
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[ The Cloudflare Blog ]]></title>
        <description><![CDATA[ Get the latest news on how products at Cloudflare are built, technologies used, and join the teams helping to build a better Internet. ]]></description>
        <link>https://blog.cloudflare.com</link>
        <atom:link href="https://blog.cloudflare.com/" rel="self" type="application/rss+xml"/>
        <language>en-us</language>
        <image>
            <url>https://blog.cloudflare.com/favicon.png</url>
            <title>The Cloudflare Blog</title>
            <link>https://blog.cloudflare.com</link>
        </image>
        <lastBuildDate>Wed, 15 Apr 2026 21:19:15 GMT</lastBuildDate>
        <item>
            <title><![CDATA[Celebrating one year of Project Cybersafe Schools]]></title>
            <link>https://blog.cloudflare.com/celebrating-one-year-of-project-cybersafe-schools/</link>
            <pubDate>Thu, 08 Aug 2024 14:00:00 GMT</pubDate>
            <description><![CDATA[ August 8, 2024, marks the first anniversary of Project Cybersafe Schools, Cloudflare’s initiative to provide small K-12 public school districts in the United States with a package of Zero Trust  ]]></description>
            <content:encoded><![CDATA[ <p>August 8, 2024, is the first anniversary of <a href="https://blog.cloudflare.com/project-cybersafe-schools">Project Cybersafe Schools</a>, Cloudflare’s initiative to provide free security tools to small school districts in the United States.</p><p>Cloudflare announced Project Cybersafe Schools at the White House on August 8, 2023 as part of the <a href="https://www.youtube.com/watch?v=GaH9oJdbQZk&amp;themeRefresh=1">Back to School Safely: K-12 Cybersecurity Summit</a> hosted by First Lady Dr. Jill Biden. The<a href="https://www.whitehouse.gov/briefing-room/statements-releases/2023/08/07/biden-harris-administration-launches-new-efforts-to-strengthen-americas-k-12-schools-cybersecurity/"> White House highlighted</a> Cloudflare’s commitment to provide free resources to small school districts in the United States. Project Cybersafe Schools supports eligible K-12 public school districts with a package of <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust</a> cybersecurity solutions – for free, and with no time limit. These tools help eligible school districts minimize their exposure to common cyber threats.</p><p>Cloudflare’s mission is to help build a better Internet. One way we do that is by supporting organizations that are particularly vulnerable to cyber threats and lack the resources to protect themselves through projects like <a href="https://www.cloudflare.com/galileo/">Project Galileo</a>, the <a href="https://www.cloudflare.com/athenian/">Athenian Project</a>, the <a href="https://blog.cloudflare.com/announcing-critical-infrastructure-defense/">Critical Infrastructure Defense Project</a>, <a href="https://blog.cloudflare.com/project-safekeeping/">Project Safekeeping</a>, and most recently, <a href="https://blog.cloudflare.com/heeding-the-call-to-support-australias-most-at-risk-entities">Project Secure Health</a>.</p>
    <div>
      <h3>Schools are vulnerable to cyber attacks</h3>
      <a href="#schools-are-vulnerable-to-cyber-attacks">
        
      </a>
    </div>
    <p>In Q2 2024, education ranked 4th on the list of <a href="https://radar.cloudflare.com/reports/ddos-2024-q2#id-8-most-attacked-industries">most attacked industries</a>. Between 2016 and 2022, there were <a href="https://statescoop.com/department-education-k12-cyberattacks/">1,619 K-12 cyber incidents</a>. Since we launched Project Cybersafe Schools in August 2023, there have been a number of cyber attacks targeting hundreds of thousands of students. In August 2023, Prince George’s County Public Schools in Maryland <a href="https://therecord.media/md-school-system-says-people-affected-ransomware">fell victim</a> to a ransomware attack that affected the personal data of more than 100,000 people. Then, in December 2023, a Cincinnati area school district suffered a cyber attack that <a href="https://www.wvxu.org/education/2024-06-25/west-clermont-schools-loses-million-cyber-attack">resulted in the loss of $1.7M</a>. In 2024, there have been numerous incidents affecting K-12 schools across the U.S., including in <a href="https://www.bostonglobe.com/2024/05/07/metro/report-concord-schools-hit-with-cyber-attack/">Massachusetts</a>, <a href="https://www.govtech.com/education/k-12/new-jersey-hit-by-cyber-attacks-on-schools-hospitals">New Jersey</a>, and <a href="https://www.govtech.com/education/k-12/cyber-attack-takes-richland-wash-schools-offline">Washington state</a>. The smallest school districts are often the most vulnerable because of a lack of resources or capacity. Sometimes, the person responsible for cybersecurity does so in addition to another primary role, whether as a teacher, coach or administrator.</p>
    <div>
      <h3>We are proud of our impact, but we can do more</h3>
      <a href="#we-are-proud-of-our-impact-but-we-can-do-more">
        
      </a>
    </div>
    <p>There are about 14,000 school districts in the United States, and about 9,800 of them have fewer than 2,500 students. All 9,800 of those small public school districts are eligible for Project Cybersafe Schools (for free, and with no time limit – see below for all the details), and we want to help as many as possible. We are proud of the number of school districts that we have onboarded since August 2023, but it is not enough. We want to do more, and we can onboard more school districts by getting the word out about Project Cybersafe Schools. When we <a href="https://blog.cloudflare.com/project-cybersafe-schools-update">published an update </a>in December 2023 encouraging school districts to sign up before the holiday break, we saw a noticeable bump in the number of inquiries from eligible school districts. If you work at a small school district in the United States, we encourage you to see if you qualify for this program.</p><p>Nearly 30 states have school districts now enrolled in Project Cybersafe Schools, representing every region of the country. Since we launched the program, we have onboarded nearly 120 qualifying school districts. As a result, more than 160,000 students, teachers, and staff are protected by Cloudflare’s <a href="https://www.cloudflare.com/zero-trust/products/email-security/">cloud email security</a> to protect against a broad spectrum of threats including <a href="https://www.cloudflare.com/learning/email-security/business-email-compromise-bec/">Business Email Compromise</a>, multichannel phishing, credential harvesting, and other targeted attacks. These school districts are also receiving protection against Internet threats with DNS filtering by preventing users from reaching unwanted or harmful online content like ransomware or phishing sites.</p>
    <div>
      <h3>Attacks prevented by Project Cybersafe Schools in 2024</h3>
      <a href="#attacks-prevented-by-project-cybersafe-schools-in-2024">
        
      </a>
    </div>
    <p>When the White House launched its National Cybersecurity Strategy in March 2023, Acting National Cyber Director <a href="https://www.whitehouse.gov/oncd/briefing-room/2023/03/02/national-cybersecurity-strategy-launch-remarks-acting-national-cyber-director-kemba-walden/">Kemba Walden noted in her remarks</a> that “<i>we expect school districts to go toe-to-toe with transnational criminal organizations largely by themselves. This isn’t just unfair; it’s ineffective.</i>” Cloudflare agrees, and this is one of the reasons we launched Project Cybersafe Schools after conversations with officials from the <a href="https://www.cisa.gov/">Cybersecurity &amp; Infrastructure Security Agency (CISA)</a>, the <a href="https://www.ed.gov/">Department of Education</a>, and the <a href="https://www.whitehouse.gov/">White House</a> about how we could help to protect small school districts in the United States from cyber threats.</p><p>Year to date, Cloudflare’s cloud email security solution has identified and blocked more than 2 million malicious emails targeting the school districts enrolled in Project Cybersafe Schools. This represents roughly 3.5% of their total email traffic, though certain school districts are attacked at a far higher rate. In one district, malicious emails blocked by Cloudflare represented more than 15% of all email traffic.</p><p>Another challenge facing these schools is the large volume of spam emails sent their way. While some of this spam is promotional and not overtly malicious, it can often be used in a variety of attacks. Project Cybersafe Schools has prevented more than 2.2 million spam emails from clogging the inboxes of the school districts who have enrolled.</p><p><a href="https://www.cisa.gov/shields-guidance-families">According to CISA</a>, more than 90% of all cyber attacks begin with a phishing email. So helping these school districts secure their email inboxes is a critical factor in reducing their cyber risk. With email providing a relatively high success rate for gaining initial access, it’s no surprise that attackers continue to exploit email users with increasingly sophisticated and evasive techniques that bypass native security controls. And the consequences of these attacks can be severe: ​​Recovery time can extend from two all the way up to nine months – that’s almost an entire school year.</p>
    <div>
      <h3>Here’s what a few Project Cybersafe Schools participants have to say about the impact of the program on their school district:</h3>
      <a href="#heres-what-a-few-project-cybersafe-schools-participants-have-to-say-about-the-impact-of-the-program-on-their-school-district">
        
      </a>
    </div>
    <blockquote><p>“<i>What Cloudflare's Project Cybersafe Schools has allowed us to do as a rural district is add a missing layer of protection to our devices, providing a previously missing and unique layer of security even off our secure network. Where other options would cost us somewhere in the thousands, we are now able to secure devices for free using one of the simplest and scalable platforms, featuring one of the easiest learning curves I've worked with. Cloudflare's feature set as a whole for districts are unparalleled and integration is a must for schools looking to add an additional layer of protection to their network architecture, which by my estimation should be everyone.</i>” - <b>Wyatt Determan</b>, Technology Specialist (HLWW Public School District, Minnesota)</p></blockquote><blockquote><p><i>“Since implementing the Cybersafe Schools program as our secure email gateway, we've saved over $5,000 per year compared to similar solutions. The program has effectively filtered out numerous malicious emails, greatly enhancing our security posture. Its seamless integration and user-friendly interface make it easy for our IT team to manage. Cybersafe Schools has become a critical part of our IT infrastructure, ensuring a safe and secure educational environment.” </i>- <b>Paul Strout</b>, Network Manager (Regional School Unit RSU71, Belfast, Maine)</p></blockquote>
    <div>
      <h3>What Zero Trust services are available?</h3>
      <a href="#what-zero-trust-services-are-available">
        
      </a>
    </div>
    <p>Eligible K-12 public school districts in the United States have access to a package of <a href="https://www.cloudflare.com/zero-trust/solutions/">enterprise-level Zero Trust cybersecurity services</a> <i>for free and with no time limit </i>– there is no catch and no underlying obligations. Eligible organizations will benefit from:</p><ul><li><p>Email Protection: Safeguards inboxes with cloud email security by protecting against a broad spectrum of threats including malware-less Business Email Compromise, multichannel phishing, credential harvesting, and other targeted attacks.</p></li><li><p>DNS Filtering: Protects against Internet threats with DNS filtering by preventing users from reaching unwanted or harmful online content like ransomware or phishing sites and can be deployed to comply with the Children’s Internet Protection Act (CIPA).</p></li></ul>
    <div>
      <h3>Who can apply?</h3>
      <a href="#who-can-apply">
        
      </a>
    </div>
    <p>To be eligible, Project Cybersafe Schools participants must be:</p><ul><li><p>K-12 public school districts located in the United States</p></li><li><p>Up to 2,500 students in the district</p></li></ul><p>If you think your school district may be eligible, we welcome you to contact us to learn more. Please <a href="https://www.cloudflare.com/lp/cybersafe-schools/">fill out the form today</a>.</p><p>For schools or school districts that do not qualify for Project Cybersafe Schools, Cloudflare has other packages available with educational pricing. If you do not qualify for Project Cybersafe Schools, but are interested in our educational services, please contact us at k-12@cloudflare.com.</p> ]]></content:encoded>
            <category><![CDATA[USA]]></category>
            <category><![CDATA[Education]]></category>
            <category><![CDATA[Email]]></category>
            <category><![CDATA[DNS Filtering]]></category>
            <category><![CDATA[Cloudflare Area 1]]></category>
            <category><![CDATA[Policy & Legal]]></category>
            <guid isPermaLink="false">2ixCItIthHYFuckkX3DMb0</guid>
            <dc:creator>Zaid Zaid</dc:creator>
            <dc:creator>Caroline Hendrickson</dc:creator>
            <dc:creator>Ryan Kiernan</dc:creator>
        </item>
        <item>
            <title><![CDATA[How Cloudflare Cloud Email Security protects against the evolving threat of QR phishing]]></title>
            <link>https://blog.cloudflare.com/how-cloudflare-cloud-email-security-protects-against-the-evolving-threat-of-qr-phishing/</link>
            <pubDate>Wed, 17 Apr 2024 13:00:44 GMT</pubDate>
            <description><![CDATA[ Learn about how Cloudflare's Cloud Email Security tackles QR phishing, why attackers favor QR codes, and Cloudflare's proactive defense strategy against evolving threats ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/vqiqKMC9TcbN2grgE4JNX/bde05e055953c24da09e4bf4f0194324/image12-1.png" />
            
            </figure><p>In the ever-evolving landscape of cyber threats, a subtle yet potent form of phishing has emerged — <a href="https://www.cloudflare.com/learning/security/what-is-quishing/">quishing</a>, short for QR phishing. It has been <a href="https://www.microsoft.com/en-us/microsoft-365-life-hacks/privacy-and-safety/brief-history-qr-codes">30 years since the invention of QR codes</a>, yet quishing still poses a significant risk, especially after the era of COVID, when QR codes became the norm to check statuses, register for events, and even order food.</p><p>Since 2020, <a href="https://developers.cloudflare.com/email-security/">Cloudflare’s cloud email security solution (previously known as Area 1)</a> has been at the forefront of fighting against quishing attacks, taking a proactive stance in dissecting them to better protect our customers. Let’s delve into the mechanisms behind QR phishing, explore why QR codes are a preferred tool for attackers, and review how Cloudflare contributes to the fight against this evolving threat.</p>
    <div>
      <h2>How quishing works</h2>
      <a href="#how-quishing-works">
        
      </a>
    </div>
    <p>The impact of phishing and quishing are quite similar, as both can result in users having their credentials compromised, devices compromised, or even financial loss. They also leverage malicious attachments or websites to provide bad actors the ability to access something they normally wouldn’t be able to. Where they differ is that quishing is typically highly targeted and uses a QR code to further obfuscate itself from detection.</p><p>Since phish detection engines require inputs like URLs or attachments inside an email in order to detect, quish succeeds by hampering the detection of these inputs. In Example A below, the phish’s URL was crawled and after two redirects landed on a malicious website that automatically tries to run key logging malware that copies login names and passwords. For Example A, this clearly sets off the detectors, but Example B has no link to crawl and therefore the same detections that worked on Example A are rendered inert.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1jABZ5PmTIPdOp78Kaq5ZH/e9c93303b5187c80a31d7a41901e1f85/Screenshot-2024-04-16-at-13.33.49.png" />
            
            </figure><p>Strange you say, if my phone can scan that QR code then can’t a detection engine recognize the QR code as well? Simply put, no, because phish detection engines are optimized for catching phish, but to identify and scan QR codes requires a completely different engine – a computer vision engine. This brings us to why QR codes are a preferred tool for attackers.</p>
    <div>
      <h2>Why QR codes for phishing?</h2>
      <a href="#why-qr-codes-for-phishing">
        
      </a>
    </div>
    <p>There are three main reasons QR codes are popular in <a href="https://www.cloudflare.com/learning/access-management/phishing-attack/">phishing attacks</a>. First, QR codes boast strong error correction capabilities, allowing them to withstand resizing, pixel shifting, variations in lighting, partial cropping, and other distortions. Indeed, computer vision models can scan QR codes, but identifying which section of an email, image, or webpage linked in an email has a QR code is quite difficult for a machine, and even more so if the QR codes have been obfuscated to hide themselves from some computer vision models. For example, by inverting them, blending them with other colors or images, or making them extremely small, computer vision models will have trouble even identifying the presence of QR codes, much less even being able to scan them. Though filters and additional processing can be applied to any image, not knowing what or where to apply makes the deobfuscation of a QR code an extremely expensive computational problem. This not only makes catching all quish hard, but is likely to cause frustration for an end user who won’t get their emails quickly because an image or blob of text looks similar to a QR code, resulting in delivery delays.</p><p>Even though computer vision models may have difficulty deobfuscating QR codes, we have discovered from experience that when a human encounters these obfuscated QR codes, with enough time and effort, they are usually able to scan the QR code. By doing everything from increasing the brightness of their screen, to printing out the email, to resizing the codes themselves, they can make a QR code that has been hidden from machines scan successfully.</p><p><i>Don’t believe us? Try it for yourself with the QR codes that have been obfuscated for machines. They all link to</i> <a href="/"><i>https://blog.cloudflare.com/</i></a></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1q4lolcNSXKWznwHGZMIFh/5e43d3d517b9c7eedf5afe6a9f5b11c3/Screenshot-2024-04-16-at-13.35.32.png" />
            
            </figure><p><i>(</i><a href="https://www.freepik.com/free-photo/old-textured-brick-wall-background_18998169.htm#query=brick%20wall&amp;position=0&amp;from_view=keyword&amp;track=ais&amp;uuid=5fc175de-b992-4443-aad7-730f83770fbb"><i>Brick wall image by rawpixel.com on Freepik</i></a><i>)</i></p><p>If you scanned any of the example QR codes above, you have just proven the next reason bad actors favor quish. The devices used for accessing QR codes are typically personal devices with a limited security posture, making them susceptible to exploitation. While secured corporate devices typically have measures to warn, stop, or sandbox users when they access malicious links, these protections are not available natively on personal devices. This can be especially worrisome, as we have seen a trend towards custom QR codes targeting executives in organizations.</p><p>QR codes can also be seamlessly layered in with other obfuscation techniques, such as encrypted attachments, mirrors that mimic well-known websites, validations to prove you are human before malicious content is revealed, and more. This versatility makes them an attractive choice for cybercriminals seeking innovative ways to deceive unsuspecting users by adding QR codes to previously successful phishing vectors that have now been blocked by security products.</p>
    <div>
      <h2>Cloudflare's protection strategy</h2>
      <a href="#cloudflares-protection-strategy">
        
      </a>
    </div>
    <p>Cloudflare has been at the forefront of defending against quishing attacks. We employ a multi-faceted approach, and instead of focusing on archaic, layered email configuration rules, we have trained our machine learning (ML) detection models on almost a decade’s worth of detection data and have a swath of proactive computer vision models to ensure all of our customers start with a turnkey solution.</p><p>For quish detections, we break it into two parts: 1) identification and scanning of QR codes 2) analysis of decoded QR codes.</p><p>The first part is solved by our own QR code detection heuristics that inform how, when, and where for our computer vision models to execute. We then leverage the newest libraries and tools to help identify, process, and most importantly decode QR codes. While it is relatively easy for a human to identify a QR code, there is almost no limit to how many ways they can be obfuscated to machines. The examples we provided above are just a small sample of what we’ve seen in the wild, and bad actors are constantly discovering new methods to make QR codes hard to quickly find and identify, making it a constant cat and mouse game that requires us to regularly update our tools for the trending obfuscation technique.</p><p>The second part, analysis of decoded QR codes, goes through all the same treatment we apply to phish and then some. We have engines that deconstruct complex URLs and drill down to the final URL, from redirect to redirect, whether they are automatic or not. Along the way, we scan for malicious attachments and malicious websites and log findings for future detections to cross-reference. If we encounter any files or content that are encrypted or password protected, we leverage another group of engines that attempt to decrypt and unprotect them, so we can identify if there was any obfuscated malicious content. Most importantly, with all of this information, we continuously update our databases with this new data, including the obfuscation of the QR code, to make better assessments of similar attacks that leverage the methods we have documented.</p><p>However, even with a well-trained suite of phish detection tools, quite often the malicious content is at the end of a long chain of redirects that prevent automated web crawlers from identifying anything at all, much less malicious content. In between redirects, there might be a hard block that requires human validation, such as a <a href="https://www.cloudflare.com/learning/bots/how-captchas-work/">CAPTCHA</a>, which makes it virtually impossible for an automated process to crawl past, and therefore unable to classify any content at all. Or there might be a conditional block with campaign identification requirements, so if anyone is outside the original target’s region or has a web browser and operating system version that doesn’t meet the campaign requirements, they would simply view a benign website, while the target would be exposed to the malicious content. Over the years, we have built tools to identify and pass these validations, so we can determine malicious content that may be there.</p><p>However, even with all the technologies we’ve built over the years, there are cases where we aren’t able to easily get to the final content. In those cases, our link reputation machine learning models, which have been trained on multiple years of scanned links and their metadata, have proven to be quite valuable and are easily applied after QR codes are decoded as well. By correlating things like domain metadata, URL structure, URL query strings, and our own historical data sets, we are able to make inferences to protect our customers. We also take a proactive approach and leverage our ML models to tell us where to hunt for QR codes, even if they aren’t immediately obvious, and by scrutinizing domains, sentiment, context, IP addresses, historical use, and social patterns between senders and recipients, Cloudflare identifies and neutralizes potential threats before they can inflict harm.</p>
    <div>
      <h2>Creative examples and real world instances</h2>
      <a href="#creative-examples-and-real-world-instances">
        
