing to pay a premium for distributing it to 200+ data centers, rather than your current one or two?</p><p>Another thing to keep in mind is that being at the edge may introduce considerable cognitive overhead for legacy server stacks in containers. Managing the state of your application running in 200+ locations around the world is very different from managing it in one, two, or even three data centers. We've specifically designed Workers and Durable Objects to abstract away these concerns, but with classical server stacks running in containers, it may not be so easy.</p><p>With Cloudflare Workers and now Durable Objects — which were built with the edge in mind — we believe we have the right abstractions to allow developers to build for the edge first.</p><p>Container support is for a more limited class of applications that can’t be easily migrated today.</p>
    <div>
      <h3>Still can’t contain your excitement?</h3>
      <a href="#still-cant-contain-your-excitement">
        
      </a>
    </div>
    <p>If you have a use case for running containers at our edge, we’d love to know about it! <a href="https://forms.gle/msrkBLBYNFFYRaqY8">Sign up</a> for our early access (currently restricted to our enterprise plans) and let us know.</p> ]]></content:encoded>
            <category><![CDATA[Developer Week]]></category>
            <category><![CDATA[Developers]]></category>
            <category><![CDATA[Remote Browser Isolation]]></category>
            <category><![CDATA[Product News]]></category>
            <guid isPermaLink="false">3vEjRHQf7clE5zH3DvTXff</guid>
            <dc:creator>Kenton Varda</dc:creator>
            <dc:creator>Rita Kozlov</dc:creator>
        </item>
        <item>
            <title><![CDATA[Page Shield: Protect User Data In-Browser]]></title>
            <link>https://blog.cloudflare.com/introducing-page-shield/</link>
            <pubDate>Thu, 25 Mar 2021 13:01:00 GMT</pubDate>
            <description><![CDATA[ We're excited to introduce Page Shield, a client-side security product customers can use to detect attacks in end-user browsers. ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Today we're excited to introduce Page Shield, a client-side security product customers can use to detect attacks in end-user browsers.</p><p>Starting in 2015, a hacker group named <a href="https://sansec.io/what-is-magecart">Magecart</a> stole payment credentials from online stores by infecting third-party dependencies with malicious code. The infected code would be requested by end-user browsers, where it would execute and access user information on the web page. After grabbing the information, the infected code would send it to the hackers, where it would be resold or used to launch additional attacks such as credit card fraud and identity theft.</p><p>Since then, other targets of such <a href="https://en.wikipedia.org/wiki/Supply_chain_attack">supply chain attacks</a> have included Ticketmaster, Newegg, British Airways, and more. The British Airways attack stemmed from the compromise of one of their self-hosted JavaScript files, exposing nearly 500,000 customers’ data to hackers. The attack resulted in GDPR fines and the <a href="https://www.bloomberg.com/news/articles/2021-01-12/british-airways-faces-biggest-class-action-suit-over-data-breach">largest class-action privacy suit in UK history</a>. In total, millions of users have been affected by these attacks.</p><p>Writing secure code within an organization is challenging enough without having to worry about third-party vendors. Many SaaS platforms serve third-party code to millions of sites, meaning a single compromise could have devastating results. Page Shield helps customers monitor these potential attack vectors and prevent confidential user information from falling into the hands of hackers.</p><p>Earlier this week, <a href="/browser-isolation-for-teams-of-all-sizes/">we announced Remote Browser Isolation</a> for all as a way to mitigate client-side attacks in your employee’s browsers. Page Shield is continuing Cloudflare’s push into client-side security by helping mitigate attacks aimed at your customers.</p>
    <div>
      <h3>Background</h3>
      <a href="#background">
        
      </a>
    </div>
    <p>A Magecart-style attack is a type of software supply chain attack carried out in a user’s browser. Attackers target the hosts of third-party JavaScript dependencies and gain control over the source code served to browsers. When the infected code executes, it often attempts to steal sensitive data that end-users enter into the site such as credit card details during a checkout flow.</p><p>These attacks are challenging to detect because many application owners trust third-party JavaScript to function as intended. Because of this trust, third-party code is rarely audited by the application owner. In many cases, Magecart attacks have lasted months before detection.</p><p><a href="https://www.cloudflare.com/learning/security/what-is-data-exfiltration/">Data exfiltration</a> isn’t the only risk stemming from software supply chains. In recent years we’ve also seen hackers modify third-party code to show fraudulent advertisements to users. Users click through these advertisements and go to phishing sites, where their personal information is stolen by the hackers. Other JavaScript malware has mined cryptocurrencies for the attackers using end-user resources, damaging site performance.</p><p>So what can application owners do to protect themselves? Existing browser technologies such as Content Security Policy (CSP) and Subresource Integrity (SRI) provide some protection against client-side threats, but have some drawbacks.</p><p>CSP enables application owners to send an allowlist to the browser, preventing any resource outside those listed to execute. While this can <a href="https://www.cloudflare.com/learning/security/how-to-prevent-xss-attacks/">prevent certain cross-site scripting attacks (XSS)</a>, it fails to detect when existing resources change from benign to malicious states. Managing CSP is also operationally challenging as it requires developers to update the allowlist every time a new script is added to the site.</p><p>SRI enables application owners to specify an expected file hash for JavaScript and other resources. If the fetched file doesn’t match the hash, it is blocked from executing. The challenge with SRI is vendors update their code often, and in certain cases serve different files to different end-users. We’ve also found that JavaScript vendors will sometimes serve versioned files with different hashes to end-users due to small differences such as spacing. This could result in SRI blocking legitimate files by no fault of the application owner.</p>
    <div>
      <h3>Script Monitor is the first available Page Shield feature</h3>
      <a href="#script-monitor-is-the-first-available-page-shield-feature">
        