      </a>
    </div>
    <p>With the thousands of QR codes we process daily, we see some interesting trends. Notable companies, including Microsoft and DocuSign, have frequently been the subjects of impersonation for quishing attacks. What makes this more confusing for users, and even more likely to scam them, is that these companies actually use QR codes in their legitimate workflows. This further underscores the urgency for organizations to fortify their defenses against this evolving threat.</p><p>Below are three examples of the most interesting quish we have found and compared against the real use cases by the respective companies. The QR codes used in these emails have been masked.</p>
    <div>
      <h3>Microsoft Authenticator</h3>
      <a href="#microsoft-authenticator">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/26vhSfHns8YkKs1DtB1p9n/3b39f16fb2feeab377679ad1466f5084/Screenshot-2024-04-16-at-13.37.12.png" />
            
            </figure><p>Microsoft uses QR codes as a faster way to complete <a href="https://www.cloudflare.com/learning/access-management/what-is-multi-factor-authentication/">MFA</a> instead of sending six digit SMS codes to users’ phones that can be delayed and are also considered safer, as SMS MFA can be intercepted through SIM swap attacks. Users would have independently registered their devices and would have previously seen the registration screen on the right, so receiving an email that says they need to re-authenticate doesn’t seem especially odd.</p>
    <div>
      <h3>DocuSign</h3>
      <a href="#docusign">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/167XX59i4v1Im47dNhjxUm/adc13cc6a4aba177c1d009e18567ad30/Screenshot-2024-04-16-at-13.38.14.png" />
            
            </figure><p>DocuSign uses QR codes to make it easier for users to download their mobile app tosign documents, <a href="https://support.docusign.com/s/document-item?language=en_US&amp;bundleId=ced1643229641057&amp;topicId=iww1578456547699.html&amp;_LANG=enus">identity verification</a> via a mobile device to take photos, and supports embedding DocuSign features in <a href="https://support.docusign.com/s/document-item?language=en_US&amp;rsc_301=&amp;bundleId=yca1573855023892&amp;topicId=xhc1615577299246.html&amp;_LANG=enus">third party apps</a> which have their own QR code scanning functionality. The use of QR codes in native DocuSign apps and non-native apps makes it confusing for frequent DocuSign users and not at all peculiar for users that rarely use DocuSign. While the QR code for downloading the DocuSign app is not used in signature requests, to a frequent user, it might just seem like a fast method to open the request in the app they already have downloaded on their mobile device.</p>
    <div>
      <h3>Microsoft Teams</h3>
      <a href="#microsoft-teams">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7j7KenKXtrmjJlNnHBPy2O/40cc68d61e198e8181fa4ccf6f12ecb4/Screenshot-2024-04-16-at-13.38.53.png" />
            
            </figure><p>Microsoft uses QR codes for Teams to allow users to quickly join a team via a mobile device, and while Teams doesn’t use QR codes for voicemails, it does have a voicemail feature. The email on the left seems like a reminder to check voicemail in Teams and combines the two real use cases on the right.</p>
    <div>
      <h2>How you can help prevent quishing</h2>
      <a href="#how-you-can-help-prevent-quishing">
        
      </a>
    </div>
    <p>As we confront the persistent threat of quishing, it's crucial for individuals and organizations to be vigilant.  While no solution can guarantee 100% protection, collective diligence can significantly reduce the risk, and we encourage collaboration in the fight against quishing.</p><p>If you are already a Cloud Email Security customer, we remind you to <a href="https://developers.cloudflare.com/email-security/email-configuration/phish-submissions/">submit instances</a> of quish from within our portal to help stop current threats and enhance the capabilities of future machine learning models, leading to more proactive defense strategies. If you aren’t a customer, you can still submit original quish samples as an attachment in <a href="https://docs.fileformat.com/email/eml/">EML</a> format to <a href="#">quish@cloudflare.com</a>, and remember to leverage your email security provider’s submission process to inform them of these quishing vectors as well.</p><p>The battle against quishing is ongoing, requiring continuous innovation and collaboration. To support submissions of quish, we are developing new methods for customers to provide targeted feedback to our models and also adding additional transparency to our metrics to facilitate tracking a variety of vectors, including quish.</p> ]]></content:encoded>
            <category><![CDATA[Cloud Email Security]]></category>
            <category><![CDATA[Email Security]]></category>
            <category><![CDATA[Email]]></category>
            <category><![CDATA[Phishing]]></category>
            <guid isPermaLink="false">4U4At0ve95ZFEqtwjjVm10</guid>
            <dc:creator>Pete Pang</dc:creator>
        </item>
        <item>
            <title><![CDATA[From .com to .beauty: The evolving threat landscape of unwanted email]]></title>
            <link>https://blog.cloudflare.com/top-level-domains-email-phishing-threats/</link>
            <pubDate>Tue, 26 Mar 2024 13:00:20 GMT</pubDate>
            <description><![CDATA[ In this 2023-early 2024 email analysis, we examine how certain generic Top-Level Domains (TLDs) are primarily used for spam and phishing, and their evolution over a year. ]]></description>
            <content:encoded><![CDATA[ 
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6llbY6RiwuM9hAX813Fkc3/6ec382a3027d32f79b6e0cbda61647d9/A-Highest-email-threat-Top-Level-Domains.png" />
            
            </figure><p>You're browsing your inbox and spot an email that looks like it's from a brand you trust. Yet, something feels off. This might be a phishing attempt, a common tactic where cybercriminals impersonate reputable entities — we've written about the <a href="/50-most-impersonated-brands-protect-phishing">top 50 most impersonated brands</a> used in phishing attacks. One factor that can be used to help evaluate the email's legitimacy is its Top-Level Domain (<a href="https://www.cloudflare.com/learning/dns/top-level-domain/">TLD</a>) — the part of the email address that comes after the dot.</p><p>In this analysis, we focus on the TLDs responsible for a significant share of malicious or spam emails since January 2023. For the purposes of this blog post, we are considering malicious email messages to be equivalent to phishing attempts. With an average of 9% of 2023's emails processed by Cloudflare’s Cloud Email Security service marked as spam and 3% as malicious, rising to 4% by year-end, we aim to identify trends and signal which TLDs have become more dubious over time. Keep in mind that our measurements represent where we observe data across the email delivery flow. In some cases, we may be observing after initial filtering has taken place, at a point where missed classifications are likely to cause more damage. This information derived from this analysis could serve as a guide for Internet users, corporations, and geeks like us, searching for clues, as Internet detectives, in identifying potential threats. To make this data readily accessible, <a href="https://radar.cloudflare.com/">Cloudflare Radar</a>, our tool for Internet insights, now <a href="/email-security-insights-on-cloudflare-radar">includes a new section</a> dedicated to email security trends.</p><p>Cyber attacks often leverage the guise of authenticity, a tactic <a href="/2022-07-sms-phishing-attacks">Cloudflare thwarted</a> following a phishing scheme similar to the one that compromised Twilio in 2022. The US Cybersecurity and Infrastructure Security Agency (<a href="https://www.cisa.gov/stopransomware/general-information">CISA</a>) notes that 90% of cyber attacks start with phishing, and fabricating trust is a key component of successful malicious attacks. We see there are two forms of authenticity that attackers can choose to leverage when crafting phishing messages, visual and organizational. Attacks that leverage visual authenticity rely on attackers using branding elements, like logos or images, to build credibility. Organizationally authentic campaigns rely on attackers using previously established relationships and business dynamics to establish trust and be successful.</p><p>Our findings from 2023 reveal that recently introduced generic TLDs (<a href="https://icannwiki.org/Generic_top-level_domain">gTLDs</a>), including several linked to the <a href="https://www.prnewswire.com/news-releases/domain-makeovers-begin-with-beauty-hair-skin-and-makeup-301182816.html">beauty industry</a>, are predominantly used both for spam and malicious attacks. These TLDs, such as .uno, .sbs, and .beauty, all introduced since 2014, have seen over 95% of their emails flagged as spam or malicious. Also, it's important to note that in terms of volume, “.com” accounts for 67% of all spam and malicious emails (more on that below).</p><table><colgroup><col></col><col></col><col></col><col></col><col></col><col></col><col></col><col></col><col></col><col></col><col></col></colgroup><tbody><tr><td><p><span>TLDs</span></p></td><td><p><span>2023 Spam %</span></p></td><td><p><span>2023 Malicious %</span></p></td><td><p><span>2023 Spam + malicious %</span></p></td><td><p><span>TLD creation</span></p></td></tr><tr><td><p><span>.uno</span></p></td><td><p><span>62%</span></p></td><td><p><span>37%</span></p></td><td><p><span>99%</span></p></td><td><p><span>2014</span></p></td></tr><tr><td><p><span>.sbs</span></p></td><td><p><span>64%</span></p></td><td><p><span>35%</span></p></td><td><p><span>98%</span></p></td><td><p><span>2021</span></p></td></tr><tr><td><p><span>.best</span></p></td><td><p><span>68%</span></p></td><td><p><span>29%</span></p></td><td><p><span>97%</span></p></td><td><p><span>2014</span></p></td></tr><tr><td><p><span>.beauty</span></p></td><td><p><span>77%</span></p></td><td><p><span>20%</span></p></td><td><p><span>97%</span></p></td><td><p><span>2021</span></p></td></tr><tr><td><p><span>.top</span></p></td><td><p><span>74%</span></p></td><td><p><span>23%</span></p></td><td><p><span>97%</span></p></td><td><p><span>2014</span></p></td></tr><tr><td><p><span>.hair</span></p></td><td><p><span>78%</span></p></td><td><p><span>18%</span></p></td><td><p><span>97%</span></p></td><td><p><span>2021</span></p></td></tr><tr><td><p><span>.monster</span></p></td><td><p><span>80%</span></p></td><td><p><span>17%</span></p></td><td><p><span>96%</span></p></td><td><p><span>2019</span></p></td></tr><tr><td><p><span>.cyou</span></p></td><td><p><span>34%</span></p></td><td><p><span>62%</span></p></td><td><p><span>96%</span></p></td><td><p><span>2020</span></p></td></tr><tr><td><p><span>.wiki</span></p></td><td><p><span>69%</span></p></td><td><p><span>26%</span></p></td><td><p><span>95%</span></p></td><td><p><span>2014</span></p></td></tr><tr><td><p><span>.makeup</span></p></td><td><p><span>32%</span></p></td><td><p><span>63%</span></p></td><td><p><span>95%</span></p></td><td><p><span>2021</span></p></td></tr></tbody></table>
    <div>
      <h2>Email and Top-Level Domains history</h2>
      <a href="#email-and-top-level-domains-history">
        
      </a>
    </div>
    <p>In 1971, <a href="https://web.archive.org/web/20140209064041/http://openmap.bbn.com/~tomlinso/ray/firstemailframe.html">Ray Tomlinson</a> sent the first networked email over <a href="https://en.wikipedia.org/wiki/ARPANET">ARPANET</a>, using the @ character in the address. Five decades later, email remains relevant but also a key entry point for attackers.</p><p>Before the advent of the World Wide Web, email standardization and growth in the 1980s, especially within academia and military communities, led to interoperability. Fast forward 40 years, and this interoperability is once again a hot topic, with platforms like Threads, Mastodon, and other social media services aiming for the open communication that Jack Dorsey envisioned for Twitter. So, in 2024, it's clear that social media, messaging apps like Slack, Teams, Google Chat, and others haven't killed email, just as “video didn’t kill the <a href="https://en.wikipedia.org/wiki/Video_Killed_the_Radio_Star">radio star</a>.”</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3ASRLNx8eaExAQ0EPDrJPi/f27726ec53a5697eb9d58202828837b9/blogcfcom.png" />
            
            </figure><p>The structure of a domain name.</p><p>The domain name system, managed by ICANN, encompasses a variety of TLDs, from the classic “.<a href="https://en.wikipedia.org/wiki/.com">com</a>” (1985) to the newer generic options. There are also the country-specific (<a href="https://en.wikipedia.org/wiki/Country_code_top-level_domain">ccTLDs</a>), where the Internet Assigned Numbers Authority (<a href="https://en.wikipedia.org/wiki/Internet_Assigned_Numbers_Authority">IANA</a>) <a href="https://icannwiki.org/Country_code_top-level_domain#ccTLDs_and_ICANN">is responsible</a> for determining an appropriate trustee for each ccTLD. An extensive 2014 expansion by <a href="https://newgtlds.icann.org/en/about">ICANN</a> was designed to "increase competition and choice in the domain name space," introducing numerous new options for specific professional, business, and informational purposes, which in turn, also opened up new possibilities for phishing attempts.</p>
    <div>
      <h2>3.4 billion unwanted emails</h2>
      <a href="#3-4-billion-unwanted-emails">
        
      </a>
    </div>
    <p>Cloudflare’s <a href="https://www.cloudflare.com/zero-trust/products/email-security/">Cloud Email Security</a> service is helping protect our customers, and that also comes with insights. In 2022, Cloudflare blocked 2.4 billion unwanted emails, and in 2023 that number rose to over 3.4 billion unwanted emails, 26% of all messages processed. This total includes spam, malicious, and "<a href="https://en.wikipedia.org/wiki/Bulk_email_software">bulk</a>" (practice of sending a single email message, unsolicited or solicited, to a large number of recipients simultaneously) emails. That means an average of 9.3 million per day, 6500 per minute, 108 per second.</p><p>Bear in mind that new customers also make the numbers grow — in this case, driving a 42% increase in unwanted emails from 2022 to 2023. But this gives a sense of scale in this email area. Those unwanted emails can include malicious attacks that are difficult to detect, becoming more frequent, and can have devastating consequences for individuals and businesses that fall victim to them. Below, we’ll give more details on email threats, where malicious messages account for almost 3% of emails averaged across all of 2023 and it shows a growth tendency during the year, with higher percentages in the last months of the year. Let's take a closer look.</p>
    <div>
      <h2>Top phishing TLDs (and types of TLDs)</h2>
      <a href="#top-phishing-tlds-and-types-of-tlds">
        
      </a>
    </div>
    <p>First, let’s start with an 2023 overview of <a href="https://www.cloudflare.com/learning/dns/top-level-domain/">top level domains</a> with a high percentage of spam and malicious messages. Despite excluding TLDs with fewer than 20,000 emails, our analysis covers unwanted emails considered to be spam and malicious from more than 350 different TLDs (and yes, there are <a href="https://www.iana.org/domains/root/db">many more</a>).</p><p>A quick overview highlights the TLDs with the highest rates of spam and malicious attacks as a proportion of their outbound email, those with the largest volume share of spam or malicious emails, and those with the highest rates of just-malicious and just-spam TLD senders. It reveals that newer TLDs, especially those associated with the beauty industry (generally <a href="https://www.prnewswire.com/news-releases/domain-makeovers-begin-with-beauty-hair-skin-and-makeup-301182816.html">available since 2021 and serving a booming industry</a>), have the highest rates as a proportion of their emails. However, it's relevant to recognize that “.com” accounts for 67% of all spam and malicious emails. Malicious emails often originate from recently created generic TLDs like “.bar”, “.makeup”, or “.cyou”, as well as certain country-code TLDs (ccTLDs) employed beyond their geographical implications.</p><p></p><p>Focusing on volume share, “.com” dominates the spam + malicious list at 67%, and is joined in the top 3 by another “classic” gTLD, “.net”, at 4%. They also lead by volume when we look separately at the malicious (68% of all malicious emails are “.com” and “.net”) and spam (71%) categories, as shown below. All of the generic TLDs introduced since 2014 represent 13.4% of spam and malicious and over 14% of only malicious emails. These new TLDs (most of them are only available since 2016) are notable sources of both spam and malicious messages. Meanwhile, country-code TLDs contribute to more than 12% of both categories of unwanted emails.</p><p>This breakdown highlights the critical role of both established and new generic TLDs, which surpass older ccTLDs in terms of malicious emails, pointing to the changing dynamics of email-based threats.</p><table><colgroup><col></col><col></col><col></col><col></col></colgroup><tbody><tr><td><p><span>Type of TLDs</span></p></td><td><p><span>Spam</span></p></td><td><p><span>Malicious </span></p></td><td><p><span>Spam + malicious</span></p></td></tr><tr><td><p><span>ccTLDs</span></p></td><td><p><span>13%</span></p></td><td><p><span>12%</span></p></td><td><p><span>12%</span></p></td></tr><tr><td><p><span>.com and .net only</span></p></td><td><p><span>71%</span></p></td><td><p><span>68%</span></p></td><td><p><span>71%</span></p></td></tr><tr><td><p><span>new gTLDs </span></p></td><td><p><span>13%</span></p></td><td><p><span>14%</span></p></td><td><p><span>13.4%</span></p></td></tr></tbody></table><p>That said, “.shop” deserves a highlight of its own. The TLD, which has been available <a href="https://en.wikipedia.org/wiki/.shop">since 2016</a>, is #2 by volume of spam and malicious emails, accounting for 5% of all of those emails. It also represents, when we separate those two categories, 5% of all malicious emails, and 5% of all spam emails. As we’re going to see below, its influence is growing.</p>
    <div>
      <h2>Full 2023 top 50 spam &amp; malicious TLDs list</h2>
      <a href="#full-2023-top-50-spam-malicious-tlds-list">
        
      </a>
    </div>
    <p>For a more detailed perspective, below we present the top 50 TLDs with the highest percentages of spam and malicious emails during 2023. We also include a breakdown of those two categories.</p><p>It’s noticeable that even outside the top 10, other recent generic TLDs are also higher in the ranking, such as “.autos” (the #1 in the spam list), “.today”, “.bid” or “.cam”. TLDs that seem to promise entertainment or fun or are just leisure or recreational related (including “.fun” itself), occupy a position in our top 50 ranking.</p><p></p>
    <div>
      <h2>Change in spam &amp; malicious TLD patterns</h2>
      <a href="#change-in-spam-malicious-tld-patterns">
        
      </a>
    </div>
    <p>Let's look at TLDs where spam + malicious emails comprised the largest share of total messages from that TLD, and how that list of TLDs changed from the first half of 2023 to the second half. This shows which TLDs were most problematic at different times during the year.</p><p>Highlighted in <b>bold</b> in the following table are those TLDs that climbed in the rankings for the percentage of spam and malicious emails from July to December 2023, compared with January to June. Generic TLDs “.uno”, “.makeup” and “.directory” appeared in the top list and in higher positions for the first time in the last six months of the year.</p><p></p><p>From the rankings, it's clear that the recent generic TLDs have the highest spam and malicious percentage of all emails. The top 10 TLDs in both halves of 2023 are all recent and generic, with several introduced since 2021.</p><p>Reasons for the prominence of these gTLDs include the availability of <a href="https://www.cloudflare.com/learning/dns/glossary/what-is-a-domain-name/">domain names</a> that can seem legitimate or mimic well-known brands, as we explain in this <a href="/50-most-impersonated-brands-protect-phishing">blog post</a>. Cybercriminals often use popular or catchy words. Some gTLDs allow anonymous registration. Their low cost and the delay in updated security systems to recognize new gTLDs as spam and malicious sources also play a role — note that, as we’ve seen, cyber criminals also like to change TLDs and methods.</p>
    <div>
      <h2>The impact of a lawsuit?</h2>
      <a href="#the-impact-of-a-lawsuit">
        
      </a>
    </div>
    <p>There's also been a change in the types of domains with the highest malicious percentage in 2023, possibly due to Meta's <a href="https://krebsonsecurity.com/2023/05/phishing-domains-tanked-after-meta-sued-freenom/?cf_target_id=C13ADC4DD499FF8D0CEE849D9B49B413">lawsuit</a> against Freenom, filed in December 2022 and refiled in March 2023. Freenom provided domain name registry services for free in five ccTLDs, which wound up being used for purposes beyond local businesses or content: “.cf” (Central African Republic), “.ga” (Gabon), “.gq” (Equatorial Guinea), “.ml” (Mali), and “.tk” (Tokelau). However, Freenom <a href="https://www.netcraft.com/blog/impact-of-freenom-halting-registrations-on-cybercrime/">stopped</a> new registrations during 2023 following the lawsuit, and in February 2024, <a href="https://web.archive.org/web/20240213203456/https://www.freenom.com/en/freenom_pressstatement_02122024_v0100.pdf">announced</a> its decision to exit the domain name business.</p><p>Focusing on Freenom TLDs, which appeared in our top 50 ranking only in the first half of 2023, we see a clear shift. Since October, these TLDs have become less relevant in terms of all emails, including malicious and spam percentages. In February 2023, they accounted for 0.17% of all malicious emails we tracked, and 0.04% of all spam and malicious. Their presence has decreased since then, becoming almost non-existent in email volume in September and October, similar to <a href="https://krebsonsecurity.com/2023/05/phishing-domains-tanked-after-meta-sued-freenom/">other analyses</a>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3MTEAWpk1xTLb2KbcFi20I/21cd4c1ef1b10d4ae2af4fb5cb0b6e56/Screenshot-2024-03-26-at-10.22.18.png" />
            
            </figure>
    <div>
      <h2>TLDs ordered by volume of spam + malicious</h2>
      <a href="#tlds-ordered-by-volume-of-spam-malicious">
        
      </a>
    </div>
    <p>In addition to looking at their share, another way to examine the data is to identify the TLDs that have a higher volume of spam and malicious emails — the next table is ordered that way. This means that we are able to show more familiar (and much older) TLDs, such as “.com”. We've included here the percentage of all emails in any given TLD that are classified as spam or malicious, and also spam + malicious to spotlight those that may require more caution. For instance, with high volume “.shop”, “.no”, “.click”, “.beauty”, “.top”, “.monster”, “.autos”, and “.today” stand out with a higher spam and malicious percentage (and also only malicious email percentage).</p><p>In the realm of country-code TLDs, Norway’s “.no” leads in spam, followed by China’s “.cn”, Russia’s “.ru”, Ukraine’s “.ua”, and Anguilla’s “<a href="https://www.cloudflare.com/application-services/products/registrar/buy-ai-domains/">.ai</a>”, which recently has been used more for artificial intelligence-related domains than for the country itself.</p><p>In <b>bold</b> and <b>red</b>, we’ve highlighted the TLDs where spam + malicious represents more than 20% of all emails in that TLD — already what we consider a high number for domains with a lot of emails.</p><p></p>
    <div>
      <h2>The curious case of “.gov” email spoofing</h2>
      <a href="#the-curious-case-of-gov-email-spoofing">
        
      </a>
    </div>
    <p>When we concentrate our research on message volume to identify TLDs with more malicious emails blocked by our Cloud Email Security service, we discover a trend related to “.gov”.</p><table><colgroup><col></col><col></col></colgroup><tbody><tr><td><p><span>TLDs ordered by malicious email volume</span></p></td><td><p><span>% of all malicious emails</span></p></td></tr><tr><td><p><span>.com</span></p></td><td><p><span>63%</span></p></td></tr><tr><td><p><span>.net</span></p></td><td><p><span>5%</span></p></td></tr><tr><td><p><span>.shop</span></p></td><td><p><span>5%</span></p></td></tr><tr><td><p><span>.org</span></p></td><td><p><span>3%</span></p></td></tr><tr><td><p><span>.gov</span></p></td><td><p><span>2%</span></p></td></tr><tr><td><p><span>.ru</span></p></td><td><p><span>2%</span></p></td></tr><tr><td><p><span>.jp</span></p></td><td><p><span>2%</span></p></td></tr><tr><td><p><span>.click</span></p></td><td><p><span>1%</span></p></td></tr><tr><td><p><span>.best</span></p></td><td><p><span>0.9%</span></p></td></tr><tr><td><p><span>.beauty</span></p></td><td><p><span>0.8%</span></p></td></tr></tbody></table><p>The first three domains, ".com" (63%), ".net" (5%), and ".shop" (5%), were previously seen in our rankings and are not surprising. However, in fourth place is "<a href="https://www.cloudflare.com/application-services/products/registrar/buy-org-domains/">.org</a>", known for being used by non-profit and other similar organizations, but it has an open registration policy. In fifth place is ".gov", used only by the US government and administered by <a href="https://en.wikipedia.org/wiki/Cybersecurity_and_Infrastructure_Security_Agency">CISA</a>. Our investigation suggests that it appears in the ranking because of typical attacks where cybercriminals pretend to be a legitimate address (<a href="https://www.cloudflare.com/learning/email-security/what-is-email-spoofing/">email spoofing</a>, creation of email messages with a forged sender address). In this case, they use ".gov" when launching attacks.</p><p>The spoofing behavior linked to ".gov" is similar to that of other TLDs. It includes fake senders failing <a href="https://www.cloudflare.com/learning/dns/dns-records/dns-spf-record/">SPF validation</a> and other DNS-based authentication methods, along with various other types of attacks. An email failing SPF, <a href="https://www.cloudflare.com/learning/dns/dns-records/dns-dkim-record/">DKIM</a>, and <a href="https://www.cloudflare.com/learning/dns/dns-records/dns-dmarc-record/">DMARC</a> checks typically indicates that a malicious sender is using an unauthorized IP, domain, or both. So, there are more straightforward ways to block spoofed emails without examining their content for malicious elements.</p>
    <div>
      <h2>Ranking TLDs by proportions of malicious and spam email in 2023</h2>
      <a href="#ranking-tlds-by-proportions-of-malicious-and-spam-email-in-2023">
        
      </a>
    </div>
    <p>In this section, we have included two lists: one ranks TLDs by the highest percentage of malicious emails — those you should exercise greater caution with; the second ranks TLDs by just their spam percentage. These contrast with the previous top 50 list ordered by combined spam and malicious percentages. In the case of malicious emails, the top 3 with the highest percentage are all generic TLDs. The #1 was “.bar”, with 70% of all emails being categorized as malicious, followed by “.makeup”, and “.cyou” — marketed as the phrase "see you”.</p><p>The malicious list also includes some country-code TLDs (ccTLDs) not primarily used for country-related topics, like .ml (Mali), .om (Oman), and .pw (Palau). The list also includes other ccTLDs such as .ir (Iran) and .kg (Kyrgyzstan), .lk (Sri Lanka).</p><p>In the spam realm, it’s “autos”, with 93%, and other generic TLDs such as “.today”, and “.directory” that take the first three spots, also seeing shares over 90%.</p><p></p>
    <div>
      <h2>How it stands in 2024: new higher-risk TLDs</h2>
      <a href="#how-it-stands-in-2024-new-higher-risk-tlds">
        
      </a>
    </div>
    <p>2024 has seen new players enter the high-risk zone for unwanted emails. In this list we have only included the new TLDs that weren’t in the top 50 during 2023, and joined the list in January. New entrants include Samoa's “.ws”, Indonesia's “.id” (also used because of its “identification” meaning), and the Cocos Islands' “.cc”. These ccTLDs, often used for more than just country-related purposes, have shown high percentages of malicious emails, ranging from 20% (.cc) to 95% (.ws) of all emails.</p><table><colgroup><col></col><col></col><col></col><col></col></colgroup><tbody><tr><td><p><span>January 2024: Newer TLDs in the top 50 list</span></p></td></tr><tr><td><p><span>TLD</span></p></td><td><p><span>Spam %</span></p></td><td><p><span>Malicious %</span></p></td><td><p><span>Spam + mal %</span></p></td></tr><tr><td><p><span>.ws</span></p></td><td><p><span>3%</span></p></td><td><p><span>95%</span></p></td><td><p><span>98%</span></p></td></tr><tr><td><p><span>.company</span></p></td><td><p><span>96%</span></p></td><td><p><span>0%</span></p></td><td><p><span>96%</span></p></td></tr><tr><td><p><span>.digital</span></p></td><td><p><span>72%</span></p></td><td><p><span>2%</span></p></td><td><p><span>74%</span></p></td></tr><tr><td><p><span>.pro</span></p></td><td><p><span>66%</span></p></td><td><p><span>6%</span></p></td><td><p><span>73%</span></p></td></tr><tr><td><p><span>.tz</span></p></td><td><p><span>62%</span></p></td><td><p><span>4%</span></p></td><td><p><span>65%</span></p></td></tr><tr><td><p><span>.id</span></p></td><td><p><span>13%</span></p></td><td><p><span>39%</span></p></td><td><p><span>51%</span></p></td></tr><tr><td><p><span>.cc</span></p></td><td><p><span>25%</span></p></td><td><p><span>21%</span></p></td><td><p><span>46%</span></p></td></tr><tr><td><p><span>.space</span></p></td><td><p><span>32%</span></p></td><td><p><span>8%</span></p></td><td><p><span>40%</span></p></td></tr><tr><td><p><span>.enterprises</span></p></td><td><p><span>2%</span></p></td><td><p><span>37%</span></p></td><td><p><span>40%</span></p></td></tr><tr><td><p><span>.lv</span></p></td><td><p><span>30%</span></p></td><td><p><span>1%</span></p></td><td><p><span>30%</span></p></td></tr><tr><td><p><span>.cn</span></p></td><td><p><span>26%</span></p></td><td><p><span>3%</span></p></td><td><p><span>29%</span></p></td></tr><tr><td><p><span>.jo</span></p></td><td><p><span>27%</span></p></td><td><p><span>1%</span></p></td><td><p><span>28%</span></p></td></tr><tr><td><p><span>.info</span></p></td><td><p><span>21%</span></p></td><td><p><span>5%</span></p></td><td><p><span>26%</span></p></td></tr><tr><td><p><span>.su</span></p></td><td><p><span>20%</span></p></td><td><p><span>5%</span></p></td><td><p><span>25%</span></p></td></tr><tr><td><p><span>.ua</span></p></td><td><p><span>23%</span></p></td><td><p><span>1%</span></p></td><td><p><span>24%</span></p></td></tr><tr><td><p><span>.museum</span></p></td><td><p><span>0%</span></p></td><td><p><span>24%</span></p></td><td><p><span>24%</span></p></td></tr><tr><td><p><span>.biz</span></p></td><td><p><span>16%</span></p></td><td><p><span>7%</span></p></td><td><p><span>24%</span></p></td></tr><tr><td><p><span>.se</span></p></td><td><p><span>23%</span></p></td><td><p><span>0%</span></p></td><td><p><span>23%</span></p></td></tr><tr><td><p><span>.ai</span></p></td><td><p><span>21%</span></p></td><td><p><span>0%</span></p></td><td><p><span>21%</span></p></td></tr></tbody></table>
    <div>
      <h2>Overview of email threat trends since 2023</h2>
      <a href="#overview-of-email-threat-trends-since-2023">
        
      </a>
    </div>
    <p>With Cloudflare's Cloud Email Security, we gain insight into the broader email landscape over the past months. The <b>spam</b> percentage of all emails stood at <b>8.58%</b> in 2023. As mentioned before, keep in mind with these percentages that our protection typically kicks in after other email providers’ filters have already removed some spam and malicious emails.</p><p>How about malicious emails? Almost <b>3%</b> of all emails were flagged as <b>malicious</b> during 2023, with the highest percentages occurring in Q4. Here’s the “malicious” evolution, where we’re also including the January and February 2024 perspective:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4B6rev8c7oe4xZyNsMTcAK/93446b6b094f59606df5b0ab6b6de154/maliciousbymonth.png" />
            
            </figure><p>The week before Christmas and the first week of 2024 experienced a significant spike in malicious emails, reaching an average of 7% and 8% across the weeks, respectively. Not surprisingly, there was a noticeable decrease during Christmas week, when it dropped to 3%. Other significant increases in the percentage of malicious emails were observed the week before Valentine's Day, the first week of September (coinciding with returns to work and school in the Northern Hemisphere), and late October.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3RhyfKbvE1oa2Qu906JIHw/fce0efe7a85203ce6d3480b100bdaddb/weeklymalicious.png" />
            
            </figure>
    <div>
      <h2>Threat categories in 2023</h2>
      <a href="#threat-categories-in-2023">
        
      </a>
    </div>
    <p>We can also look to different types of threats in 2023. Links were present in 49% of all threats. Other categories included extortion (36%), identity deception (27%), credential harvesting (23%), and brand impersonation (18%). These categories are defined and explored in detail in Cloudflare's <a href="/2023-phishing-report/">2023 phishing threats report</a>. Extortion saw the most growth in Q4, especially in November and December reaching 38% from 7% of all threats in Q1 2023.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6icrLcHPdHqa4ooH79l7Wx/500f69ca538ce0f6fdcbb651e2655315/malthreat.png" />
            
            </figure>
    <div>
      <h2>Other trends: Attachments are still popular</h2>
      <a href="#other-trends-attachments-are-still-popular">
        
      </a>
    </div>
    <p>Other less “threatening” trends show that 20% of all emails included attachments (as the next chart shows), while 82% contained links in the body. Additionally, 31% were composed in plain text, and 18% featured HTML, which allows for enhanced formatting and visuals. 39% of all emails used remote content.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/12eXy3zGva3fMxQo0GKqKw/3b06faebc6cec5b6e5dd95ff38cd67c7/emailcharact.png" />
            
            </figure>
    <div>
      <h2>Conclusion: Be cautious, prepared, safe</h2>
      <a href="#conclusion-be-cautious-prepared-safe">
        
      </a>
    </div>
    <p>The landscape of spam and malicious (or phishing) emails constantly evolves alongside technology, the Internet, user behaviors, use cases, and cybercriminals. As we’ve seen through <a href="https://www.cloudflare.com/zero-trust/products/email-security/">Cloudflare’s Cloud Email Security insights</a>, new generic TLDs have emerged as preferred channels for these malicious activities, highlighting the need for vigilance when dealing with emails from unfamiliar domains.</p><p>There's no shortage of advice on <a href="/stay-safe-phishing-attacks">staying safe from phishing</a>. Email remains a ubiquitous yet highly exploited tool in daily business operations. Cybercriminals often bait users into clicking malicious links within emails, a tactic used by both sophisticated criminal organizations and novice attackers. So, always exercise caution online.</p><p>Cloudflare's Cloud Email Security provides insights that underscore the importance of robust cybersecurity infrastructure in fighting the dynamic tactics of phishing attacks.</p><p>If you want to learn more about email security, you can check <a href="https://radar.cloudflare.com/email-security">Cloudflare Radar’s new email section</a>, visit our <a href="https://www.cloudflare.com/learning/email-security/what-is-email-security/">Learning Center</a> or reach out for a complimentary phishing <a href="https://www.cloudflare.com/lp/emailsecurity/">risk assessment</a> for your organization.</p><p><i>(Contributors to this blog post include Jeremy Eckman, Phil Syme, and Oren Falkowitz.)</i></p> ]]></content:encoded>
            <category><![CDATA[Email]]></category>
            <category><![CDATA[Cloud Email Security]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[Phishing]]></category>
            <guid isPermaLink="false">3Hx7frhlsXSPEICR3DLVtJ</guid>
            <dc:creator>João Tomé</dc:creator>
        </item>
        <item>
            <title><![CDATA[Launching email security insights on Cloudflare Radar]]></title>
            <link>https://blog.cloudflare.com/email-security-insights-on-cloudflare-radar/</link>
            <pubDate>Fri, 08 Mar 2024 14:00:58 GMT</pubDate>
            <description><![CDATA[ The new Email Security section on Cloudflare Radar provides insights into the latest trends around threats found in malicious email, sources of spam and malicious email, and the adoption of technologies designed to prevent abuse of email ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/67tt8jiqO9RDouWNc2IuIg/97e9e9233a7b20d7e134c0bc8083a014/image2-28.png" />
            
            </figure><p>During 2021's Birthday Week, we <a href="/introducing-email-routing">announced</a> our <a href="https://www.cloudflare.com/learning/email-security/what-is-email-routing/">Email Routing</a> service, which allows users to direct different types of email messages (such as marketing, transactional, or administrative) to separate accounts based on criteria such as the recipient’s address or department. Its capabilities and the volume of messages routed have <a href="/email-routing-subdomains">grown significantly</a> since launch.</p><p>Just a few months later, on February 23, 2022, we announced our intent to acquire Area 1 Security to protect users from phishing attacks in email, web, and network environments. Since the completion of the acquisition on April 1, 2022, Area 1's email security capabilities have been integrated into Cloudflare's <a href="https://www.cloudflare.com/learning/access-management/what-is-sase/">secure access service edge (SASE)</a> solution portfolio, and now processes tens of millions of messages daily.</p><p>Processing millions of email messages each day on behalf of our customers gives us a unique perspective on the threats posed by malicious emails, spam volume, the adoption of <a href="https://www.cloudflare.com/learning/email-security/dmarc-dkim-spf/">email authentication methods like SPF, DMARC, and DKIM</a>, and the use of IPv4/IPv6 and TLS by email servers. Today, we are launching a new <a href="https://radar.cloudflare.com/email-security">Email Security section</a> on <a href="https://radar.cloudflare.com/">Cloudflare Radar</a> to share these perspectives with you. The insights in this new section can help you better understand the state of email security as viewed across various metrics, as well as understanding real-time trends in email-borne threats. (For instance, correlating an observed increase within your organization in messages containing malicious links with a similar increase observed by Cloudflare.) Below, we review the new metrics that are now available on Radar.</p>
    <div>
      <h3>Tracking malicious email</h3>
      <a href="#tracking-malicious-email">
        
      </a>
    </div>
    <p>As Cloudflare’s <a href="https://www.cloudflare.com/zero-trust/products/email-security/">email security</a> service processes email messages on behalf of customers, we are able to identify and classify offending messages as malicious. As examples, malicious emails may attempt to trick recipients into sharing personal information like login details, or the messages could attempt to spread malware through embedded images, links, or attachments. The new Email Security section on Cloudflare Radar now <a href="https://radar.cloudflare.com/email-security">provides insight</a> at a global level into the aggregate share of processed messages that we have classified as malicious over the selected timeframe. During <a href="https://radar.cloudflare.com/email-security?dateStart=2024-02-01&amp;dateEnd=2024-02-29">February 2024</a>, as shown in the figure below, we found that an average of 2.1% of messages were classified as being malicious. Spikes in malicious email volume were seen on February 10 and 11, accounting for as much as 29% of messages. These spikes occurred just ahead of the Super Bowl, in line with <a href="/super-bowl-lviii">previous observations</a> of increases in malicious email volume in the week ahead of the game. Other notable (but lower) spikes were seen on February 13, 15, 17, 24, and 25. The <a href="https://developers.cloudflare.com/api/operations/radar-get-email-security-summary-by-malicious">summary</a> and <a href="https://developers.cloudflare.com/api/operations/radar-get-email-security-timeseries-group-by-malicious">time series</a> data for malicious email share are available through the Radar API.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/39j34s8TPPt3cQj6j2ZTsF/73ec05c40f900a2c6f6ca37817fc2574/pasted-image-0-6.png" />
            
            </figure>
    <div>
      <h3>Threat categorization</h3>
      <a href="#threat-categorization">
        
      </a>
    </div>
    <p>The <a href="https://radar.cloudflare.com/year-in-review/2023#top-email-threats">Cloudflare Radar 2023 Year in Review</a> highlighted some of the techniques used by attackers when carrying out attacks using malicious email messages. As noted above, these can include links or attachments leading to malware, as well as approaches like identity deception, where the message appears to be coming from a trusted contact, and brand impersonation, where the message appears to be coming from a trusted brand. In analyzing malicious email messages, Cloudflare’s <a href="https://www.cloudflare.com/zero-trust/solutions/email-security-services/">email security service</a> categorizes the threats that it finds these messages contain. (Note that a single message can contain multiple types of threats — the sender could be impersonating a trusted contact while the body of the email contains a link leading to a fake login page.)</p><p>Based on these assessments, Cloudflare Radar now <a href="https://radar.cloudflare.com/email-security#malicious-email-threat-categories">provides insights</a> into trends observed across several different groups of threat types including “Attachment”, “Link”, “Impersonation”, and “Other”. “Attachment” groups individual threat types where the attacker has attached a file to the email message, “Link” groups individual threat types where the attacker is trying to get the user to click on something, and “Impersonation” groups individual threat types where the attacker is impersonating a trusted brand or contact. The “Other” grouping includes other threat types not covered by the previous three.</p><p>During February 2024 for the “Link” grouping, as the figure below illustrates, link-based threats were unsurprisingly the most common, and were found in 58% of malicious emails. Since the display text for a link (i.e., hypertext) in HTML can be arbitrarily set, attackers can make a URL appear as if it links to a benign site when, in fact, it is actually malicious. Nearly a third of malicious emails linked to something designed to harvest user credentials. The <a href="https://developers.cloudflare.com/api/operations/radar-get-email-security-summary-by-threat-category">summary</a> and <a href="https://developers.cloudflare.com/api/operations/radar-get-email-security-timeseries-group-by-threat-category">time series</a> data for these threat categories are available through the Radar API.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5ZVsVPQccuYKQjUpKcOoEq/88456640a317da1779b6867a77acdc64/pasted-image-0--1--3.png" />
            
            </figure><p>For the “Attachment” grouping, during February 2024, nearly 13% of messages were found to have a malicious attachment that when opened or executed in the context of an attack, includes a call-to-action (e.g. lures target to click a link) or performs a series of actions set by an attacker. The share spiked several times throughout the month, reaching as high as 70%. The attachments in nearly 6% of messages attempted to download additional software (presumably malware) once opened.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7Akp5aqpIDDj99BdAsZ82C/f6dcf92dde82ff1fc72d58788b11240d/pasted-image-0--2--2.png" />
            