      </a>
    </div>
    <p>Script Monitor is the beginning of Cloudflare’s ambition for Page Shield. When turned on, it records your site’s JavaScript dependencies over time. As new JavaScript dependencies appear, we alert you, so you can investigate if they are expected changes to your site. This helps you identify if bad actors modified your application to request a new, malicious JavaScript file. Once the beta is complete, this initial feature set will be made available to Business and Enterprise customers at no extra charge.</p>
    <div>
      <h3>How does Script Monitor work?</h3>
      <a href="#how-does-script-monitor-work">
        
      </a>
    </div>
    <p>Because of Cloudflare’s unique position between application origin servers and end-users, we can modify responses before they reach end-users. In this case, we’re adding a Content-Security-Policy-Report-Only header to pages as they pass through our edge. When JavaScript files attempt to execute on the page, browsers will send a report back to Cloudflare. As we are using a report-only header, there’s no requirement for application owners to maintain allowlists for relevant insights.</p><p>For each report we see, we compare the JavaScript file with the historic dependencies of that zone and check if the file is new. If it is, we fire an alert, so customers can investigate and determine whether the change was expected.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/AJdQagm2ypnb0ferguTDW/7ebfee2ed1f3f41add159c8ff57f2fb9/image1-40.png" />
            
            </figure><p>The Script Monitor UI located under Firewall -&gt; Page Shield</p><p>As a beta participant, you will see the Page Shield tab under the Firewall section of your zone dashboard. There, you can find the Script Monitor table tracking your zone’s JavaScript dependencies. For each dependency, you can view the first seen date, last seen date, and host domain that it was detected on.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/wxIYbVN6ETaJhLqc1BIzs/aa42946a3207a9c281297598b72cb3be/image2-34.png" />
            
            </figure><p>Email notification example for new JavaScript dependencies found</p><p>You can also configure Script Monitor notifications in the dashboard. These notifications send alerts to email or PagerDuty whenever a new JavaScript file is requested by your site.</p>
    <div>
      <h3>Looking forward</h3>
      <a href="#looking-forward">
        
      </a>
    </div>
    <p>Our mission is to help build a better Internet. This extends to end-user browsers, where we’ve seen an alarming increase in attacks over the past several years. With Page Shield, we will help applications detect and mitigate these elusive attacks to keep their user’s sensitive information safe.</p><p>We are already building code change detection into Script Monitor. Code change detection will periodically fetch your application’s JavaScript dependencies and analyze their behavior. When new code behavior is detected to existing files, we will alert you, so you can review the change and determine if the new code is a benign update or an infected piece of code.</p><p>Coming after code change detection is intelligent analysis of JavaScript files. While alerting application owners when their dependencies change provides insight into files of interest, we can do better. We’ve worked with our security partners to acquire samples of Magecart JavaScript and have proven we can accurately classify malicious JavaScript samples. We plan to refine our techniques further and eventually begin alerting Page Shield customers when we believe their dependencies are malicious.</p><p>We’ve talked to our customers and understand that maintaining CSP allowlists is operationally challenging. If new client-side JavaScript is deployed without being added to the allowlist, then that new code will be blocked by browsers. That’s why we will use our position as a reverse-proxy to ship negative security model blocking. This will allow application owners to block individual scripts without having to maintain an allowlist, ensuring customers can ship new code without the cumbersome overhead.</p>
    <div>
      <h3>Sign up for the beta</h3>
      <a href="#sign-up-for-the-beta">
        
      </a>
    </div>
    <p>Starting today, all Business and Enterprise customers can sign up <a href="https://www.cloudflare.com/waf/page-shield/">here</a> to join the closed beta for Page Shield. By joining the beta, customers will be able to activate Script Monitor and begin monitoring their site’s JavaScript.</p> ]]></content:encoded>
            <category><![CDATA[Security Week]]></category>
            <category><![CDATA[Page Shield]]></category>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[Device Security]]></category>
            <category><![CDATA[Speed & Reliability]]></category>
            <category><![CDATA[Remote Browser Isolation]]></category>
            <guid isPermaLink="false">2uyd7wWAPudwfSmX6JWUj8</guid>
            <dc:creator>Justin Zhou</dc:creator>
        </item>
        <item>
            <title><![CDATA[Browser Isolation for teams of all sizes]]></title>
            <link>https://blog.cloudflare.com/browser-isolation-for-teams-of-all-sizes/</link>
            <pubDate>Tue, 23 Mar 2021 13:01:00 GMT</pubDate>
            <description><![CDATA[ Protecting endpoints from browser-born zero-day attacks and malware with remote browser isolation is now easy for teams of any size. ]]></description>
            <content:encoded><![CDATA[ <p>Every Internet-connected organization relies on web browsers to operate: accepting transactions, engaging with customers, or working with sensitive data. The very act of clicking a link triggers your web browser to download and execute a large bundle of unknown code on your local device.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/14XtPSLyUvlfQFjTYYDoTT/a4273c6a6b94fec1567a0eb420ad57f4/Browser-Isolation-OG-body-3.png" />
            
            </figure><p>IT organizations have always been on the back foot while defending themselves from security threats. It is not a question of ‘if’, but ‘when’ the next zero-day vulnerability will compromise a web browser. How can IT organizations protect their users and data from unknown threats without over-blocking every potential risk? The solution is to shift the burden of executing untrusted code from the user’s device to a remote isolated browser.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4Kwv4UgTOIsQ2H80GztC6d/524c2dc3bdf81bec78e1475242fbfd7b/image4-27.png" />
            
            </figure>
    <div>
      <h3>Bringing Remote Browser Isolation to teams of any size</h3>
      <a href="#bringing-remote-browser-isolation-to-teams-of-any-size">
        
      </a>
    </div>
    <p>Today we are excited to announce that Cloudflare Browser Isolation is now available within Cloudflare for Teams suite of <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">zero trust security</a> and secure web browsing services as an add-on. Teams of any size from startups to large enterprises can benefit from reliable and safe browsing without changing their preferred web browser or setting up complex network topologies.</p>
    <div>
      <h3>Remote Browsers must be reliable</h3>
      <a href="#remote-browsers-must-be-reliable">
        
      </a>
    </div>
    <p>Running sensitive workloads in secure environments is nothing new, and <a href="https://www.cloudflare.com/learning/access-management/what-is-browser-isolation/">Remote Browser Isolation (RBI) technologies</a> have existed for many years. This begs the question, why are remote browsers not a common technology used by everyone?</p><p>The answer is — historically flawed execution. Everyone relies on web browsers for the majority of their work and any impact to user experience or performance can at best mean productivity losses and at worst outright rejection of the solution.</p><p>Unreliable rendering and poor performance in legacy browser isolation solutions has led IT organizations to reserve the enhanced security posture only for highly targeted users or activities. Much like trusting networks through the castle-and-moat model, assuming some users or websites are not phishing or malware vectors leaves an open door to attack.</p><p>Cloudflare Browser Isolation is built on top of Chromium (the same engine that powers other popular web browsers such as Google Chrome, Microsoft Edge and Brave Browser). This, combined with our novel <a href="/cloudflare-and-remote-browser-isolation/">Network Vector Rendering</a> technique, ensures that web pages are safely and consistently rendered even as web technologies evolve and become more complex.</p>
    <div>
      <h3>Remote Browsers Must Be Fast</h3>
      <a href="#remote-browsers-must-be-fast">
        
      </a>
    </div>
    <p>Legacy browser isolation solutions are hamstrung by their fundamental technology or the network they operate on. These old solutions rely on high-latency and bandwidth-heavy pixel pushing, or fragile content-disarm and reconstruction techniques that degrade performance, break websites, and might miss a malicious payload in the process.</p><p>Network Vector Rendering allows us to deliver a safe view of a remote webpage without high bandwidth usage or degraded image quality, but it is one part of the solution. By leveraging our global network we position remote browsers close to everyone connected to the Internet. This allows us to deliver a responsive, low latency stream of the webpage regardless of where you are physically located.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/14hVfWbzFCUuQBFVWj4obN/800fc77266678170d7746dfe8f17d75f/image1-35.png" />
            