            </figure><p>If an email message appears to be coming from a trusted brand, users may be more likely to open it and take action, like checking the shipping status of a package or reviewing a financial transaction. During February 2024, on average, over a quarter of malicious emails were sent by attackers attempting to impersonate well-known brands. Similar to other threat categories, this one also saw a number of significant spikes, reaching as high as 88% of February 17. Just over 18% of messages were found to be trying to extort users in some fashion. It appears that such campaigns were very active in the week ahead of Valentine's Day (February 14), although the peak was seen on February 15, at over 95% of messages.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7H5mYJCU0Z2mWmY2zOoH7b/448feba0321f99e1079dc24db24e7911/Impersonation.png" />
            
            </figure><p>Identity deception occurs when an attacker or someone with malicious intent sends an email claiming to be someone else, whether through use of a similar-looking domain or display name manipulation. This was the top threat category for the “Other” grouping, seen in over 36% of malicious emails during February 2024. The figure below shows three apparent “waves” of the use of this technique — the first began at the start of the month, the second around February 9, and the third around February 20. Over 11% of messages were categorized as malicious because of the reputation of the network (<a href="https://www.cloudflare.com/learning/network-layer/what-is-an-autonomous-system/">autonomous system</a>) that they were sent from; some network providers are well-known sources of malicious and unwanted email.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3YFNUNtGqXHm2ORhNgIS0e/be2f047756c5bd6766c9336cb101d259/pasted-image-0--3--1.png" />
            
            </figure>
    <div>
      <h3>Dangerous domains</h3>
      <a href="#dangerous-domains">
        
      </a>
    </div>
    <p><a href="https://www.cloudflare.com/learning/dns/top-level-domain/">Top-level domains, also known as TLDs</a>, are found in the right-most portion of a hostname. For example, <code>radar.cloudflare.com</code> is in the <code>.com</code> <a href="https://icannwiki.org/Generic_top-level_domain">generic Top Level Domain (gTLD)</a>, while <code>bbc.co.uk</code> is in the <code>.uk</code> <a href="https://icannwiki.org/Country_code_top-level_domain">country code Top Level Domain (ccTLD)</a>. As of February 2024, there are nearly 1600 Top Level Domains listed in the <a href="https://www.iana.org/domains/root/db">IANA Root Zone Database</a>. Over the last 15 years or so, several reports have been published that look at the “most dangerous TLDs” — that is, which TLDs are most favored by threat actors. The “top” TLDs in these reports are often a mix of ccTLDs from smaller counties and <a href="https://icannwiki.org/All_New_gTLD_Applications">newer gTLDs</a>. On Radar, we are now sharing our own perspective on these dangerous TLDs, highlighting those where we have observed the largest shares of malicious and spam emails. The analysis is based on the sending domain’s TLD, found in the <code>From:</code> header of an email message. For example, if a message came from <code>joe@example.com</code>, then <code>example.com</code> is the sending domain, and <code>.com</code> is the associated TLD.</p><p>On Radar, users can view shares of spam and malicious email, and can also filter by timeframe and “type” of TLD, with options to view all (the complete list), ccTLDs (country codes), or “classic” TLDs (the original set of gTLDs specified in <a href="https://www.rfc-editor.org/rfc/rfc1591.txt">RFC 1591</a>). Note that spam percentages shown here may be lower than those published in other industry analyses. Cloudflare cloud email security customers may be performing initial spam filtering before messages arrive at Cloudflare for processing, resulting in a lower percentage of messages characterized as spam by Cloudflare.</p><p>Looking back across February 2024, we found that new gTLD <code>associates</code> and the ccTLD <code>zw</code> (Zimbabwe) were the TLDs with domains originating the largest shares of malicious email, at over 85% each. New TLDs <code>academy</code>, <code>directory</code>, and <code>bar</code> had the largest shares of spam in email sent by associated domains, at upwards of 95%.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2tvfVUvg028MjExbUn6DuB/bbe1206da0ba754aa03a41fcc87ab7f8/pasted-image-0--4-.png" />
            
            </figure><p><i>TLDs with the highest percentage of malicious email in February 2024</i></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1VeBDm1f5fYRJqZdq0ho3b/fa692e8a0ec2d3ec8970d838fdd7b0c0/pasted-image-0--5-.png" />
            
            </figure><p><i>TLDs with the highest percentage of spam email in February 2024</i></p><p>The figure below breaks out ccTLDs, where we found that at least half of the messages coming from domains in <code>zw</code> (Zimbabwe, at 85%) and <code>bd</code> (Bangladesh, at 50%) were classified as malicious. While the share of malicious email vastly outweighed the share of spam seen from <code>zw</code> domains, it was much more balanced in <code>bd</code> and <code>pw</code> (Palau). A total of 80 ccTLDs saw fewer than 1% of messages classified as malicious in February 2024.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6ngA84qYZiS1djPnyAN9K9/e7ddc092a349634b6a934ee4b8a5755e/pasted-image-0--6-.png" />
            
            </figure><p><i>ccTLDs with the highest percentage of malicious email in February 2024</i></p><p>Among the “classic” TLDs, we can see that the shares of both malicious emails and spam are relatively low. Perhaps unsurprisingly, as the largest TLD, <code>com</code> has the largest shares of both in February 2024. Given the restrictions around registering <a href="https://www.iana.org/domains/int"><code>int</code></a> and <a href="https://get.gov/domains/requirements/"><code>gov</code></a> domains, it is interesting to see that even 2% of the messages from associated domains are classified as malicious.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2iWhtYDtbuSikcDtmgGtn4/9c370938fe219018a75c13380ecb7ec7/pasted-image-0--7-.png" />
            
            </figure><p><i>Classic TLDs with the highest percentage of malicious email in February 2024.</i></p><p>The reasons that some TLDs are responsible for a greater share of malicious and/or spam email vary — some may have loose or non-existent registration requirements, some may be more friendly to so-called “<a href="https://icannwiki.org/Domain_tasting">domain tasting</a>”, and some may have particularly low domain registration fees.The <a href="https://developers.cloudflare.com/api/operations/radar-get-email-security-top-tlds-by-malicious">malicious</a> and <a href="https://developers.cloudflare.com/api/operations/radar-get-email-security-top-tlds-by-spam">spam</a> summary shares per TLD are available through the Radar API.</p>
    <div>
      <h3>Adoption of email authentication methods</h3>
      <a href="#adoption-of-email-authentication-methods">
        
      </a>
    </div>
    <p><a href="https://www.cloudflare.com/en-gb/learning/email-security/dmarc-dkim-spf/">SPF, DKIM, and DMARC</a> are three email <a href="https://www.cloudflare.com/learning/access-management/what-is-authentication/">authentication</a> methods and when used together, they help prevent spammers, <a href="https://www.cloudflare.com/learning/access-management/phishing-attack/">phishers</a>, and other unauthorized parties from sending <a href="https://www.cloudflare.com/learning/email-security/what-is-email/">emails</a> on behalf of a <a href="https://www.cloudflare.com/learning/dns/glossary/what-is-a-domain-name/">domain</a> they do not own.</p><p>Sender Policy Framework (SPF) is a way for a domain to list all the servers they send emails from, with <a href="https://www.cloudflare.com/learning/dns/dns-records/dns-spf-record/">SPF records</a> in the DNS listing the <a href="https://www.cloudflare.com/learning/dns/glossary/what-is-my-ip-address/">IP addresses</a> of all the servers that are allowed to send emails from the domain. Mail servers that receive an email message can check it against the SPF record before passing it on to the recipient's inbox. DomainKeys Identified Mail (DKIM) enables domain owners to automatically "sign" emails from their domain with a digital “signature” that uses cryptography to mathematically verify that the email came from the domain. Domain-based Message Authentication Reporting and Conformance (DMARC) tells a receiving email server what to do, given the results after checking SPF and DKIM. A domain's DMARC policy, stored in <a href="https://www.cloudflare.com/learning/dns/dns-records/dns-dmarc-record/">DMARC records</a>, can be set in a variety of ways, instructing mail servers to quarantine emails that fail SPF or DKIM (or both), to reject such emails, or to deliver them.</p><p>These authentication methods have recently taken on increased importance, as both <a href="https://blog.google/products/gmail/gmail-security-authentication-spam-protection/">Google</a> and <a href="https://blog.postmaster.yahooinc.com/post/730172167494483968/more-secure-less-spam">Yahoo!</a> have announced that during the first quarter of 2024, as part of a more aggressive effort to reduce spam, they will require bulk senders to follow <a href="https://senders.yahooinc.com/best-practices/">best practices</a> that include implementing stronger email authentication using standards like SPF, DKIM, and DMARC. When a given email message is evaluated against these three methods, the potential outcomes are PASS, FAIL, and NONE. The first two are self-explanatory, while NONE means that there was no associated SPF/DKIM/DMARC policy associated with the message’s sending domain.</p><p>Reviewing the average shares across February 2024, we find that over 93% of messages passed SPF authentication, while just 2.7% failed. When considering this metric, FAIL is the outcome of greater interest because SPF is easier to spoof than DKIM, and also because failure may be driven by “shadow IT” situations, such as when a company’s Marketing department uses a third party to send email on behalf of the company, but fails to add that third party to the associated SPF records. An average of 88.5% of messages passed DKIM evaluation in February, while just 2.1% failed. For DKIM, the focus should be on PASS, as there are potential non-malicious reasons that a given signature may fail to verify. For DMARC, 86.5% of messages passed authentication, while 4.2% failed, and the combination of PASS and FAIL is the focus, as the presence of an associated policy is of greatest interest for this metric, and whether the message passed or failed less so. For all three methods in this section, NONE indicates the lack of an associated policy. SPF (<a href="https://developers.cloudflare.com/api/operations/radar-get-email-security-summary-by-spf">summary</a>, <a href="https://developers.cloudflare.com/api/operations/radar-get-email-security-timeseries-group-by-spf">time series</a>), DKIM (<a href="https://developers.cloudflare.com/api/operations/radar-get-email-security-summary-by-dkim">summary</a>, <a href="https://developers.cloudflare.com/api/operations/radar-get-email-security-timeseries-group-by-dkim">time series</a>), and DMARC (<a href="https://developers.cloudflare.com/api/operations/radar-get-email-security-summary-by-dmarc">summary</a>, <a href="https://developers.cloudflare.com/api/operations/radar-get-email-security-timeseries-group-by-dmarc">time series</a>) data is available through the Radar API.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7D1Kfig1lHwIgoEJ3XGx8i/9ceba12b2bff559d648382e53e0412d2/Screenshot-2024-03-08-at-12.51.49.png" />
            
            </figure>
    <div>
      <h3>Protocol usage</h3>
      <a href="#protocol-usage">
        
      </a>
    </div>
    <p>Cloudflare has <a href="/introducing-cloudflares-automatic-ipv6-gatewa/">long evangelized IPv6 adoption</a>, although it has largely been focused on making Web resources available via this <a href="https://datatracker.ietf.org/doc/html/rfc2460">not-so-new version</a> of the protocol. However, it’s also important that other Internet services begin to support and use IPv6, and this is an area where <a href="/ipv6-from-dns-pov/">our recent research</a> shows that providers may be lacking.</p><p>Through analysis of inbound connections from senders’ mail servers to Cloudflare’s email servers, we can gain insight into the distribution of these connections across IPv4 and IPv6. Looking at this distribution for February 2024, we find that 95% of connections were made over IPv4, while only 5% used IPv6. This distribution is in sharp contrast to the share of IPv6 requests for IPv6-capable (dual stacked) Web content, which was 37% <a href="https://radar.cloudflare.com/adoption-and-usage?dateStart=2024-02-01&amp;dateEnd=2024-02-29#i-pv4-vs-i-pv6">for the same time period</a>. The <a href="https://developers.cloudflare.com/api/operations/radar-get-email-routing-summary-by-ip-version">summary</a> and <a href="https://developers.cloudflare.com/api/operations/radar-get-email-routing-timeseries-group-by-ip-version">time series</a> data for IPv4/v6 distribution are available through the Radar API.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2BLLzGXJ18q7LFhuRteSmG/762a81b2a5a590a69c6efd6cf0e02f02/Screenshot-2024-03-08-at-12.52.26.png" />
            
            </figure><p>Cloudflare has also been a long-time advocate for secure connections, launching <a href="/introducing-universal-ssl/">Universal SSL</a> during 2014’s Birthday Week, to enable secure connections between end users and Cloudflare for all of our customers’ sites (which numbered ~2 million at the time). Over the last 10 years, SSL has completed its evolution to <a href="https://www.cloudflare.com/learning/ssl/transport-layer-security-tls/">TLS</a>, and although many think of TLS as only being relevant for Web content, possibly due to years of being told to look for the 🔒 padlock in our browser’s address bar, TLS is also used to encrypt client/server connections across other protocols including SMTP (email), FTP (file transfer), and XMPP (messaging).</p><p>Similar to the IPv4/v6 analysis discussed above, we can also calculate the share of inbound connections to Cloudflare’s email servers that are using TLS. Messages are encrypted in transit when the connection is made over TLS, while messages sent over unencrypted connections can potentially be read or modified in transit. Fortunately, the vast majority of messages received by Cloudflare’s email servers are made over encrypted connections, with just 6% sent unencrypted during February 2024. The <a href="https://developers.cloudflare.com/api/operations/radar-get-email-security-summary-by-tls-version">summary</a> and <a href="https://developers.cloudflare.com/api/operations/radar-get-email-security-timeseries-group-by-tls-version">time series</a> data for TLS usage are available through the Radar API.</p>
    <div>
      <h3>Conclusion</h3>
      <a href="#conclusion">
        
      </a>
    </div>
    <p>Although younger Internet users may eschew email in favor of communicating through a variety of messaging apps, email remains an absolutely essential Internet service, relied on by individuals, enterprises, online and offline retailers, governments, and more. However, because email is so ubiquitous, important, and inexpensive, it has also become an attractive threat vector. Cloudflare’s email <a href="https://www.cloudflare.com/developer-platform/email-routing/">routing</a> and <a href="https://www.cloudflare.com/zero-trust/products/email-security/">security</a> services help customers manage and secure their email, and Cloudflare Radar’s new <a href="https://radar.cloudflare.com/email-security">Email Security section</a> can help security researchers, email administrators, and other interested parties understand the latest trends around threats found in malicious email, sources of spam and malicious email, and the adoption of technologies designed to prevent abuse of email.</p><p>If you have any questions about this new section, you can contact the Cloudflare Radar team at <a href="#">radar@cloudflare.com</a> or on social media at <a href="https://twitter.com/CloudflareRadar">@CloudflareRadar</a> (X/Twitter), <a href="https://noc.social/@cloudflareradar">https://noc.social/@cloudflareradar</a> (Mastodon), and <a href="https://bsky.app/profile/radar.cloudflare.com">radar.cloudflare.com</a> (Bluesky).</p><div>
  
</div><p>Tune in for more news, announcements and thought-provoking discussions! Don't miss the full <a href="https://cloudflare.tv/shows/security-week">Security Week hub page</a>.</p> ]]></content:encoded>
            <category><![CDATA[Security Week]]></category>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[Email]]></category>
            <category><![CDATA[Email Routing]]></category>
            <category><![CDATA[Email Security]]></category>
            <category><![CDATA[Trends]]></category>
            <guid isPermaLink="false">7oGmED46jTkj7AiKDzGujo</guid>
            <dc:creator>David Belson</dc:creator>
        </item>
        <item>
            <title><![CDATA[Don’t let the cyber grinch ruin your winter break: Project Cybersafe Schools protects small school districts in the US]]></title>
            <link>https://blog.cloudflare.com/project-cybersafe-schools-update/</link>
            <pubDate>Wed, 20 Dec 2023 14:00:29 GMT</pubDate>
            <description><![CDATA[ In August of this year, as part of the White House Back to School Safely: K-12 Cybersecurity Summit, Cloudflare announced Project Cybersafe Schools to help support eligible K-12 public school district ]]></description>
            <content:encoded><![CDATA[ <p></p><p>As the last school bell rings before winter break, one thing school districts should keep in mind is that during the winter break, schools can become particularly vulnerable to cyberattacks as the reduced staff presence and extended downtime create an environment conducive to security lapses. Criminal actors make their move when organizations are most vulnerable: on weekends and holiday breaks. With fewer personnel on-site, routine monitoring and response to potential threats may be delayed, providing cybercriminals with a window of opportunity. Schools store sensitive student and staff data, including personally identifiable information, financial records, and confidential academic information, and therefore consequences of a successful cyberattack can be severe. It is imperative that educational institutions implement robust cybersecurity measures to safeguard their digital infrastructure.</p><p>If you are a small public school district in the United States, <a href="https://www.cloudflare.com/lp/cybersafe-schools/">Project Cybersafe Schools</a> is here to help. Don’t let the Cyber Grinch ruin your winter break.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1U7h833WjChwk6tY4qOza/ba0fd833487355d80d9c31d25ec40c52/image5-2.png" />
            
            </figure>
    <div>
      <h3>The impact of Project Cybersafe Schools thus far</h3>
      <a href="#the-impact-of-project-cybersafe-schools-thus-far">
        
      </a>
    </div>
    <p>In August of this year, as part of the <a href="https://www.youtube.com/watch?v=GaH9oJdbQZk">White House Back to School Safely: K-12 Cybersecurity Summit</a>, Cloudflare <a href="/project-cybersafe-schools/">announced Project Cybersafe Schools</a> to help support eligible K-12 public school districts with a package of <a href="https://zerotrustroadmap.org/?cf_target_id=9D0D9715024EC6802A653B841FBBC860">Zero Trust</a> cybersecurity solutions — for free, and with no time limit.</p><p>The response from school districts across the United States exceeded our expectations. We have had inquiries from over 200 school districts in over 30 states and Guam. Over the past few months, we have onboarded dozens of qualifying school districts into the program. As a result, over 60,000 students, teachers, and staff are protected by Cloudflare’s <a href="https://www.cloudflare.com/zero-trust/products/email-security/?cf_target_id=F27626FB3FA2FE2BE5C18513C3FCCB88">cloud email security</a> to protect against a broad spectrum of threats including <a href="https://www.cloudflare.com/learning/email-security/business-email-compromise-bec/?cf_target_id=13C61B25F7EEBAD7E1E0FD911592C1F3">Business Email Compromise</a>, multichannel phishing, credential harvesting, and other targeted attacks. These school districts are also receiving protection against Internet threats with <a href="https://www.cloudflare.com/learning/access-management/what-is-dns-filtering/">DNS filtering</a> by preventing users from reaching unwanted or harmful online content like ransomware or phishing sites. There are more than 9,000 small public school districts across the United States with fewer than 2,500 students. All of those school districts are eligible for Project Cybersafe Schools (for free, and with no time limit — see below for all the details), and we want to help as many as possible.</p><p>Since we launched the program, the White House has <a href="https://apnews.com/article/cyberattacks-ransomware-k12-schools-white-house-a26e1fd2d7d3cad80cf16bad31a24548">continued to amplify</a> awareness around the risks for schools as well as the <a href="https://www.politico.com/newsletters/weekly-cybersecurity/2023/11/27/the-ndaa-is-around-the-corner-00128651">opportunities school districts</a> have to <a href="https://www.politico.com/newsletters/national-security-daily/2023/09/12/pacific-comes-together-right-now-over-china-and-north-korea-00115322">protect themselves</a>. Cloudflare hosted a series of live onboarding sessions at the start of the program and also created a <a href="https://lp.www.cloudflare.com/cybersafeschools">Cybersafe School Resource Hub</a> for school districts to learn more about the program and submit an inquiry.</p>
    <div>
      <h3>What our participants are saying about the program</h3>
      <a href="#what-our-participants-are-saying-about-the-program">
        
      </a>
    </div>
    <p>Here’s what a few Project Cybersafe Schools have to say about the impact of the program on small school districts.</p><blockquote><p><i>“Project Cybersafe Schools has been incredibly helpful, especially for school districts with smaller enrollments, to provide resources, tools and information that otherwise might be out of grasp. Often, these smaller districts have individuals with many responsibilities and cybersecurity may not always be at the forefront. The tools Cloudflare offers as part of the White House focus to strengthen Cybersecurity across the K-12 spectrum allow us greater visibility into the threats experienced through E-Mail as well as protect our devices by layering DNS-based filtering on top of our existing environment to protect against threats that may come through via ransomware or phishing sites. Being able to leverage multiple layers of security helps us be more robust in protecting our student and teacher devices and ensure our learning environment is successful, safe and productive in the current digital landscape.”</i>  - <b>Randy Saeks</b>, Network Manager, Glencoe School District 35, Glencoe, Illinois</p></blockquote>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5dQ7Xdzvx16X5rANaIBh2N/e2d321c81cd6ac14c6be6e8133e8b566/Screenshot-2023-12-20-at-11.47.17-1.png" />
            