            </figure><p>Running a web browser on powerful servers connected to the backbone of the Internet introduces a powerful performance benefit. By sending minimal draw commands over the last mile wire, users with low bandwidth Internet connections enjoy a faster more responsive Internet.</p><p>Combine a massive, smart, distributed network with our patented super fast, lightweight Network Vector Rendering technology, and the result is remote browsing technology liberated from legacy constraints — providing crisp isolated pages to any user, on any device, anywhere in the world.</p><p>One of the advantages of using Browser Isolation is it reduces the local web browser’s burden downloading modern web pages. According to the FCC nearly 30 million Americans do not have access to broadband Internet (<a href="https://www.fcc.gov/about-fcc/fcc-initiatives/bridging-digital-divide-all-americans">source</a>). Modern websites are not optimised for low bandwidth connections typically requiring the download of hundreds of objects. Cloudflare’s remote browsers are connected to the backbone of the Internet and able to consistently download websites at broadband speeds, leveling the field for users on low-bandwidth Internet connections.</p><p>Here’s an example of a web page loading on a slow Internet connection compared with and without Browser Isolation. We are excited to see Browser Isolation bridging the digital divide and making the Internet faster for under-served Internet users.</p><div></div>
<p><i>Note: Timing is measured from the start of web page download until the webpage has triggered it’s on-load signal.</i></p>
    <div>
      <h3>Remote Browsers Must Be Easy to Use</h3>
      <a href="#remote-browsers-must-be-easy-to-use">
        
      </a>
    </div>
    <p>Browser Isolation products are typically <a href="https://www.cloudflare.com/learning/access-management/how-to-implement-zero-trust/">implemented</a> either as add-on network appliances (such as a virtual machine or firewall box) or by changing the user’s preferred browser. As an add-on network appliance, IT teams need to piece together multiple disparate solutions (even when offered by the same vendor). This leads to unnecessary complexity within the network and disparate interfaces for controlling policy configurations and monitoring threats.</p><p>Cloudflare Browser Isolation integrates natively into Cloudflare for Teams, delivering a consolidated view of all network and isolated traffic. Just like how you can use Gateway to allow / block traffic based on content categories, or security threats you can also define Isolation policies to dynamically isolate websites based on identity, security threats or content.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/40YG6LOKdW7W9xsVZoTr5o/ff92964ea1f5e15f88fb6487cc1afc95/image2-29.png" />
            
            </figure>
    <div>
      <h3>The Future of Internet Browsing is Remote Browsing</h3>
      <a href="#the-future-of-internet-browsing-is-remote-browsing">
        
      </a>
    </div>
    <p>Local webpage execution poses a huge threat to businesses and organizations around the world. The solution is simple: shift the burden of executing untrusted code from the user’s device to a remote isolated browser.</p><p>Secure, fast, simple Remote Browser Isolation is now possible. Today we’re excited to announce that Cloudflare Browser Isolation is available as an add-on for Cloudflare for Teams. You can now protect your business from browser-based security threats without changing your web browsers or networks. To get started, <a href="https://www.cloudflare.com/teams/browser-isolation/">sign up for a Cloudflare for Teams account</a>, and add on Browser Isolation to the Teams Gateway or Teams standard plans. Contract customers can have Browser Isolation added to their Cloudflare for Teams plan by <a href="http://cloudflare.com/teams/plans/enterprise">requesting access at this form</a>.</p><p>From the day Cloudflare started, our mission has been to help build a better Internet and democratise the technologies that were only previously accessible to the large companies with sophisticated networks, dedicated IT teams and the budgets to support them.</p><p>Like a not-too-distant past when HTTPS encryption was reserved for “sensitive” login pages and <a href="https://www.cloudflare.com/ecommerce/">eCommerce</a> checkouts, we believe that trusting arbitrary website code will seem just as archaic creating the new paradigm of Zero Trust web browsing. The time for reliable and responsive Remote Browser Isolation technology is NOW.</p> ]]></content:encoded>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[Zero Day Threats]]></category>
            <category><![CDATA[Cloudflare One]]></category>
            <category><![CDATA[Security Week]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Remote Browser Isolation]]></category>
            <guid isPermaLink="false">49yiFglS3Ah2UXGFbVOV23</guid>
            <dc:creator>Tim Obezuk</dc:creator>
        </item>
        <item>
            <title><![CDATA[Introducing Cloudflare Browser Isolation beta]]></title>
            <link>https://blog.cloudflare.com/browser-beta/</link>
            <pubDate>Thu, 15 Oct 2020 15:00:00 GMT</pubDate>
            <description><![CDATA[ Today, we’re excited to open up a beta of a third approach to keeping web browsing safe with Cloudflare Browser Isolation. ]]></description>
            <content:encoded><![CDATA[ <p></p>
    <div>
      <h3>Reimagining the Browser</h3>
      <a href="#reimagining-the-browser">
        