            </figure><blockquote><p><i>“Quitman School District was excited to add another layer of security for our staff and students with Cloudflare Project Cybersafe Schools. Living in a low income, rural community, we were grateful for the opportunity to add a world-class free service to our school’s network architecture. Partnering with Cloudflare allowed us to continue to modernize and strengthen our security measures and protect our staff and students from a wide variety of threats. This implementation was quick and easy, and we were ecstatic that there was no expiration date for this service.  We were amazed to see that Cloudflare caught nearly 4,000 malicious emails in the first month of implementation!  We are confident that Cloudflare will continue to keep our district and infrastructure safe from harmful threats.”</i>- <b>Matt Champion</b>, Technology Coordinator, Quitman School District, Quitman, Mississippi</p></blockquote>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/10EcDa5vjeRpf6sM0eCdxR/c0af64a118e17657dd625ac5501d0584/Screenshot-2023-12-20-at-11.47.35.png" />
            
            </figure>
    <div>
      <h3>What Zero Trust services are available?</h3>
      <a href="#what-zero-trust-services-are-available">
        
      </a>
    </div>
    <p>Eligible K-12 public school districts in the United States will have access to a package of <a href="https://www.cloudflare.com/zero-trust/solutions/">enterprise-level Zero Trust cybersecurity services</a> <i>for free and with no time limit</i> – there is no catch and no underlying obligations. Eligible organizations will benefit from:</p><ul><li><p>Email Protection: Safeguards inboxes with cloud email security by protecting against a broad spectrum of threats including malware-less Business Email Compromise, multichannel phishing, credential harvesting, and other targeted attacks.</p></li><li><p>DNS Filtering: Protects against Internet threats with DNS filtering by preventing users from reaching unwanted or harmful online content like ransomware or phishing sites and can be deployed to comply with the Children’s Internet Protection Act (CIPA).</p></li></ul>
    <div>
      <h3>Who can apply?</h3>
      <a href="#who-can-apply">
        
      </a>
    </div>
    <p>To be eligible, Project Cybersafe Schools participants must be:</p><ul><li><p>K-12 public school districts located in the United States</p></li><li><p>Up to 2,500 students in the district</p></li></ul><p>If you think your school district may be eligible, we welcome you to contact us to learn more.  Please visit our <a href="https://lp.www.cloudflare.com/cybersafeschools">Project Cybersafe Schools Resource Hub</a>.</p><p>For schools or school districts that do not qualify for Project Cybersafe Schools, Cloudflare has other packages available with educational pricing. If you do not qualify for Project Cybersafe Schools, but are interested in our educational services, please contact us at <a href="#">k-12@cloudflare.com</a>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2pc5rlnlhjTviNkV9X9Dc6/01d39743153c6eaf21da5d0b98b457ba/image3.png" />
            
            </figure> ]]></content:encoded>
            <category><![CDATA[USA]]></category>
            <category><![CDATA[Education]]></category>
            <category><![CDATA[Email]]></category>
            <category><![CDATA[Area 1 Security]]></category>
            <category><![CDATA[DNS Filtering]]></category>
            <category><![CDATA[Policy & Legal]]></category>
            <guid isPermaLink="false">2mV4Mzs13oNZ60CUjSLjSc</guid>
            <dc:creator>Zaid Zaid</dc:creator>
        </item>
        <item>
            <title><![CDATA[Do hackers eat turkey? And other Thanksgiving Internet trends]]></title>
            <link>https://blog.cloudflare.com/do-hackers-eat-turkey-and-other-thanksgiving-internet-trends/</link>
            <pubDate>Fri, 24 Nov 2023 15:11:43 GMT</pubDate>
            <description><![CDATA[ Which US states logged off on Thanksgiving Day? Is there a difference between coastal and central states? Do hackers take a Thanksgiving break? Are food delivery services gaining or losing traffic? ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Thanksgiving is a tradition celebrated by millions of Americans across six time zones and 50 states, usually involving travel and bringing families together. This year, it was celebrated yesterday, on November 23, 2023. With the Internet so deeply enmeshed into our daily lives, anything that changes how so many people behave is going to also have an impact on online traffic. But how big an impact, exactly?</p><p>At a high level: a 10% daily decrease in Internet traffic in the US (compared to the previous week). That happens to be the exact same percentage decrease we observed in 2022. So, Thanksgiving in the US, at least in the realm of Internet traffic, seems consistent with last year.</p><p>Let’s dig into more details about how people deal with cooking (or online ordering!) and whether family gatherings are less online, according to our <a href="https://radar.cloudflare.com/us">Cloudflare Radar</a> data. We’ll also touch on whether hackers stop for turkey, too.</p>
    <div>
      <h3>The Thanksgiving hour: around 15:00 (local time)</h3>
      <a href="#the-thanksgiving-hour-around-15-00-local-time">
        
      </a>
    </div>
    <p>While we can see a 10% overall daily drop in US traffic due to Thanksgiving, the drop is even more noticeable when examining traffic on an hour-by-hour basis. Internet activity began to decrease significantly after 12:00 EST, persisting until 19:00 EST (during those times, it was at least 15% lower compared to the previous week).</p><p>The peak drop for the entire country occurred around 21:00 UTC, which is 16:00 EST and 13:00 PST. That drop represented 22% less traffic than the previous week at the same hour. That’s also the same time and percentage of drop we’ve seen in 2022.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5fwQCjshRGY08ZtfCJtLp9/e2e1c95b98be54d9d31256f63c00c9cb/Untitled.png" />
            
            </figure><p>If we continue the country-wide comparison with the previous week, we also see how traffic really begins to pick up again during early <a href="https://blog.cloudflare.com/the-truth-about-black-friday-and-cyber-monday/">Black Friday</a> morning in the US (as much as 18% higher than in the previous week).</p><p>However, it’s also interesting to do an analysis of state by state looking at local time. One question we were curious about: from an Internet perspective, what time best represents the Thanksgiving hour? This would be the time when traffic dropped the most in each state.</p><p>We find that across states, it’s not exactly 4pm, as <a href="https://www.theatlantic.com/family/archive/2018/11/when-thanksgiving-dinner/576274/">The Atlantic</a> has made a case for!, but rather, most states experience the largest drop the hour before — 15:00 local time. But that’s not the only interesting trend! We observe that:</p><ul><li><p>Central US states such as Kansas, Iowa, Alabama, or Mississippi apparently had <i>an earlier Thanksgiving</i> — given the biggest drop in traffic was at 13:00.</p></li><li><p>Coastal US states like Washington, California, Florida, Maryland, or Delaware had <i>a later Thanksgiving</i>, around 17:00. There’s also Hawaii, which had the latest of all — experiencing the biggest drop in traffic around 18:00 local time.</p></li></ul><p>What surprised us the most when looking at these trends was how the “Thanksgiving time” was the same from our 2022 data in almost all the states, but also the hourly and daily drop in traffic across the US was mostly the same. It appears that when it comes to Thanksgiving, we are indeed creatures of habit.</p>
    <div>
      <h3>The Thanksgiving effect: US states where traffic drop the most</h3>
      <a href="#the-thanksgiving-effect-us-states-where-traffic-drop-the-most">
        
      </a>
    </div>
    <p>To consider when traffic drops the most, we look between the local time of 13:00-18:00 and compare that to the week before.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6ogBlkHQSTgv063FiQSHEG/534b90747aadb81e3667c88809724e6c/Untitled--1-.png" />
            
            </figure><p>This method allows us to observe clear differences between states, with more central US states showing larger drops in traffic compared to the previous week, while coastal states are not as significantly impacted. The exception along the US coast is Massachusetts, which experienced a 31% drop in traffic. East coast states also show a bigger drop in traffic compared to the West coast.</p><p>Here’s the ranking of the 50 states (plus DC or the District of Columbia), ordered by the biggest drops in traffic, for those who want to explore our data better:</p>
<table>
<thead>
  <tr>
    <th><span>U.S. State</span></th>
    <th><span>Drop in traffic %</span></th>
    <th><span>Peak Internet traffic drop (local time)</span></th>
  </tr>
</thead>
<tbody>
  <tr>
    <td><span>North Dakota</span></td>
    <td><span>-36%</span></td>
    <td><span>15:00 (CST)</span></td>
  </tr>
  <tr>
    <td><span>South Dakota</span></td>
    <td><span>-35%</span></td>
    <td><span>14:00 (CST)</span></td>
  </tr>
  <tr>
    <td><span>Mississippi</span></td>
    <td><span>-33%</span></td>
    <td><span>13:00 (CST)</span></td>
  </tr>
  <tr>
    <td><span>District of Columbia</span></td>
    <td><span>-32%</span></td>
    <td><span>16:00 (EST)</span></td>
  </tr>
  <tr>
    <td><span>Oklahoma</span></td>
    <td><span>-32%</span></td>
    <td><span>14:00 (CST)</span></td>
  </tr>
  <tr>
    <td><span>Massachusetts</span></td>
    <td><span>-31%</span></td>
    <td><span>16:00 (EST)</span></td>
  </tr>
  <tr>
    <td><span>Arkansas</span></td>
    <td><span>-30%</span></td>
    <td><span>14:00 (CST)</span></td>
  </tr>
  <tr>
    <td><span>Rhode Island</span></td>
    <td><span>-30%</span></td>
    <td><span>16:00 (EST)</span></td>
  </tr>
  <tr>
    <td><span>Kansas</span></td>
    <td><span>-28%</span></td>
    <td><span>13:00 (CST)</span></td>
  </tr>
  <tr>
    <td><span>Connecticut</span></td>
    <td><span>-27%</span></td>
    <td><span>16:00 (EST)</span></td>
  </tr>
  <tr>
    <td><span>Idaho</span></td>
    <td><span>-27%</span></td>
    <td><span>16:00 (MST)</span></td>
  </tr>
  <tr>
    <td><span>New Hampshire</span></td>
    <td><span>-27%</span></td>
    <td><span>14:00 (EST)</span></td>
  </tr>
  <tr>
    <td><span>Colorado</span></td>
    <td><span>-26%</span></td>
    <td><span>16:00 (MST)</span></td>
  </tr>
  <tr>
    <td><span>Louisiana</span></td>
    <td><span>-25%</span></td>
    <td><span>14:00 (CST)</span></td>
  </tr>
  <tr>
    <td><span>Maine</span></td>
    <td><span>-25%</span></td>
    <td><span>15:00 (EST)</span></td>
  </tr>
  <tr>
    <td><span>New Mexico</span></td>
    <td><span>-25%</span></td>
    <td><span>14:00 (MST)</span></td>
  </tr>
  <tr>
    <td><span>Pennsylvania</span></td>
    <td><span>-25%</span></td>
    <td><span>16:00 (EST)</span></td>
  </tr>
  <tr>
    <td><span>Utah</span></td>
    <td><span>-25%</span></td>
    <td><span>15:00 (MST)</span></td>
  </tr>
  <tr>
    <td><span>Arizona</span></td>
    <td><span>-24%</span></td>
    <td><span>16:00 (MST)</span></td>
  </tr>
  <tr>
    <td><span>Missouri</span></td>
    <td><span>-24%</span></td>
    <td><span>15:00 (CST)</span></td>
  </tr>
  <tr>
    <td><span>Maryland</span></td>
    <td><span>-23%</span></td>
    <td><span>17:00 (EST)</span></td>
  </tr>
  <tr>
    <td><span>Georgia</span></td>
    <td><span>-22%</span></td>
    <td><span>16:00 (EST)</span></td>
  </tr>
  <tr>
    <td><span>Tennessee</span></td>
    <td><span>-22%</span></td>
    <td><span>14:00 (CST)</span></td>
  </tr>
  <tr>
    <td><span>Vermont</span></td>
    <td><span>-22%</span></td>
    <td><span>15:00 (EST)</span></td>
  </tr>
  <tr>
    <td><span>Delaware</span></td>
    <td><span>-21%</span></td>
    <td><span>17:00 (EST)</span></td>
  </tr>
  <tr>
    <td><span>Indiana</span></td>
    <td><span>-21%</span></td>
    <td><span>15:00 (EST)</span></td>
  </tr>
  <tr>
    <td><span>Minnesota</span></td>
    <td><span>-21%</span></td>
    <td><span>15:00 (CST)</span></td>
  </tr>
  <tr>
    <td><span>New York</span></td>
    <td><span>-21%</span></td>
    <td><span>16:00 (EST)</span></td>
  </tr>
  <tr>
    <td><span>Alaska</span></td>
    <td><span>-20%</span></td>
    <td><span>16:00 (AKST)</span></td>
  </tr>
  <tr>
    <td><span>Florida</span></td>
    <td><span>-20%</span></td>
    <td><span>17:00 (EST)</span></td>
  </tr>
  <tr>
    <td><span>Iowa</span></td>
    <td><span>-20%</span></td>
    <td><span>13:00 (CST)</span></td>
  </tr>
  <tr>
    <td><span>Kentucky</span></td>
    <td><span>-20%</span></td>
    <td><span>14:00 (EST)</span></td>
  </tr>
  <tr>
    <td><span>Michigan</span></td>
    <td><span>-20%</span></td>
    <td><span>16:00 (EST)</span></td>
  </tr>
  <tr>
    <td><span>North Carolina</span></td>
    <td><span>-20%</span></td>
    <td><span>16:00 (EST)</span></td>
  </tr>
  <tr>
    <td><span>Texas</span></td>
    <td><span>-20%</span></td>
    <td><span>15:00 (CST)</span></td>
  </tr>
  <tr>
    <td><span>Wisconsin</span></td>
    <td><span>-20%</span></td>
    <td><span>15:00 (CST)</span></td>
  </tr>
  <tr>
    <td><span>Alabama</span></td>
    <td><span>-19%</span></td>
    <td><span>13:00 (CST)</span></td>
  </tr>
  <tr>
    <td><span>Ohio</span></td>
    <td><span>-18%</span></td>
    <td><span>16:00 (EST)</span></td>
  </tr>
  <tr>
    <td><span>South Carolina</span></td>
    <td><span>-18%</span></td>
    <td><span>15:00 (EST)</span></td>
  </tr>
  <tr>
    <td><span>New Jersey</span></td>
    <td><span>-17%</span></td>
    <td><span>16:00 (EST)</span></td>
  </tr>
  <tr>
    <td><span>West Virginia</span></td>
    <td><span>-17%</span></td>
    <td><span>16:00 (EST)</span></td>
  </tr>
  <tr>
    <td><span>Illinois</span></td>
    <td><span>-16%</span></td>
    <td><span>16:00 (CST)</span></td>
  </tr>
  <tr>
    <td><span>Nebraska</span></td>
    <td><span>-16%</span></td>
    <td><span>15:00 (CST)</span></td>
  </tr>
  <tr>
    <td><span>Montana</span></td>
    <td><span>-15%</span></td>
    <td><span>16:00 (MST)</span></td>
  </tr>
  <tr>
    <td><span>Washington</span></td>
    <td><span>-15%</span></td>
    <td><span>17:00 (PST)</span></td>
  </tr>
  <tr>
    <td><span>California</span></td>
    <td><span>-14%</span></td>
    <td><span>17:00 (PST)</span></td>
  </tr>
  <tr>
    <td><span>Nevada</span></td>
    <td><span>-12%</span></td>
    <td><span>17:00 (PST)</span></td>
  </tr>
  <tr>
    <td><span>Oregon</span></td>
    <td><span>-12%</span></td>
    <td><span>15:00 (PST)</span></td>
  </tr>
  <tr>
    <td><span>Wyoming</span></td>
    <td><span>-10%</span></td>
    <td><span>16:00 (MST)</span></td>
  </tr>
  <tr>
    <td><span>Hawaii</span></td>
    <td><span>-9%</span></td>
    <td><span>18:00 (HST)</span></td>
  </tr>
  <tr>
    <td><span>Virginia</span></td>
    <td><span>-9%</span></td>
    <td><span>16:00 (EST)</span></td>
  </tr>
</tbody>
</table>
    <div>
      <h3>Mobile traffic percentage goes up</h3>
      <a href="#mobile-traffic-percentage-goes-up">
        
      </a>
    </div>
    <p>Another, perhaps unsurprising, trend is the rise of mobile devices over the Thanksgiving week in the US. Yesterday, on November 23, mobile traffic accounted for 54.5% of the Internet traffic in the US (the graph below rounds the percentages). It followed a similar trend in 2021 — we <a href="/how-the-us-paused-shopping-and-browsing-for-thanksgiving/">published</a> a blog about it — and in 2022, although last year it was at 53.8%.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4cMMnKu9vC0c3DjmxnxhAS/b948ca969a05dc35c54ed381c5a80dd9/Screenshot-2023-11-24-at-15.02.16.png" />
            
            </figure><p>Looking at the past few weeks, the growth in mobile use in US Internet traffic is more evident. The average percentage of mobile traffic during the first week of November was 47% in the US; during this Thanksgiving week, it reached 51%, with the previously mentioned 54.5% peak on Thanksgiving Day (even higher than the typical weekend, which usually demonstrates more mobile usage).</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2UPy5fYdNBHXI2y2Nv04J6/e8cde0768e288fc13820a0be986d2c73/Untitled--2-.png" />
            
            </figure><p>It’s not just mobile usage that’s going up, though. Over the next few days, we’re expecting to see a surge in traffic to make up for the Thanksgiving lull.</p><p>The following chart presents the 2022 perspective on HTTP requests in the US, illustrating how the peak traffic of the year was reached on November 28, Cyber Monday. It's also notable how Christmas Eve and Christmas Day, followed by January 1, 2023, exhibit the most significant drops in traffic in the US.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/647KhopvsrLrxvaLAvpQRB/4bbc16ed9e38c500a3d49a4c4f4e7e21/Untitled--3-.png" />
            
            </figure>
    <div>
      <h3>Food delivery and online groceries trends</h3>
      <a href="#food-delivery-and-online-groceries-trends">
        
      </a>
    </div>
    <p>Now, let’s explore whether there was an increase in late food delivery or online grocery shopping related to Thanksgiving. Traditionally, this is a time for cooking with family, but not everyone enjoys cooking. DNS traffic (from our <a href="https://1.1.1.1/">1.1.1.1</a> resolver) to food delivery sites was higher than the previous week on Tuesday and Wednesday, November 21 and 22, 2023, respectively, but notably dropped in the early morning on Thanksgiving Day.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/32Iyqj7slEWrf6z892bYpe/1f0c7da4df5273783dc190f053fa78d4/Untitled--4-.png" />
            
            </figure><p>Daily DNS traffic to food delivery services indicates a gradual increase throughout this month leading up to Thanksgiving Day, followed by a clear drop on the day itself, as much as 12%.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7pvpj7Cge7VGV5HF6Jqhdo/39eea78c60117859df3b5f3ced06921d/pasted-image-0-1.png" />
            
            </figure><p>How about online grocery shopping services, catering to those last minute ingredients? DNS traffic to those sites was noticeably higher than the previous week on Tuesday but decreased on Wednesday, experiencing a distinct drop on Thanksgiving Day.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7qHUIIYFsMbqyHdh77iw7L/bb3bf94e4be60213e99037ca483d358c/Untitled--5-.png" />
            
            </figure>
    <div>
      <h3>And do hackers stop for turkey, too?</h3>
      <a href="#and-do-hackers-stop-for-turkey-too">
        
      </a>
    </div>
    <p>To answer that, let’s examine <a href="https://www.cloudflare.com/learning/ddos/what-is-a-ddos-attack/">DDoS</a> (distributed denial-of-service) attacks, which remain one of the most common methods to disrupt or take down Internet properties. Our data indicates that in November 2023, Thanksgiving had the lowest percentage of traffic classified as DDoS attacks targeting the US.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6ljkBneb9TkIyOy9ifkvX7/4c98061776bc6e014c2f3491e0497545/pasted-image-0--1--1.png" />
            
            </figure>
    <div>
      <h3>Email messages slow down</h3>
      <a href="#email-messages-slow-down">
        
      </a>
    </div>
    <p><a href="https://www.cloudflare.com/zero-trust/products/email-security/">Cloudflare Area 1</a> also enables us to analyze email messages sent from the US perspective. Unsurprisingly, our data reveals a 43% drop in email messages sent on Thanksgiving Day compared to the previous week. However, the spam percentage of all emails originating from the US increased to 4%, significantly higher than the 2% recorded on the same day of the previous week.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/aYz1hLYMgzLgJ2TTGuRMN/f1acd7a74242ad9d923b17194e5fb298/Untitled--6-.png" />
            
            </figure><p>On the flip side, messages considered malicious stayed consistent in their percentage of all messages.</p>
    <div>
      <h3>Conclusion</h3>
      <a href="#conclusion">
        