      </a>
    </div>
    <p>A web browser, the same application that connects users to the entire Internet, also connects you to all of the potentially harmful parts of the Internet. It’s an open door to nearly every connected system on the planet, which is powerful and terrifying.</p><p>We also rely on browsers more than ever. Most applications that we use live in a browser and that will continue to increase. For more and more organizations, a corporate laptop is just a managed web browser machine.</p><p>To keep those devices safe, and the data they hold or access, enterprises have started to deploy “<a href="https://www.cloudflare.com/learning/access-management/what-is-browser-isolation/">browser isolation</a>” services where the browser itself doesn’t run on the machine. Instead, the browser runs on a virtual machine in a cloud provider somewhere. By running away from the device, threats from the browser stay on that virtual machine somewhere in the cloud.</p><p>However, most isolation solutions take one of two approaches that both ruin the convenience and flexibility of a web browser:</p><ul><li><p>Record the isolated browser and send a live stream of it to the user, which is slow and makes it difficult to do basic things like input text to a form.</p></li><li><p>Unpack the webpage, inspect it, repack it and send it to the user - sometimes missing threats or more often failing to repack the webpage in a way that it still works.</p></li></ul><p>Today, we’re excited to open up a beta of a third approach to keeping web browsing safe with Cloudflare Browser Isolation. Browser sessions run in sandboxed environments in Cloudflare data centers in 200 cities around the world, bringing the remote browser milliseconds away from the user so it feels like local web browsing.</p><p>Instead of streaming pixels to the user, Cloudflare Browser Isolation sends the final output of a browser’s web page rendering. The approach means that the only thing ever sent to the device is a package of draw commands to render the webpage, which also makes Cloudflare Browser Isolation compatible with any HTML5 compliant browser.</p><p>The result is a browser that just feels like a browser, while keeping threats far away from the device.</p><div></div>
<p></p><p>We’re inviting users to sign up for the beta today as part of Zero Trust week at Cloudflare. If you’re interested in signing up now, visit the bottom of this post. If you’d like to find out how this works, keep reading.</p>
    <div>
      <h3>The unexpected universal productivity application</h3>
      <a href="#the-unexpected-universal-productivity-application">
        
      </a>
    </div>
    <p>While it never quite became the replacement operating system Marc Andreessen <a href="https://www.wired.com/2012/04/ff-andreessen/">predicted in 1995</a>, the web browser is perhaps the most important application today on end-user devices. In the workplace, many people spend the majority of their at-work computer time entirely within a web browser connected to internal apps and external SaaS applications and services. As this has occurred, browsers have needed to become increasingly complex — to address the expanding richness of the web and the demands of modern web applications such as Office 365 and Google Workspace.</p><p>However, despite the pivotal and ubiquitous role of web browsers, they are the least controlled application in the enterprise. Businesses struggle to control how users interact with web browsers. It’s all too easy for a user to inadvertently download an infected file, install a malicious extension, upload sensitive company data or click a malicious zero-day link in an <a href="https://www.cloudflare.com/learning/email-security/what-is-email-fraud/">email</a> or on a webpage.</p><p>Making the problem worse is the growing prevalence of BYOD. It makes it difficult to enforce which browsers are used or if they are properly patched. Mobile device management (MDM) is a step in the right direction, but just like the slow patching cycles of on-premise firewalls, MDM can often be too slow to protect against zero day threats. I’ve been the recipient of many mass emails from CISO’s reminding everyone to patch their browser and to do it right now because this time it’s “<b><i>really important</i></b>” (CVE-2019-5786).</p>
    <div>
      <h3>Reimagining the browser</h3>
      <a href="#reimagining-the-browser">
        
      </a>
    </div>
    <p>Earlier this week we announced Cloudflare One, which is our vision for the future of the corporate network. The fundamental approach we’ve taken is a blank sheet: to zero out all the assumptions of the old model (like castle-and-moat) and usher in a new model based on the complex nature of today’s corporate networking and the shift to <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust</a>, cloud-based <a href="https://www.cloudflare.com/learning/network-layer/network-as-a-service-naas/">networking-as-a-service</a>.</p><p>It would be impossible to do this without thinking about the browser. Remote computing technologies have offered the promise of fixing the problems of the browser for some time — a future where anyone can benefit from the security and scale of cloud computing on their personal device. The reality has been that getting a generally performant solution is much more difficult than it sounds. It requires sending a user’s input over the Internet, computing that input, retrieving resources off the web, and then streaming them back to the user. And it all must occur in milliseconds, to create an illusion of using a local piece of software.</p><p>The general experience has been terrible, and many <a href="https://www.cloudflare.com/learning/access-management/how-to-implement-zero-trust/">implementations</a> have created nothing but angry emails and help-desk tickets for IT folks.</p><p>It is a tough problem, and it’s something we’ve been hard at work at solving. By delivering a vector-based stream that scales across any display size without requiring high bandwidth connections we’re able to reproduce the native browser experience remotely. Users experience the website as it was intended, without all the compatibility issues introduced by scrubbing HTML, CSS and JavaScript. And performance issues are aided tremendously by the fact that the managed browser is hosted only milliseconds away on our network.</p>
    <div>
      <h3>How secure remote browsing fits in with Cloudflare for Teams</h3>
      <a href="#how-secure-remote-browsing-fits-in-with-cloudflare-for-teams">
        