      </a>
    </div>
    <blockquote><p><i>"The more you practice the art of thankfulness, the more you have to be thankful for." — Norman Vincent Peale, American author</i></p></blockquote><p>Thanksgiving Day in the United States still holds as a strong tradition in 2023, celebrating family, togetherness, and feasting that go beyond state borders and screens. Yet, notable differences exist among states, especially between the coastal and the central areas of the country.</p><p>Our data also hints at a slowdown in food deliveries and cyber threats during this time. Perhaps hackers are taking a day off. But, just wait for the story to change on Black Friday and Cyber Monday. We'll keep an eye out.</p><p>Thanksgiving 2023 was also the day we <a href="/workers-ai-update-stable-diffusion-code-llama-workers-ai-in-100-cities/">announced</a> that Stable Diffusion and Code Llama AI models are now available as part of Workers AI, running in over 100 cities across Cloudflare’s global network. If you’re looking to tinker with some new technology over this holiday weekend, we think you’ll enjoy these!</p><p>And finally — don't forget, you can check <a href="https://radar.cloudflare.com/">Cloudflare Radar</a> to track global and country-specific Internet traffic trends.</p> ]]></content:encoded>
            <category><![CDATA[Thanksgiving]]></category>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[Internet Traffic]]></category>
            <category><![CDATA[Trends]]></category>
            <category><![CDATA[DDoS]]></category>
            <category><![CDATA[Email]]></category>
            <guid isPermaLink="false">5OtdhEGXDyv5JndjOIkPa3</guid>
            <dc:creator>João Tomé</dc:creator>
        </item>
        <item>
            <title><![CDATA[Project Cybersafe Schools: Bringing security tools for free to small K-12 school districts in the US]]></title>
            <link>https://blog.cloudflare.com/project-cybersafe-schools/</link>
            <pubDate>Tue, 08 Aug 2023 13:00:12 GMT</pubDate>
            <description><![CDATA[ Announced as part of the Back to School Safely: K-12 Cybersecurity Summit at the White House on Aug 7, Proj Cybersafe Schools will support eligible K-12 public school districts with  Zero Trust ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Like other under-resourced organizations, schools face cyber attacks from malicious actors that can impact their ability to safely perform their basic function: teach children. Schools face email, phishing, and ransomware attacks that slow access and threaten leaks of confidential student data. And these attacks have real effects. In a <a href="https://www.gao.gov/products/gao-23-105480">report issued at the end of 2022</a>, the U.S. Government Accountability Office concluded that schools serving kindergarten through 12th grade (K-12) reported significant educational impact and monetary loss due to cybersecurity incidents, such as ransomware attacks. Recovery time can extend from 2 all the way up to 9 months — that’s almost an entire school year.</p><p>Cloudflare’s mission is to help build a better Internet, and we have always believed in helping protect those who might otherwise not have the resources to protect themselves from cyberattack.</p><p>It is against this backdrop that we’re very excited to introduce an initiative aimed at small K-12 public school districts: <a href="https://www.cloudflare.com/lp/cybersafe-schools/">Project Cybersafe Schools</a>. Announced as part of the Back to School Safely: <a href="https://www.whitehouse.gov/briefing-room/statements-releases/2023/08/07/biden-harris-administration-launches-new-efforts-to-strengthen-americas-k-12-schools-cybersecurity/">K-12 Cybersecurity Summit</a> at the White House on August 8, 2023, Project Cybersafe Schools will support eligible K-12 public school districts with a package of <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust</a> cybersecurity solutions — <i>for free</i>, and <i>with no time limit</i>. These tools will help eligible school districts minimize their exposure to common cyber threats.</p>
    <div>
      <h3>Schools are prime targets for cyberattacks</h3>
      <a href="#schools-are-prime-targets-for-cyberattacks">
        
      </a>
    </div>
    <p>In Q2 2023 alone, Cloudflare blocked an average of 70 million cyber threats each day targeting the U.S. education sector, and saw a 47% increase in DDoS attacks quarter-over-quarter. In September 2022, the <a href="https://www.cnn.com/2022/10/01/us/los-angeles-unified-school-district-ransomware-attack/index.html">Los Angeles Unified School District suffered a cyber attack</a>, and the perpetrators later posted students’ private information on the dark web. Then, in January 2022, the <a href="https://www.npr.org/2022/01/14/1072970219/cyber-attack-in-albuquerque-latest-to-target-public-schools">public school system in Albuquerque, New Mexico</a> was forced to close down for two days following a cyber attack that compromised student data. The list goes on. Between 2016 and 2022, there were <a href="https://www.k12six.org/map">1,619 publicly reported cybersecurity-related incidents</a> aimed at K-12 public schools and districts in the United States.</p><p>As an alliance member of the <a href="https://www.cisa.gov/topics/partnerships-and-collaboration/joint-cyber-defense-collaborative">Joint Cyber Defense Collaborative</a>, Cloudflare began conversations with officials from the Cybersecurity &amp; Infrastructure Security Agency (CISA), the Department of Education, and the White House about how we could partner to protect K-12 schools in the United States from cyber threats. We think that we are particularly well-suited to <a href="/cloudflare-helps-k12-go-back-to-school/">help protect K-12 schools</a> against cyber attacks. For almost a decade, Cloudflare has supported organizations that are particularly vulnerable to cyber threats and lack the resources to protect themselves through projects like <a href="https://www.cloudflare.com/en-gb/galileo/">Project Galileo</a>, the <a href="https://www.cloudflare.com/en-gb/athenian/">Athenian Project</a>, the <a href="/announcing-critical-infrastructure-defense/">Critical Infrastructure Defense Project</a>, and <a href="/project-safekeeping/">Project Safekeeping</a>.</p><p>Unlike many colleges, universities, and even some larger school districts, smaller school districts often lack the capacity to manage cyber threats. The lack of funding and staff make schools prime targets for hackers. These attacks prevent students from learning, put students’ personal information at risk, and cost school districts time and money in the aftermath of the attacks.</p>
    <div>
      <h3>Project Cybersafe Schools: protecting the smallest K-12 public school districts</h3>
      <a href="#project-cybersafe-schools-protecting-the-smallest-k-12-public-school-districts">
        
      </a>
    </div>
    <p>Project Cybersafe Schools will help support small K-12 public school districts by providing <a href="https://www.cloudflare.com/zero-trust/products/email-security/">cloud email security</a> to protect against a broad spectrum of threats including <a href="https://www.cloudflare.com/learning/email-security/business-email-compromise-bec/">Business Email Compromise,</a> multichannel phishing, credential harvesting, and other targeted attacks. Project Cybersafe Schools will also protect against Internet threats with DNS filtering by preventing users from reaching unwanted or harmful online content like ransomware or phishing sites. It can also be deployed to comply with the <a href="https://www.fcc.gov/consumers/guides/childrens-internet-protection-act">Children’s Internet Protection Act</a> (CIPA), which Congress passed in 2000, to address concerns about children’s access to obscene or harmful content on the Internet.</p><p>We believe that Cloudflare can make a meaningful impact on the cybersecurity needs of our small school districts, which allows the schools to focus on what they do best: teaching students. Hopefully, this project will bring privacy, security, and peace of mind to school managers, staff, teachers, and students, allowing them to focus solely on teaching and learning fearlessly.</p>
    <div>
      <h3>What Zero Trust services are available?</h3>
      <a href="#what-zero-trust-services-are-available">
        
      </a>
    </div>
    <p>Eligible K-12 public school districts in the United States will have access to a package of <a href="https://www.cloudflare.com/zero-trust/solutions/">enterprise-level Zero Trust cybersecurity services</a> <i>for free and with no time limit</i> – there is no catch and no underlying obligations. Eligible organizations will benefit from:</p><ul><li><p><b><b><b>Email Protection:</b></b></b> Safeguards inboxes with cloud email security by protecting against a broad spectrum of threats including malware-less Business Email Compromise, multichannel phishing, credential harvesting, and other targeted attacks.</p></li><li><p><b><b><b>DNS Filtering:</b></b></b> Protects against Internet threats with DNS filtering by preventing users from reaching unwanted or harmful online content like ransomware or phishing sites and can be deployed to comply with the Children’s Internet Protection Act (CIPA).</p></li></ul>
    <div>
      <h3>Who can apply?</h3>
      <a href="#who-can-apply">
        
      </a>
    </div>
    <p>To be eligible, Project Cybersafe Schools participants must be:</p><ul><li><p>K-12 public school districts located in the United States</p></li><li><p>Up to 2,500 students in the district</p></li></ul><p>If you think your school district may be eligible, we welcome you to contact us to learn more. To apply please visit: <a href="https://www.cloudflare.com/lp/cybersafe-schools/">https://www.cloudflare.com/lp/cybersafe-schools/</a></p><p>For schools or school districts that do not qualify for Project Cybersafe Schools, Cloudflare has other packages available with educational pricing. If you do not qualify for Project Cybersafe Schools, but are interested in our educational services, please contact us at <a href="#">k-12@cloudflare.com</a>.</p> ]]></content:encoded>
            <category><![CDATA[Email]]></category>
            <category><![CDATA[Cloud Email Security]]></category>
            <category><![CDATA[DNS Filtering]]></category>
            <category><![CDATA[USA]]></category>
            <category><![CDATA[Policy & Legal]]></category>
            <guid isPermaLink="false">2s8SeX5ZnPbe0oCq2cHDlk</guid>
            <dc:creator>Zaid Zaid</dc:creator>
        </item>
        <item>
            <title><![CDATA[Email Link Isolation: your safety net for the latest phishing attacks]]></title>
            <link>https://blog.cloudflare.com/area1-eli-ga/</link>
            <pubDate>Wed, 11 Jan 2023 13:01:00 GMT</pubDate>
            <description><![CDATA[ Email Link Isolation is your safety net for the odd links that end up in people’s inboxes, and they may click. This added protection turns Cloudflare Area 1 into the most comprehensive email security solution when it comes to protecting against phishing attacks. ]]></description>
            <content:encoded><![CDATA[ <p><i></i></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4ebDbzAoZi18H8cP1ypwtC/7e6c377e1ad9672bda44b7c866f59243/image3-13.png" />
            
            </figure><p>Email is one of the most ubiquitous and also most exploited tools that businesses use every single day. Baiting users into clicking malicious links within an email has been a particularly long-standing tactic for the vast majority of bad actors, from the most sophisticated criminal organizations to the least experienced attackers.</p><p>Even though this is a commonly known approach to gain account access or <a href="https://www.cloudflare.com/learning/email-security/what-is-email-fraud/">commit fraud</a>, users are still being tricked into clicking malicious links that, in many cases, lead to exploitation. The reason is simple: even the best trained users (and security solutions) cannot always distinguish a good link from a bad link.</p><p>On top of that, securing employees' mailboxes often results in multiple vendors, complex deployments, and a huge drain of resources.</p><p>Email Link Isolation turns <a href="https://www.cloudflare.com/products/zero-trust/email-security/">Cloudflare Area 1</a> into the most comprehensive <a href="https://www.cloudflare.com/zero-trust/products/email-security/">email security solution</a> when it comes to <a href="https://www.cloudflare.com/learning/email-security/how-to-prevent-phishing/">protecting against phishing attacks</a>. It rewrites links that could be exploited, keeps users vigilant by alerting them of the uncertainty around the website they’re about to visit, and protects against malware and vulnerabilities through the user-friendly <a href="https://www.cloudflare.com/products/zero-trust/browser-isolation/">Cloudflare Browser Isolation service</a>. Also, in true Cloudflare fashion,  it’s a one-click deployment.</p>
    <div>
      <h3>Protecting against deceptive links</h3>
      <a href="#protecting-against-deceptive-links">
        
      </a>
    </div>
    <p>With more than a couple dozen customers in beta and over one million links protected (so far), we can now clearly see the significant value and potential that this solution can deliver. To extend these benefits to more customers and continue to expand on the multitude of ways we can apply this technology, <b>we’re making Email Link Isolation generally available (GA) starting today</b>.</p><p>Email Link Isolation is included with Cloudflare Area 1 enterprise plan at no extra cost, and can be enabled with three clicks:</p><p>1. Log in to the Area 1 portal.</p><p>2. Go to Settings (the gear icon).</p><p>3. On Email Configuration, go to Email Policies &gt; Link Actions.</p><p>4. Scroll to Email Link Isolation and enable it.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6w3slBSqFADNmJi4LbnRUt/b2d8da9f9a91daffe7f8857f538ea517/image5-6.png" />
            
            </figure>
    <div>
      <h3>Defense in layers</h3>
      <a href="#defense-in-layers">
        
      </a>
    </div>
    <p>Applying multiple layers of defense becomes ever more critical as threat actors continuously look for ways to navigate around each security measure and develop more complex attacks. One of the best examples that demonstrates these evolving techniques is a deferred phishing attack, where an embedded URL is benign when the email reaches your email security stack and eventually your users’ inbox, but is later weaponized post-delivery.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3x69sIoIeC3ld5laLWAgEt/e8e4687cfb460e0749d1e4c367c03c24/image4-10.png" />
            
            </figure><p>To combat evolving email-borne threats, such as malicious links, Area 1 continually updates its <a href="https://www.cloudflare.com/learning/ai/what-is-machine-learning/">machine learning (ML) models</a> to account for all potential attack vectors, and leverages post-delivery scans and retractions as additional layers of defense. And now, customers on the <a href="https://www.cloudflare.com/plans/enterprise/">Enterprise plan</a> also have access to Email Link Isolation as one last defense - a safety net.</p><p>The key to successfully adding layers of security is to use <a href="https://zerotrustroadmap.org/">a strong Zero Trust suite</a>, not a disjointed set of products from multiple vendors. Users need to be kept safe without disrupting their productivity - otherwise they’ll start seeing important emails being quarantined or run into a poor experience when accessing websites, and soon enough they’ll be the ones looking for ways around the company’s security measures.</p>
    <div>
      <h3>Built to avoid productivity impacts</h3>
      <a href="#built-to-avoid-productivity-impacts">
        
      </a>
    </div>
    <p>Email Link Isolation provides an additional layer of security with virtually no disruption to the user experience. It’s smart enough to decide which links are safe, which are malicious, and which are still dubious. Those dubious links are then changed (rewritten to be precise) and Email Link Isolation keeps evaluating them until it reaches a verdict with a high degree of confidence. When a user clicks on one of those rewritten links, Email Link Isolation checks for a verdict (benign or malign) and takes the corresponding action - benign links open in the local browser as if they hadn’t been changed, while malign links are prevented from opening altogether.</p><p>Most importantly, when Email Link Isolation is unable to confidently determine a verdict based on all available intelligence, an interstitial page is presented to ask the user to be extra vigilant. The interstitial page calls out that the website is suspicious, and that the user should refrain from entering any personal information and passwords unless they know and fully trust the website. Over the last few months of beta, we’ve seen that over two thirds of users don’t proceed to the website after seeing this interstitial - that’s a good thing!</p><p>For the users that still want to navigate to the website after seeing the interstitial page, Email Link Isolation uses Cloudflare Browser Isolation to automatically open the link in an isolated browser running in Cloudflare’s closest data center to the user. This delivers an experience virtually indistinguishable from using the local browser, thanks to our Network Vector Rendering (NVR) technology and Cloudflare’s expansive, low-latency network. By opening the suspicious link in an isolated browser, the user is protected against potential browser attacks (including malware, zero days, and other types of malicious code execution).</p><p><b>In a nutshell, the interstitial page is displayed when Email Link Isolation is uncertain about the website, and provides another layer of awareness and protection against phishing attacks. Then, Cloudflare Browser Isolation is used to protect against malicious code execution when a user decides to still proceed to such a website.</b></p>
    <div>
      <h3>What we’ve seen in the beta</h3>
      <a href="#what-weve-seen-in-the-beta">
        
      </a>
    </div>
    <p>As expected, the percentage of rewritten links that users actually click is quite small (single digit percentage). That’s because the majority of such links are not delivered in messages the users are expecting, and aren’t coming from trusted colleagues or partners of theirs. So, even when a user clicks on such a link, they will often see the interstitial page and decide not to proceed any further. We see that less than half of all clicks lead to the user actually visiting the website (in Browser Isolation, to protect against malicious code that could otherwise be executing behind the scenes).</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/472qL0UBYcnHd1n1oFTegD/67264b3613f47281febb5a50b63e8ca5/image1-24.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7iB2Pyy7fHHerMwX7GCbrJ/8991046688880e6eef97ae7ec130dd3d/image2-16.png" />
            
            </figure><p>You may be wondering why we’re not seeing a larger amount of clicks on these rewritten links. The answer is quite simply that link Email Link Isolation is indeed that last layer of protection against attack vectors that may have evaded other lines of defense. Virtually all the well crafted phishing attacks that try and trick users into clicking malicious links are already being stopped by the Area 1 email security, and such messages don’t reach users’ inboxes.</p><p>The balance is very positive. From all the customers using Email Link Isolation beta in production, some Fortune 500, we received no negative feedback on the user experience. <b>That means that we’re meeting one of the most challenging goals - to provide additional security without negatively affecting users and without adding the burden of tuning/administration to the SOC and IT teams.</b></p><p>One interesting thing we uncover is how valuable our customers are finding our click-time inspection of link shorteners. The fact that a shortened URL (e.g. bit.ly) can be modified at any time to point to a different website has been making some of our customers anxious. Email Link Isolation inspects the link at time-of-click, evaluates the actual website that it’s going to open, and proceeds to open locally, block or present the interstitial page as adequate. We’re now working on full link shortener coverage through Email Link Isolation.</p>
    <div>
      <h3>All built on Cloudflare</h3>
      <a href="#all-built-on-cloudflare">
        
      </a>
    </div>
    <p>Cloudflare’s intelligence is driving the decisions of what gets rewritten. We have earlier signals than others.</p><p>Email Link Isolation has been built on Cloudflare’s unique capabilities in many areas.</p><p>First, because Cloudflare sees enough Internet traffic for us to confidently identify new/low confidence and potentially dangerous domains earlier than anyone else - leveraging the Cloudflare intelligence for this early signal is key to the user experience, to not add speed bumps to legitimate websites that are part of our users’ daily routines. Next, we’re using <a href="https://workers.cloudflare.com/">Cloudflare Workers</a> to process this data and serve the interstitial without introducing frustrating delays to the user. And finally, only <a href="https://www.cloudflare.com/products/zero-trust/browser-isolation/">Cloudflare Browser Isolation</a> can protect against malicious code with a low-latency experience that is invisible to end users and feels like a local browser.</p><p>If you’re not yet a Cloudflare Area 1 customer, start your free trial and phishing risk assessment <a href="https://www.cloudflare.com/lp/emailsecurity/">here</a>.</p> ]]></content:encoded>
            <category><![CDATA[CIO Week]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Cloud Email Security]]></category>
            <category><![CDATA[Email]]></category>
            <category><![CDATA[Remote Browser Isolation]]></category>
            <category><![CDATA[SASE]]></category>
            <guid isPermaLink="false">5s7YqaliwrZdTs3OtmUwUQ</guid>
            <dc:creator>João Sousa Botto</dc:creator>
        </item>
        <item>
            <title><![CDATA[Email Routing leaves Beta]]></title>
            <link>https://blog.cloudflare.com/email-routing-leaves-beta/</link>
            <pubDate>Tue, 25 Oct 2022 13:00:00 GMT</pubDate>
            <description><![CDATA[ Today Email Routing leaves Beta and an update on all the new things we've been adding to the service, including behind-the-scenes and not-so-visible improvements ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Email Routing was <a href="/introducing-email-routing/">announced</a> during Birthday Week in 2021 and has been available for free to every Cloudflare customer since early this year. When we launched in beta, we set out to make a difference and provide the most <a href="/migrating-to-cloudflare-email-routing/">uncomplicated</a>, more powerful <a href="https://www.cloudflare.com/learning/email-security/what-is-email-routing/">email forwarding service</a> on the Internet for all our customers, for free.</p><p>We feel we've met and <a href="https://w3techs.com/technologies/details/em-cloudflare">surpassed</a> our goals for the first year. Cloudflare Email Routing is now one of our most popular features and a top leading email provider. We are processing email traffic for more than 550,000 inboxes and forwarding an average of two million messages daily, and still growing month to month.</p><p>In February, we also announced that we were <a href="/why-we-are-acquiring-area-1/">acquiring</a> Area1. Merging their team, products, and know-how with Cloudflare was a significant step in strengthening our <a href="https://www.cloudflare.com/zero-trust/products/email-security/">Email Security</a> capabilities.</p><p>All this is good, but what about more features, you ask?</p><p>The team has been working hard to enhance Email Routing over the last few months. <b>Today Email Routing leaves beta.</b></p><p>Also, we feel that this could be a good time to give you an update on all the new things we've been adding to the service, including behind-the-scenes and not-so-visible improvements.</p><p>Let’s get started.</p>
    <div>
      <h3>Public API and Terraform</h3>
      <a href="#public-api-and-terraform">
        