      </a>
    </div>
    <p>Before Cloudflare Browser Isolation, Cloudflare for Teams consisted of two core services:</p><p><a href="http://cloudflare.com/teams/access"><b>Cloudflare Access</b></a> creates a Zero Trust network <a href="https://www.cloudflare.com/learning/access-management/what-is-the-network-perimeter/">perimeter</a> that allows users to access corporate applications without needing to poke holes in their internal network with a legacy VPN appliance.</p><p><a href="http://cloudflare.com/teams/gateway"><b>Cloudflare Gateway</b></a> creates a <a href="https://www.cloudflare.com/learning/access-management/what-is-a-secure-web-gateway/">Secure Web Gateway</a> that protects users from threats on any website.</p><p>These tools are excellent for protecting private Internet properties from unauthorized access and web browsing activity from known malicious websites. But what about unknown and unforeseeable threats?</p><p><a href="http://cloudflare.com/teams/browser-isolation"><b>Cloudflare Browser Isolation</b></a> answers this question by sandboxing a web browser in a remote container that is easily disposed of at the end of the user’s browsing session or when compromised.</p><p>Should an unknown threat such as a zero day vulnerability or malicious website exploit any of the hundreds of Web APIs, the attack is limited to a browser running in a supervised cloud environment leaving the end-user’s device unaffected.</p>
    <div>
      <h3>The Network is the Computer®</h3>
      <a href="#the-network-is-the-computer-r">
        
      </a>
    </div>
    <p>Web browsers are the foundation that the shift to the cloud has been built on. It’s just that they’ve always run in the wrong place.</p><p>In the same way that it made no sense for a developer to run and maintain the hardware that their application runs on, the same exact case can be made for the other side of the cloud’s equation: the browser. Funnily enough, the solution is exactly the same: like the developer’s application, the browser needed to move to the cloud. However, as with all disruptions, it takes time and investment for the performance of the new technology to catch up to the old one. When AWS was first launched in 2006, the inherent limitations meant that for most developers, it made sense to continue to run on-premise solutions.</p><p>At some point though, the technology improves to the point where the disruption can start taking over from the previous paradigm.</p><p>The limiting factor until today for a cloud-based browser has often been the experience of using it. A user’s experience is limited by the speed of light; it limits the time it takes a user’s input to travel to the remote data center and be returned to their display. In a perfect world, this needs to occur within milliseconds to deliver a real time experience.</p><p>Cloudflare has one very big advantage in solving that problem.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5sENUbqoMLc6sU8SHkz5Ol/96345f7f149c25cb909762c4fdf5e045/image2-17.png" />
            
            </figure><p>To deliver real-time remote computing experiences, each of our 200+ data centers are capable of serving remote browsing sessions within the blink of an eye of nearly everyone connected to the Internet. This allows us to deliver a low latency, responsive stream of a webpage regardless of where you’re physically located.</p>
    <div>
      <h3>What’s next?</h3>
      <a href="#whats-next">
        