      </a>
    </div>
    <p>Cloudflare has a strong API-first philosophy. All of our services expose their primitives in our vast API catalog and gateway, which we then “dogfood” extensively. For instance, our customer's configuration dashboard is built entirely on top of these APIs.</p><p>The Email Routing APIs didn't quite make it to this catalog on day one and were kept private and undocumented for a while. This summer we made those APIs <a href="https://api.cloudflare.com/#email-routing-destination-addresses-properties">available</a> on the public Cloudflare API catalog. You can programmatically use them to manage your destination emails, rules, and other Email Routing settings. The methods' definitions and parameters are documented, and we provide <a href="https://curl.se/">curl</a> examples if you want to get your hands dirty quickly.</p><p>Even better, if you're an infrastructure as code type of user and use Terraform to configure your systems automatically, we have you covered too. The latest releases of <a href="https://registry.terraform.io/providers/cloudflare/cloudflare/">Cloudflare's Terraform provider</a> now <a href="https://github.com/cloudflare/terraform-provider-cloudflare/tree/master/internal/provider">incorporate</a> the Email Routing API resources, which you can use with <a href="https://www.terraform.io/language/syntax/configuration">HCL</a>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/oPdbQSpCrGdInWwSmc3Gz/bfa929155775e78998b86f6149b6ed9d/image4-11.png" />
            
            </figure>
    <div>
      <h3>IPv6 egress</h3>
      <a href="#ipv6-egress">
        
      </a>
    </div>
    <p>IPv6 adoption is on a <a href="https://radar.cloudflare.com/reports/ipv6">sustained growth</a> path. Our latest IPv6 adoption report shows that we're nearing the 30% penetration figure globally, with some countries, where mobile usage is prevalent, exceeding the 50% mark. Cloudflare has offered full IPv6 support <a href="/introducing-cloudflares-automatic-ipv6-gatewa/">since 2011</a> as it aligns entirely with our mission to help build a better Internet.</p><p>We are IPv6-ready across the board in our network and our products, and Email Routing has had IPv6 ingress support since day one.</p>
            <pre><code>➜  ~ dig celso.io MX +noall +answer
celso.io.		300	IN	MX	91 isaac.mx.cloudflare.net.
celso.io.		300	IN	MX	2 linda.mx.cloudflare.net.
celso.io.		300	IN	MX	2 amir.mx.cloudflare.net.
➜  ~ dig linda.mx.cloudflare.net AAAA +noall +answer
linda.mx.cloudflare.net. 300	IN	AAAA	2606:4700:f5::b
linda.mx.cloudflare.net. 300	IN	AAAA	2606:4700:f5::c
linda.mx.cloudflare.net. 300	IN	AAAA	2606:4700:f5::d</code></pre>
            <p>More recently, we closed the loop and added egress IPv6 as well. Now we also use IPv6 when sending emails to upstream servers. If the MX server to which an email is being forwarded supports IPv6, then we will try to use it. <a href="https://en.wikipedia.org/wiki/Comparison_of_webmail_providers">Gmail</a> is one good example of a high traffic destination that has IPv6 MX records.</p>
            <pre><code>➜  ~ dig gmail.com MX +noall +answer
gmail.com.		3362	IN	MX	30 alt3.gmail-smtp-in.l.google.com.
gmail.com.		3362	IN	MX	5 gmail-smtp-in.l.google.com.
gmail.com.		3362	IN	MX	10 alt1.gmail-smtp-in.l.google.com.
gmail.com.		3362	IN	MX	20 alt2.gmail-smtp-in.l.google.com.
gmail.com.		3362	IN	MX	40 alt4.gmail-smtp-in.l.google.com.
➜  ~ dig gmail-smtp-in.l.google.com AAAA +noall +answer
gmail-smtp-in.l.google.com. 116	IN	AAAA	2a00:1450:400c:c03::1a</code></pre>
            <p>We’re happy to report that we’re now delivering most of our email to upstreams using IPv6.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/fpqLS2x7AzUJBHUfBd1Vw/65e0089ca141515c51b2ff2df5a4716e/image1-22.png" />
            
            </figure>
    <div>
      <h3>Observability</h3>
      <a href="#observability">
        
      </a>
    </div>
    <p>Email Routing is effectively another system that sits in the middle of the life of an email message. No one likes to navigate blindly, especially when using and depending on critical services like email, so it's our responsibility to provide as much observability as possible about what's going on when messages are transiting through our network.</p><p>End to end email deliverability is a complex topic and often challenging to troubleshoot due to the nature of the protocol and the number of systems and hops involved. We added two widgets, Analytics and Detailed Logs, which will hopefully provide the needed <a href="/email-routing-insights/">insights</a> and help increase visibility.</p><p>The Analytics section of Email Routing shows general statistics about the number of emails received during the selected timeframe, how they got handled to the upstream destination addresses, and a convenient time-series chart.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5idsdXSP16hDLOxayDOGqi/6b62d3ce039cdd9d94abc0e69405594f/image5-4.png" />
            
            </figure><p>On the Activity Log, you can get detailed information about what happened to each individual message that was received and then delivered to the destination. That information includes the sender and the custom address used, the timestamp, and the delivery attempt result. It also has the details of our SPF, DMARC, and DKIM validations. We also provide filters to help you find what you're looking for in case your message volume is higher.</p><p>More recently, the Activity Log now also shows <a href="https://en.wikipedia.org/wiki/Bounce_message">bounces</a>. A bounce message happens when the upstream SMTP server accepts the delivery, but then, for any reason (exceeded quota, virus checks, forged messages, or other issues), the recipient inbox decides to reject it and return a new message back with an error to the latest <a href="https://en.wikipedia.org/wiki/Message_transfer_agent">MTA</a> in the chain, read from the <a href="https://www.rfc-editor.org/rfc/rfc5322.html#section-3.6.7">Return-Path</a> headers, which is us.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7wyT0gd7l6GHjl7LVFjCUR/67628c835e2f8f76f0d6a16ef99011be/image8-4.png" />
            
            </figure>
    <div>
      <h3>Audit Logs</h3>
      <a href="#audit-logs">
        
      </a>
    </div>
    <p><a href="https://developers.cloudflare.com/fundamentals/account-and-billing/account-security/review-audit-logs/">Audit Logs</a> are available on all plan types and summarize the history of events, like login and logout actions, or zone configuration changes, made within your Cloudflare account. Accounts with multiple members or companies that must comply with regulatory obligations rely on Audit logs for tracking and evidence reasons.</p><p>Email Routing now integrates with Audit Logs and records all configuration changes, like adding a new address, changing a rule, or editing the catch-all address. You can find the Audit Logs on the dashboard under "Manage Account" or use our API to download the list.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/15USXKo9itSQkX8h8JS0kE/ea244f54b31e72c73be3416ee42ace4e/image6-7.png" />
            
            </figure>
    <div>
      <h3>Anti-spam</h3>
      <a href="#anti-spam">
        
      </a>
    </div>
    <p>Unsolicited and malicious messages plague the world of email and are a big problem for end users. They affect the user experience and efficiency of email, and often carry security risks that can lead to scams, identity theft, and manipulation.</p><p>Since day one, we have supported and validated <a href="https://www.cloudflare.com/learning/dns/dns-records/dns-spf-record/">SPF</a> (Sender Policy Framework) records,  <a href="https://www.cloudflare.com/learning/dns/dns-records/dns-dkim-record/">DKIM</a> (DomainKeys Identified Mail) signatures, and <a href="https://www.cloudflare.com/learning/dns/dns-records/dns-dmarc-record/">DMARC</a> (Domain-based Message Authentication) policies in incoming messages. These steps are important and mitigate some risks associated with authenticating the origin of an email from a specific legitimate domain, but they don't solve the problem completely. You can still have bad actors generating spam or <a href="https://www.cloudflare.com/learning/email-security/how-to-identify-a-phishing-email/">phishing</a> Attacks from other domains who ignore SPF or DKIM completely.</p><p>Anti-spam techniques today are often based on blocking emails whose origin (the IP address of the client trying to deliver the message) confidence score isn't great. This is commonly known in the industry as IP reputation. Other companies specialize in maintaining reputation lists for IPs and email domains, also known as <a href="https://en.wikipedia.org/wiki/Domain_Name_System-based_blocklist">RBL</a> lists, which are then shared across providers and used widely.</p><p>Simply put, an IP or a domain gets a bad reputation when it starts sending unsolicited or malicious emails. If your IP or domain has a bad reputation, you'll have a hard time delivering Emails from them to any major email provider. A bad reputation goes away when the IP or domain stops acting bad.</p><p>Cloudflare is a security company that knows a few things about IP <a href="https://developers.cloudflare.com/ruleset-engine/rules-language/fields/#field-cf-threat_score">threat scores</a> and reputation. Working with the Area1 team and learning from them, we added support to flag and block emails received from what we consider bad IPs at the SMTP level. Our approach uses a combination of heuristics and reputation databases, including some RBL lists, which we constantly update.</p><p>This measure benefits not only those customers that receive a lot of spam, who will now get another layer of <a href="https://www.cloudflare.com/learning/dns/dns-records/protect-domains-without-email/">protection</a> and filtering, but also everyone else using Email Routing. The reputation of our own IP space and forwarding domain, which we use to deliver messages to other email providers, will improve, and with it, so will our deliverability success rate.</p>
    <div>
      <h3>IDN support</h3>
      <a href="#idn-support">
        
      </a>
    </div>
    <p><a href="https://datatracker.ietf.org/doc/html/rfc5891">Internationalized domain names</a>, or IDNs for short, are domains that contain at least one non-ASCII character. To accommodate backward compatibility with older Internet protocols and applications, the IETF approved the IDNA protocol (Internationalized Domain Names in Applications), which was then adopted by <a href="https://chromium.googlesource.com/chromium/src/+/main/docs/idn.md">many browsers</a>, <a href="https://www.cloudflare.com/learning/dns/glossary/what-is-a-domain-name-registrar/">top-level domain registrars</a> and other service providers.</p><p>Cloudflare was <a href="/non-latinutf8-domains-now-fully-supported/">one of the first</a> platforms to adopt IDNs back in 2012.  Supporting internationalized domain names on email, though, is challenging. Email uses DNS, SMTP, and other standards (like TLS and DKIM signatures) stacked on top of each other. IDNA conversions need to work end to end, or something will break.</p><p>Email Routing didn’t support IDNs until now. Starting today, Email Routing can be used with IDNs and everything will work end to end as expected.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2w5ochqMtILwVjTYbA0Pb/659ce2e551b0ea0e8540045dd48839e7/image3-10.png" />
            
            </figure>
    <div>
      <h3>8-bit MIME transport</h3>
      <a href="#8-bit-mime-transport">
        
      </a>
    </div>
    <p>The SMTP protocol supports extensions since the <a href="https://www.rfc-editor.org/rfc/rfc2821">RFC 2821</a> revision. When an email client connects to an SMTP server, it announces its capabilities on the EHLO command.</p>
            <pre><code>➜  ~ telnet linda.mx.cloudflare.net 25
Trying 162.159.205.24...
Connected to linda.mx.cloudflare.net.
Escape character is '^]'.
220 mx.cloudflare.net Cloudflare Email ESMTP Service ready
EHLO celso.io
250-mx.cloudflare.net greets celso.io
250-STARTTLS
250-8BITMIME
250 ENHANCEDSTATUSCODES</code></pre>
            <p>This tells our client that we support the <a href="https://www.ietf.org/rfc/rfc3207.txt">Secure SMTP</a> over TLS, <a href="https://www.rfc-editor.org/rfc/rfc2034.html">Enhanced Error Codes</a>, and the <a href="https://www.rfc-editor.org/rfc/rfc6152">8-bit MIME Transport</a>, our latest addition.</p><p>Most modern clients and servers support the 8BITMIME extension, making transmitting binary files easier and more efficient without additional conversions to and from 7-bit.</p><p>Email Routing now supports transmitting 8BITMIME SMTP messages end to end and handles DKIM signatures accordingly.</p>
    <div>
      <h3>Other fixes</h3>
      <a href="#other-fixes">
        
      </a>
    </div>
    <p>We’ve been making other smaller improvements to Email Routing too:</p><ul><li><p>We ported our SMTP server to use <a href="https://boringssl.googlesource.com/boringssl/">BoringSSL</a>, Cloudflare’s SSL/TLS <a href="/make-ssl-boring-again/">implementation of choice</a>, and now support more ciphers when clients connect to us using STARTTLS and when we connect to upstream servers.</p></li><li><p>We made a number of improvements when we added our own <a href="https://datatracker.ietf.org/doc/html/rfc6376">DKIM signatures</a> in the messages. We keep our <a href="https://www.rust-lang.org/">Rust</a> ?DKIM <a href="https://github.com/cloudflare/dkim">implementation</a> open source on GitHub, and we also <a href="https://github.com/lettre/lettre/commits/master">contribute</a> to <a href="https://github.com/lettre/lettre">Lettre</a>, a Rust mailer library that we use.</p></li><li><p>When a destination address domain has multiple MX records, we now try them all in their preference value order, as described in the <a href="https://datatracker.ietf.org/doc/html/rfc974">RFC</a>, until we get a good delivery, or we fail.</p></li></ul>
    <div>
      <h3>Route to Workers update</h3>
      <a href="#route-to-workers-update">
        
      </a>
    </div>
    <p>We announced <a href="/announcing-route-to-workers/">Route to Workers</a> in May this year. Route to Workers enables everyone to programmatically process their emails and use them as triggers for any other action. In other words, you can choose to process any incoming email with a Cloudflare Worker script and then implement any logic you wish before you deliver it to a destination address or drop it. Think about it as programmable email.</p><p>The good news, though, is that we're near completing the project. The APIs, the dashboard configuration screens, the SMTP service, and the necessary <a href="https://github.com/cloudflare/workerd/blob/main/src/workerd/io/worker-interface.capnp">Cap'n Proto interface</a> to Workers are mostly complete, and "all" we have left now is adding the Email Workers primitives to the runtime and testing the hell out of everything before we ship.</p><p>Thousands of users are waiting for Email Workers to start creating advanced email processing workflows, and we're excited about the possibilities this will open. We promise we're working hard to open the public beta as soon as possible.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/xNqMMpydzI8i8kWisriPT/d01bb6f42e9fe4bad92e8fec3796f6b4/image7-4.png" />
            
            </figure>
    <div>
      <h3>What’s next?</h3>
      <a href="#whats-next">
        
      </a>
    </div>
    <p>We keep looking at ways to improve email and will add more features and support to emerging protocols and extensions. Two examples are <a href="https://en.wikipedia.org/wiki/Authenticated_Received_Chain">ARC</a> (Authenticated Received Chain), a new signature-based authentication system designed with email forwarding services in mind, and <a href="https://datatracker.ietf.org/doc/html/rfc4952">EAI</a> (Email Address Internationalization), which we will be supporting soon.</p><p>In the meantime, you can start using Email Routing with your own domain if you haven't yet, it only <a href="/migrating-to-cloudflare-email-routing/">takes a few minutes</a> to set up, and it's free. Our <a href="https://developers.cloudflare.com/email-routing/">Developers Documentation page</a> has details on how to get started, troubleshooting, and technical information.</p><p>Ping us on our <a href="https://discord.com/invite/cloudflaredev">Discord server</a>, <a href="https://community.cloudflare.com/new-topic?category=Feedback/Previews%20%26%20Betas&amp;tags=email">community forum</a>, or <a href="https://twitter.com/cloudflare">Twitter</a> if you have suggestions or questions, the team is listening.</p> ]]></content:encoded>
            <category><![CDATA[Email]]></category>
            <category><![CDATA[Email Routing]]></category>
            <category><![CDATA[Email Workers]]></category>
            <guid isPermaLink="false">eSf4sLZdb5Gb9Y7mVbjOl</guid>
            <dc:creator>Celso Martinho</dc:creator>
            <dc:creator>André Cruz</dc:creator>
            <dc:creator>Nelson Duarte</dc:creator>
        </item>
        <item>
            <title><![CDATA[Click Here! (safely): Automagical Browser Isolation for potentially unsafe links in email]]></title>
            <link>https://blog.cloudflare.com/safe-email-links/</link>
            <pubDate>Thu, 29 Sep 2022 13:00:00 GMT</pubDate>
            <description><![CDATA[ There’s always a cat and mouse game between hackers and security companies. New attacks try to weaponize website links after emails have been delivered to mailboxes, and Email Link Isolation is here to revolutionize protection against those attacks. ]]></description>
            <content:encoded><![CDATA[ <p></p><p>We're often told not to click on 'odd' links in email, but what choice do we really have? With the volume of emails and the myriad of SaaS products that companies use, it's inevitable that employees find it almost impossible to distinguish a good link before clicking on it. And that's before attackers go about making links harder to inspect and hiding their URLs behind tempting "Confirm" and "Unsubscribe" buttons.</p><p>We need to let end users click on links and have a safety net for when they unwittingly click on something malicious — let’s be honest, it’s bound to happen even if you do it by mistake. That safety net is Cloudflare's Email Link Isolation.</p>
    <div>
      <h2>Email Link Isolation</h2>
      <a href="#email-link-isolation">
        
      </a>
    </div>
    <p>With Email Link Isolation, when a user clicks on a suspicious link — one that email security hasn’t identified as ‘bad’, but is still not 100% sure it’s ‘good’ — they won’t immediately be taken to that website. Instead, the user first sees an interstitial page recommending extra caution with the website they’ll visit, especially if asked for passwords or personal details.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/176fAKaEbWz4ESe4erOMOc/21dc4ffb698a1cbee7d6083be0ade544/image1-78.png" />
            
            </figure><p>From there, one may choose to not visit the webpage or to proceed and open it in a remote isolated browser that runs on Cloudflare’s global network and not on the user’s local machine. This helps protect the user and the company.</p><p>The user experience in our isolated browser is virtually indistinguishable from using one’s local browser (we’ll talk about why below), but untrusted and potentially malicious payloads will execute away from the user’s computer and your corporate network.</p><p>In summary, this solution:</p><ul><li><p>Keeps users alert to prevent credential theft and <a href="https://www.cloudflare.com/zero-trust/solutions/account-takeover-prevention/">account takeover</a></p></li><li><p>Automatically blocks dangerous downloads</p></li><li><p>Prevents malicious scripts from executing on the user’s device</p></li><li><p>Protects against zero-day exploits on the browser</p></li></ul>
    <div>
      <h2>How can I try it</h2>
      <a href="#how-can-i-try-it">
        
      </a>
    </div>
    <p><a href="https://www.cloudflare.com/products/zero-trust/email-security/">Area 1</a> is Cloudflare’s <a href="https://www.cloudflare.com/zero-trust/solutions/email-security-services/">email security solution</a>. It protects organizations from the full range of email attack types (URLs, payloads, BEC), vectors (email, web, network), and attack channels (external, internal, trusted partners) by enforcing multiple layers of protection before, during, and after the email hits the inbox. Today it adds Email Link Isolation to the protections it offers.</p><p>If you are a Cloudflare Area 1 customer you can <a href="https://www.cloudflare.com/zero-trust/lp/email-link-isolation/">request access to the Email Link Isolation beta</a> today. We have had Email Link Isolation deployed to all Cloudflare employees for the last four weeks and are ready to start onboarding customers.</p><p>During the beta it will be available for free on <a href="https://www.cloudflare.com/plans/">all plans</a>. After the beta it will still be included at no extra cost with our <a href="https://www.cloudflare.com/press-releases/2020/announcing-area-1-phishguard/">PhishGuard plan</a>.</p>
    <div>
      <h2>Under the hood</h2>
      <a href="#under-the-hood">
        
      </a>
    </div>
    <p>To create Email Link Isolation we used a few ingredients that are quite special to Cloudflare. It may seem complicated and, in a sense, the protection is complex, but we designed this so that the user experience is fast, safe, and with clear options on how to proceed.</p>
    <div>
      <h3>1. Find potentially unsafe domains</h3>
      <a href="#1-find-potentially-unsafe-domains">
        
      </a>
    </div>
    <p>First, we have created a constantly updating list of domains that the <a href="https://www.cloudflare.com/learning/dns/what-is-1.1.1.1/">Cloudflare’s DNS resolver</a> recently saw for the first time, or that are somehow potentially unsafe (leveraging classifiers from the <a href="https://www.cloudflare.com/products/zero-trust/gateway/">Cloudflare Gateway</a> and other products). These are domains that would be too disruptive for the organization to block outright, but that should still be navigated with extra caution.</p><p>For example, people acquire domains and create new businesses every day. There’s nothing wrong with that - quite the opposite. However, attackers often set up or acquire websites serving legitimate content and, days or weeks later, send a link to intended targets. The emails flow through as benign and the attacker weaponizes the website when emails are already sitting on people’s inboxes. Blocking all emails with links to new websites would cause users to surely miss important communications, and delivering the emails while making links safe to click on is a much better suited approach.</p><p>There is also hosting infrastructure from large cloud providers, such as Microsoft or Google, that prevent crawling and scanning. These are used on our day-to-day business, but attackers may deploy malicious content there. You wouldn’t want to fully block emails with links to Microsoft SharePoint, for example, but it’s certainly safer to use Email Link Isolation on them if they link to outside your organization.</p><p>Attackers are constantly experimenting with new ways of looking legitimate to their targets, and that’s why relying on the early signals that Cloudflare sees makes such a big difference.</p>
    <div>
      <h3>2. Rewrite links in emails</h3>
      <a href="#2-rewrite-links-in-emails">
        