      </a>
    </div>
    <p>But that’s enough talking about it. We’d love for you to try it! Please complete the form <a href="http://cloudflare.com/teams/lp/browser-isolation">here</a> to sign up to be one of the first users of this new technology in our network. We’ll be in touch as we expand the beta to more users.</p> ]]></content:encoded>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[Zero Trust Week]]></category>
            <category><![CDATA[Zero Day Threats]]></category>
            <category><![CDATA[Cloudflare One]]></category>
            <category><![CDATA[Remote Browser Isolation]]></category>
            <guid isPermaLink="false">2SkxJrMgredeCB5VQ29Rrg</guid>
            <dc:creator>Tim Obezuk</dc:creator>
        </item>
        <item>
            <title><![CDATA[Setting up Cloudflare for Teams as a Start-Up Business]]></title>
            <link>https://blog.cloudflare.com/setting-up-cloudflare-for-teams-as-a-start-up-business/</link>
            <pubDate>Tue, 05 May 2020 11:00:00 GMT</pubDate>
            <description><![CDATA[ S2 Systems, recently acquired by Cloudflare, provides a start-up’s perspective of setting up Cloudflare for Teams and how it solved some problems that we struggled with for way too long. ]]></description>
            <content:encoded><![CDATA[ <p>Earlier this year, Cloudflare acquired S2 Systems. We were a start-up in Kirkland, Washington and now we are home to Cloudflare’s Seattle-area office.</p><p>Our team developed a <a href="/cloudflare-and-remote-browser-isolation/">new approach</a> to remote browser isolation (RBI), a technology that runs your web browser in a cloud data center, stopping threats on the Internet from executing any code on your machine. The closer we can bring that data center to the user, the faster we can make that experience. Since the acquisition, we have been focused on running our RBI platform in every one of Cloudflare’s data centers in 200 cities around the world.</p><p>The RBI solution will join a product suite that we call <a href="https://teams.cloudflare.com/">Cloudflare for Teams</a>, which consists of two products: Access and Gateway.</p><p>Those two products solve a number of problems that companies have with securing users, devices, and data. As a start-up, we struggled with a few of these challenges in really painful ways:</p><ul><li><p>How do we let prospects securely trial our RBI platform?</p></li><li><p>How do we keep our small office secure without an IT staff?</p></li><li><p>How can we connect to the powerful, but physically clunky and heavy development machines, when we are not in that office?</p></li></ul><p>Dogfooding our own products has <a href="/dogfooding-from-home/">long been part</a> of Cloudflare’s identity, and our team has had a chance to do the same from a new perspective.</p>
    <div>
      <h2>Managing access to our RBI service for early adopter customers and partners</h2>
      <a href="#managing-access-to-our-rbi-service-for-early-adopter-customers-and-partners">
        
      </a>
    </div>
    <p>As we built the first version of our product, we worked closely with early adopters to test the product and gather feedback. However, we were not ready to share the product with the entire world yet, so we needed a way to lock down who could reach the prototype and beta versions.</p><p>It took us the best part of six months to build, test and modify (multiple times) the system for managing access to the product.</p><p>We chose a complicated solution that took almost as much time to build as did features within the product. We deployed a load balancer that also served as a reverse proxy in front of the RBI host and acted as a bouncer for unauthenticated requests. That sat behind an ASP.NET core server. Furthest to the right sat the most difficult component: identity.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/77co7h4i4KJ24XBDjAfdzx/0a4e7db69abf7732ca2674753eefeea6/image-1.png" />
            
            </figure><p>We had to manually add identity providers every time a new customer wanted to test out the service. Our CTO frequently burned hours each day adding customers manually, configuring groups, and trying to balance policies that kept different tenants secure.</p>
    <div>
      <h3>From six months to 30 minutes</h3>
      <a href="#from-six-months-to-30-minutes">
        
      </a>
    </div>
    <p>As we learned more about Cloudflare during the due diligence period, we started to hear more about Cloudflare Access. Like the RBI solution, Access applied Cloudflare’s network to a new type of problem: how do teams keep their users and resources secure without also slowing them down?</p><p>When members of the Cloudflare team visited our office in Kirkland, none of them needed a VPN to connect. Their self-managed applications just worked, like any other SaaS app.</p><p>We then had a chance to try Access ourselves. After the deal closed, we collaborated with the Cloudflare team on an announcement. This started just hours after the acquisition completed, so we did not have a chance to onboard to Cloudflare’s corporate SSO yet. Instead, the team secured new marketing pages and forms behind Cloudflare Access which prompted us to login with our S2 emails. Again, it just worked.</p><p>We immediately began rethinking every hour we had spent building our own authentication platform. The next day, we set up a Cloudflare Access account. We secured our trial platform by building a couple of rules in the Access UI to decide who should be able to reach it.</p><p>We sent a note out to the team to try it out. They logged in with our SSO credentials and Cloudflare connected them to the application. No client needed on their side, no multi-level authentication platform on ours.</p><p>We shut down all of our demo authentication servers. Now, when we have customers who want to trial the RBI technology, we can add their account to the rules in a couple of minutes. They visit a single hostname, login, and can start connecting to a faster, safer browser.</p>
    <div>
      <h2>Protecting our people and devices from Internet threats</h2>
      <a href="#protecting-our-people-and-devices-from-internet-threats">
        
      </a>
    </div>
    <p>When we signed a sublease for our first office location, we found the business card of the building’s Comcast representative taped to the door. We called them and after a week the Comcast Business technicians had a simple network running for us.</p><p>We wanted to implement a real <a href="https://www.cloudflare.com/network-security/">network security model</a> for our small office. We tried deploying multiple firewalls, with access controls, and added some tools to secure outbound traffic.</p><p>We spent way too much time on it. Every configuration change involved the staff trying to troubleshoot problems. The system wound up blocking things that should not be blocked, and missing things that should be blocked. It reached the point where we just turned off most of it.</p><p>Another product in the Cloudflare for Teams platform, <a href="https://teams.cloudflare.com/gateway/index.html">Cloudflare Gateway</a>, solved this challenge for us. Rather than 30 minutes, this upgrade took about 10.</p><p>Cloudflare Gateway secures users from threats on the Internet by stopping traffic from devices or office networks from reaching malicious destinations. The first feature in the product, DNS-based security, adds threat-blocking into the world’s fastest DNS resolver, Cloudflare’s 1.1.1.1 product.</p><p>We created a policy to block security threats, changed our router’s DNS settings, and never had to worry about it again. As needed, we could log back into the UI and review reports that told us about the malicious traffic that Gateway caught.</p><p>As I’m writing this post, none of us are working in that office. We’re staying home, but we still can use Gateway’s security model. Gateway <a href="/how-to-use-1-1-1-1-w-warp-app-and-cloudflare-gateway-to-protect-your-phone-from-security-threats/">now integrates</a> with the 1.1.1.1 app for mobile devices; in a couple of clicks, we can protect iOS and Android phones and tablets with the same level of security. Soon, we’ll be <a href="/announcing-the-beta-for-warp-for-macos-and-windows/">releasing desktop versions</a> to make that easy on every device.</p>
    <div>
      <h2>Connecting to dev machines while working from home</h2>
      <a href="#connecting-to-dev-machines-while-working-from-home">
        
      </a>
    </div>
    <p>Back at the office, we still have a small fleet of high-powered Linux machines. These desktops run 16 cores, 32 threads, and 32GB of DDR memory. We use these to build and test Chromium, but dragging these boxes to each developer’s house would have been a huge hassle.</p><p>We still had a physical VPN appliance that we had purchased during our start-up days. We had hired vendors to install it onsite and configure some elaborate syncing with our identity providers. The only thing more difficult than setting it up was using it. With everyone suddenly working from home, I don’t think we would have been able to make it work.</p><p>So we returned to Cloudflare Access instead. Working with guidance from Cloudflare’s IT and Security teams, we added a new hostname in the Cloudflare account for the Seattle area office. We then installed the Cloudflare daemon, <code>cloudflared</code>, on the machines in the offices. Those daemons created outbound-only tunnels from the machines to the Cloudflare network, available at a dedicated subdomain for each developer.</p><p>On the other side of that connection, each engineer on our team installed <code>cloudflared</code> on their machines at home. They need to make one change to their SSH config file, adding two lines that include a ProxyCommand. The setup requires no other modifications, no special SSH clients or commands. Even the developers who rely on tools like Visual Studio Code’s Remote SSH extension could keep their workflow exactly the same.</p><p>The only difference is that, instead of a VPN, when developers start a new SSH session, Access prompts them to login with Cloudflare’s SSO. They do so and are connected to their machine through Cloudflare’s network and smart routing technology.</p>
    <div>
      <h2>What’s next?</h2>
      <a href="#whats-next">
        
      </a>
    </div>
    <p>As a start-up, every hour we spent trying to cobble together tools was an hour we lost building our product but we needed to provide secure access to our product so we made the time investment. The only other option would have been to purchase products that were way outside of the price range for a small start-up where the only office perk was bulk Costco trail mix.</p><p>Cloudflare for Teams immediately solved the challenges we had, in a fairly comprehensive way. We now can seamlessly grant prospects permissions to try the product, our office network is safer, and our developers can stay productive at home.</p><p>It could be easy to think “I wish we had done this sooner,” and to some extent, I do. However, seeing the before-and-after of our systems has made us more excited about what we’re doing as we bring the remote browser technology into Cloudflare’s network.</p><p>The RBI platform is going to benefit from the same advantages of that network that make features in Access and Gateway feel like magic. We’re going to apply everything that Cloudflare has learned securing and improving connections and use it to solve a new customer problem.</p><p>Interested in skipping the hard parts about our story and getting started with Cloudflare for Teams? You can use all of the features covered in this blog post today, <a href="https://teams.cloudflare.com/">at no cost through September</a>.</p> ]]></content:encoded>
            <category><![CDATA[Cloudflare Zero Trust]]></category>
            <category><![CDATA[Remote Browser Isolation]]></category>
            <category><![CDATA[Cloudflare Access]]></category>
            <category><![CDATA[Cloudflare Gateway]]></category>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <guid isPermaLink="false">Sju4smOb0O8W8tu1u6bV5</guid>
            <dc:creator>David Harnett</dc:creator>
        </item>
    </channel>
</rss>