      </a>
    </div>
    <p>The second ingredient we want to highlight is that, as Cloudflare Area 1 processes and inspects emails for security concerns, it also checks the domain of every link against the suspicious list. If an email contains a link to a suspicious domain, Cloudflare Area 1 automatically changes it (<i>rewrites</i>) so that the interstitial page is shown, and the link opens with <a href="https://www.cloudflare.com/products/zero-trust/browser-isolation/">Cloudflare Browser Isolation</a> by default.</p><p><i>Note: Rewriting email links is only possible when emails are processed inline, which is one of the options for deploying Area 1. One of the big disadvantages of any email security solution deployed as API-only is that closing this last mile gap through link rewriting isn’t a possibility.</i></p>
    <div>
      <h3>3. Opens remotely but feels local</h3>
      <a href="#3-opens-remotely-but-feels-local">
        
      </a>
    </div>
    <p>When a user clicks on one of these rewritten links, instead of directly accessing a potential threat, our systems will first check their current classification (benign, suspicious, malicious). Then, if it’s malicious, the user will be blocked from continuing to the website and see an interstitial page informing them why. No further action is required.</p><p>If the link is suspicious, the user is offered the option to open it in an isolated browser. What happens next? The link is opened with Cloudflare Browser Isolation in a nearby <a href="https://www.cloudflare.com/network/">Cloudflare data center</a> (globally within 50 milliseconds of 95% of the Internet-connect population). To ensure website compatibility and security, the target website is entirely executed in a sandboxed Chromium-based browser. Finally, the website is instantly streamed back to the user as vector instructions consumed by a lightweight HTML5-compatible remoting client in the user’s preferred web browser. These safety precautions happen with no perceivable latency to the end user.</p><p>Cloudflare Browser Isolation is an extremely secure remote browsing experience that feels just like local browsing. And delivering this is only possible by serving isolated browsers on a low latency, global network with our <a href="/cloudflare-and-remote-browser-isolation/">unique vector based streaming</a> technology. This architecture is different from legacy <a href="https://www.cloudflare.com/learning/access-management/what-is-browser-isolation/">remote browser isolation</a> solutions that rely on fragile and insecure DOM-scrubbing, or are bandwidth intensive and high latency pixel pushing techniques hosted in a few high latency data centers.</p>
    <div>
      <h3>4. Reassess (always learning)</h3>
      <a href="#4-reassess-always-learning">
        
      </a>
    </div>
    <p>Last but not least, another ingredient that makes Email Link Isolation particularly effective is that behind the scenes our services are constantly reevaluating domains and updating their reputation in Cloudflare’s systems.</p><p>When a domain on our suspicious list is confirmed to be benign, all links to it can automatically start opening with the user’s local browser instead of with Cloudflare Browser Isolation.</p><p>Similarly, if a domain on the suspicious list is identified as malign, all links to that domain can be immediately blocked from opening. So, our services are constantly learning and acting accordingly.</p>
    <div>
      <h2>Email Link Isolation at Cloudflare</h2>
      <a href="#email-link-isolation-at-cloudflare">
        
      </a>
    </div>
    <p>It’s been four weeks since we deployed Email Link Isolation to all our 3,000+ Cloudflare employees, here’s what we saw:</p><ul><li><p>100,000 link rewrites per week on Spam and Malicious emails. Such emails were already blocked server side by Area 1 and users never see them. It’s still safer to rewrite these as they may be released from quarantine on user request.</p></li><li><p>2,500 link rewrites per week on Bulk emails. Mostly <a href="https://en.wikipedia.org/wiki/Graymail_(email)">graymail</a>, which are commercial/bulk communications the user opted into. They may end up in the users’ spam folder.</p></li><li><p>1,000 link rewrites per week on emails that do not fit any of the categories above — these are the ones that normally reach the user’s inboxes. These are almost certainly benign, but there’s still enough doubt to warrant a link rewrite.</p></li><li><p><b>25 clicks on rewritten links per week</b> (up to six per day).</p></li></ul>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1J3g2dQOVL9ZKOnxr0YEiv/96056ff6d84319ebf7dfdd407409fb50/image2-64.png" />
            
            </figure><p>As a testament to the efficacy of Cloudflare Area 1, 25 suspicious link clicks per week for a universe of over 3,000 employees is a very low number. Thanks to Email Link Isolation, users were protected against exploits.</p>
    <div>
      <h2>Better together with Cloudflare Zero Trust</h2>
      <a href="#better-together-with-cloudflare-zero-trust">
        
      </a>
    </div>
    <p>In future iterations, administrators will be able to connect Cloudflare Area 1 to their Cloudflare Zero Trust account and apply isolation policies, <a href="/inline-dlp-ga/">DLP</a> (Data Loss Protection) controls and in-line <a href="/managing-clouds-cloudflare-casb/">CASB</a> (a <a href="https://www.cloudflare.com/learning/access-management/what-is-a-casb/">cloud access security broker</a>) to email link isolated traffic.</p><p>We are starting our beta today. If you’re interested in trying Email Link Isolation and start to feel safer with your email experience, you should sign up <a href="https://www.cloudflare.com/zero-trust/lp/email-link-isolation/">here</a>.</p> ]]></content:encoded>
            <category><![CDATA[Birthday Week]]></category>
            <category><![CDATA[Email]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[Cloud Email Security]]></category>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[Remote Browser Isolation]]></category>
            <category><![CDATA[SASE]]></category>
            <guid isPermaLink="false">5YA2XnoQIqTkOoF2QWarvE</guid>
            <dc:creator>João Sousa Botto</dc:creator>
            <dc:creator>Tim Obezuk</dc:creator>
            <dc:creator>Phil Syme</dc:creator>
        </item>
        <item>
            <title><![CDATA[Cloudflare Area 1 - how the best email security keeps getting better]]></title>
            <link>https://blog.cloudflare.com/email-security/</link>
            <pubDate>Tue, 20 Sep 2022 13:30:00 GMT</pubDate>
            <description><![CDATA[ Cloudflare started using Area 1 in 2020 and proceeded with acquiring the company in 2022. We were most impressed how phishing, responsible for 90+% of cyberattacks, basically became a non-issue overnight when we deployed Area 1. But our vision is much bigger than preventing phishing attacks ]]></description>
            <content:encoded><![CDATA[ <p></p><p>On February 23, 2022, after being a customer for two years and seeing phishing attacks virtually disappear from our employee’s mailboxes, Cloudflare <a href="/why-we-are-acquiring-area-1/">announced</a> the acquisition of Area 1 Security.</p><p>Thanks to its unique technology (more on that below) Cloudflare Area 1 can proactively identify and <a href="https://www.cloudflare.com/learning/email-security/how-to-prevent-phishing/">protect against phishing campaigns</a> before they happen, and potentially prevent the 90%+ of all cyberattacks that Deloitte research identified as starting with an email. All with little to no impact on employee productivity.</p><p>But preventing 90% of the attacks is not enough, and that’s why Cloudflare Area 1 email security is part of our <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust</a> platform. Here’s what’s new.</p>
    <div>
      <h3>Email Security on your Cloudflare Dashboard</h3>
      <a href="#email-security-on-your-cloudflare-dashboard">
        
      </a>
    </div>
    <p><b>Starting today you will find a dedicated Email Security section on your Cloudflare dashboard. That’s the easiest way for any Cloudflare customer to get familiar with and start using Cloudflare Area 1 Email Security.</b></p><p>From there you can easily <a href="https://www.cloudflare.com/lp/emailsecurity/">request a trial</a>, which gives you access to the full product for 30 days.</p><p>Our team will guide you through the setup, which will take just a few minutes. That’s the beauty of <a href="/replace-your-email-gateway-with-area-1/">not having to install and tune a Secure Email Gateway (SEG)</a>. You can simply configure Area 1 inline or connect through the API, journaling, or other connectors - none of these options disrupt mail flow or the end user experience. And you don’t need any new hardware, appliances or agents.</p><p>Once the trial starts, you’ll be able to review detection metrics and forensics in real time, and will receive real-time updates from the Area 1 team on incidents that require immediate attention.</p><p>At the end of the trial you will also have a Phishing Risk Assessment where our team will walk you through the impact of the mitigated attacks and answer your questions.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4zc71jrzfD0IQhxvGXkMa/df07b1e39db43138fa78e13c286e93da/image1-23.png" />
            
            </figure><p>Another option you’ll see on the Email Security section of the Cloudflare Dashboard is to explore the Area 1 demo.</p><p>At the click of a button you’ll enter the Area 1 portal of a fictitious company where you can see the product in action. You can interact with the full product, including our advanced message classifiers, the BEC protections, real time view of spoofed domains, and our unique message search and trace capabilities.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1Qvm4AeQEm6c0Qgf17smNL/88e8baead47055fb9f036be698e13162/image3-12.png" />
            
            </figure>
    <div>
      <h3>Product Expansions</h3>
      <a href="#product-expansions">
        
      </a>
    </div>
    <p>Being cloud-native has allowed us to develop some unique capabilities. Most notably, we scan the Internet for attacker infrastructure, sources and delivery mechanisms to stop phishing attacks days before they hit an inbox. These are state of the art machine-learning models using the threat intelligence data that Area 1 has accumulated since it was founded nine years ago, and now they also incorporate data from the 124 billion cyber threats that Cloudflare blocks each day and its 1.7 trillion daily <a href="https://www.cloudflare.com/learning/dns/what-is-dns/">DNS queries</a>.</p><p>Since the product is cloud-based and no local appliances are involved, these unique datasets and models benefit every customer immediately and apply to the full range of email attack types (URLs, payloads, BEC), vectors (email, web, network), and attack channels (external, internal, trusted partners). Additionally, the threat datasets, observables and Indicators of Compromise (IOC) are now additional signals to <a href="https://www.cloudflare.com/products/zero-trust/gateway/">Cloudflare Gateway</a> (part of Zero Trust), extending <a href="https://www.cloudflare.com/learning/dns/dns-records/protect-domains-without-email/">protection</a> beyond email and giving Cloudflare customers the industry's utmost <a href="https://www.cloudflare.com/products/zero-trust/threat-defense/">protection against converged or blended threats</a>.</p><p>The expertise Area 1 gained through this relentless focus on Threat Research and Threat Operations (i.e., disrupting actors once identified) is also leading to a new large scale initiative to make every Cloudflare customer, and the broader Internet, safer - Cloudforce One.</p><blockquote><p><i>The Cloudforce One team is composed of analysts assigned to five subteams: Malware Analysis, Threat Analysis, Active Mitigation and Countermeasures, Intelligence Analysis, and Intelligence Sharing. Collectively, they have tracked many of the most sophisticated cyber criminals on the Internet while at the National Security Agency (NSA), USCYBERCOM, and Area 1 Security, and have worked closely with similar organizations and governments to disrupt these threat actors. They’ve also been prolific in publishing “finished intel” reports on security topics of significant geopolitical importance, such as targeted attacks against governments, technology companies, the energy sector, and law firms, and have regularly briefed top organizations around the world on their efforts.</i></p></blockquote><p>The team will help protect all Cloudflare customers by working closely with our existing product, engineering, and security teams to improve our products based on tactics, techniques, and procedures (TTPs) observed in the wild. Customers will get better protection without having to take any action.</p><p>Additionally, customers can purchase a subscription to Cloudforce One (<a href="/cloudforce-one-is-now-ga/">now generally available</a>), and get access to threat data and briefings, dedicated security tools, and the ability to make requests for information (RFIs) to the team’s threat operations staff. RFIs can be on any security topic of interest, and will be analyzed and responded to in a timely manner. For example, the Cloudforce One Malware Analysis team can accept uploads of possible malware and provide a technical analysis of the submitted resource.</p><p>Lastly, <a href="https://www.cloudflare.com/learning/dns/dns-records/dns-spf-record/">SPF</a>/<a href="https://www.cloudflare.com/learning/dns/dns-records/dns-dkim-record/">DKIM</a>/<a href="https://www.cloudflare.com/learning/dns/dns-records/dns-dmarc-record/">DMARC</a> policies are another tool that can be used to prevent <a href="https://www.cloudflare.com/learning/ssl/what-is-domain-spoofing/">Email Spoofing</a> and have always been a critical part of Area 1's threat models. Cloudflare Area 1 customers receive weekly DMARC sender reports to understand the efficacy of their configuration, but customers have also asked for help in setting up SPF/DKIM/DMARC records for their own domains.</p><p>It was only logical to make Cloudflare’s <a href="/tackling-email-spoofing/">Email Security DNS Wizard</a> part of our <a href="https://www.cloudflare.com/zero-trust/products/email-security/">Email Security</a> stack to guide customers through their initial SPF, DKIM and DMARC configuration. The wizard is now available to all customers using Cloudflare DNS, and will soon be available to Cloudflare Area 1 customers using a third party DNS. Getting SPF/DKIM/DMARC right can be complex, but it is a necessary and vital part of making the Internet safer, and this <a href="https://www.cloudflare.com/zero-trust/solutions/email-security-services/">solution</a> will help you build a solid foundation.</p><p>You’ll be hearing from us very soon regarding more expansions to the Area 1 feature set. In the meantime, if you want to experience Area 1 first-hand sign up for a Phishing Risk Assessment <a href="https://www.cloudflare.com/lp/emailsecurity/">here</a> or explore the interactive demo through the Email section of your Cloudflare Dashboard.</p>
    <div>
      <h3>Watch on Cloudflare TV</h3>
      <a href="#watch-on-cloudflare-tv">
        
      </a>
    </div>
    <div></div><p></p> ]]></content:encoded>
            <category><![CDATA[GA Week]]></category>
            <category><![CDATA[General Availability]]></category>
            <category><![CDATA[Email]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Email Security]]></category>
            <category><![CDATA[Area 1 Security]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <guid isPermaLink="false">5dQc1Yw4js2S6OekcV4sKY</guid>
            <dc:creator>João Sousa Botto</dc:creator>
        </item>
        <item>
            <title><![CDATA[Route to Workers, automate your email processing]]></title>
            <link>https://blog.cloudflare.com/announcing-route-to-workers/</link>
            <pubDate>Fri, 13 May 2022 12:59:17 GMT</pubDate>
            <description><![CDATA[ With Cloudflare Workers and Email Routing you now have a developer platform to implement any logic you ever wanted for programmatically handling incoming Emails. ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Cloudflare Email Routing has quickly grown to a few hundred thousand users, and we’re incredibly excited with the number of feature requests that reach our product team every week. We hear you, we love the feedback, and we want to give you all that you’ve been asking for. What we don’t like is making you wait, or making you feel like your needs are too unique to be addressed.</p><p>That’s why we’re taking a different approach - we’re giving you the power tools that you need to implement any logic you can dream of to <a href="https://www.cloudflare.com/learning/email-security/what-is-email-routing/">process your emails</a> in the fastest, most scalable way possible.</p><p>Today we’re announcing Route to Workers, for which we’ll start a closed beta soon. You can join the waitlist today.</p>
    <div>
      <h3>How this works</h3>
      <a href="#how-this-works">
        
      </a>
    </div>
    <p>When using Route to Workers your Email Routing rules can have a <a href="https://workers.cloudflare.com/">Worker</a> process the messages reaching any of your custom Email addresses.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/17zXoE30zcRH8XdOgci0py/3dd2868758481e957215529847dff0f6/image2-28.png" />
            
            </figure><p>Even if you haven’t used <a href="https://workers.cloudflare.com/">Cloudflare Workers</a> before, we are making onboarding as easy as can be. You can start creating Workers straight from the Email Routing dashboard, with just one click.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6tmTsfaRFW1eI3LwwHYIvC/7ea2e60847a0a33919a07d4d89b3be5b/image3-21.png" />
            
            </figure><p>After clicking <i>Create</i>, you will be able to choose a starter that allows you to get up and running with minimal effort. Starters are templates that pre-populate your Worker with the code you would write for popular use cases such as creating a blocklist or allowlist, content based filtering, tagging messages, pinging you on Slack for urgent emails, etc.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1Wfm69IvlhvolGTkLDJnsw/8b40ecf79ec76e9c6807c00824e2de25/image7-4.png" />
            
            </figure><p>You can then use the code editor to make your new Worker process emails in exactly the way you want it to - the options are endless.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/48OuwXjGEQxxYScTLkQrKz/973af80c91c5a7c03704da9eb51a4404/Editor--Schedule.png" />
            
            </figure><p>And for those of you that prefer to jump right into writing their own code, you can go straight to the editor without using a starter. You can write Workers with a language you likely already know. Cloudflare built Workers to execute JavaScript and WebAssembly and has continuously added support for new <a href="https://developers.cloudflare.com/workers/platform/languages/">languages</a>.</p><p>The Workers you’ll use for processing emails are just regular Workers that listen to incoming events, implement some logic, and reply accordingly. You can use all the features that a normal Worker would.</p><p>The main difference being that instead of:</p>
            <pre><code>export default {
  async fetch(request, env, ctx) {
    handleRequest(request);
  }
}</code></pre>
            <p>You'll have:</p>
            <pre><code>export default {
  async email(message, env, ctx) {
    handleEmail(message);
  }
}</code></pre>
            <p>The new `email` event will provide you with the "from", "to" fields, the full headers, and the raw body of the message. You can then use them in any way that fits your use case, including calling other APIs and orchestrating complex decision workflows. In the end, you can decide what action to take, including rejecting or forwarding the email to one of your Email Routing destination addresses.</p><p>With these capabilities you can easily create logic that, for example, only accepts messages coming from one specific address and, when one matches the criteria, forwards to one or more of your verified destination addresses while also immediately alerting you on Slack. Code for such feature could be as simple as this:</p>
            <pre><code>export default {
   async email(message, env, ctx) {
       switch (message.to) {
           case "marketing@example.com":
               await fetch("https://webhook.slack/notification", {
                   body: `Got a marketing email from ${ message.from }, subject: ${ message.headers.get("subject") }`,
               });
               sendEmail(message, [
                   "marketing@corp",
                   "sales@corp",
               ]);
               break;

           default:
               message.reject("Unknown address");
       }
   },
};</code></pre>
            <p>Route to Workers enables everyone to programmatically process their emails and use them as triggers for any other action. We think this is pretty powerful.</p>
    <div>
      <h3>Process up to 100,000 emails/day for free</h3>
      <a href="#process-up-to-100-000-emails-day-for-free">
        
      </a>
    </div>
    <p>The first 100,000 Worker requests (or Email Triggers) each day are free, and paid plans start at just $5 per 10 million requests. You will be able to keep track of your Email Workers usage right from the Email Routing dashboard.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5LzWjwFo75nURlnz7tWB5h/30a52bd0fe2a50101ddb2f7dc65c39dc/Slice-1.jpeg.jpeg" />
            
            </figure>
    <div>
      <h3>Join the Waitlist</h3>
      <a href="#join-the-waitlist">
        
      </a>
    </div>
    <p>You can join the waitlist today by going to the Email section of your dashboard, navigating to the Email Workers tab, and clicking the Join Waitlist button.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/KFRb5ebiPf2x9MaHXiytF/1aeef42073a4b8397f6d1ff436a5c938/image1-36.png" />
            
            </figure><p>We are expecting to start the closed beta in just a few weeks, and can’t wait to hear about what you’ll build with it!</p><p>As usual, if you have any questions or feedback about Email Routing, please come see us in the <a href="https://community.cloudflare.com/new-topic?category=Feedback/Previews%20%26%20Betas&amp;tags=email">Cloudflare Community</a> and the <a href="https://discord.gg/cloudflaredev">Cloudflare Discord</a>.</p> ]]></content:encoded>
            <category><![CDATA[Platform Week]]></category>
            <category><![CDATA[Email]]></category>
            <category><![CDATA[Cloudflare Workers]]></category>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[Developers]]></category>
            <category><![CDATA[Developer Platform]]></category>
            <guid isPermaLink="false">7uCXvlDsBt3FCDnUJGIlEf</guid>
            <dc:creator>João Sousa Botto</dc:creator>
            <dc:creator>Natalie Yeh</dc:creator>
        </item>
        <item>
            <title><![CDATA[Email Routing Insights]]></title>
            <link>https://blog.cloudflare.com/email-routing-insights/</link>
            <pubDate>Mon, 25 Apr 2022 13:00:05 GMT</pubDate>
            <description><![CDATA[ Insights and Logs are now available to everyone using Cloudflare Email Routing ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Have you ever wanted to try a new email service but worried it might lead to you missing any emails? If you have, you’re definitely not alone. Some of us email ourselves to make sure it reaches the correct destination, others don’t rely on a new address for anything serious until they’ve seen it work for a few days. In any case, emails often contain important information, and we need to trust that our emails won’t get lost for any reason.</p><p>To help reduce these worries about whether emails are being received and forwarded - and for troubleshooting if needed - we are rolling out a new Overview page to Email Routing. On the Overview tab people now have full visibility into our service and can see exactly how we are <a href="https://www.cloudflare.com/learning/email-security/what-is-email-routing/">routing emails</a> on their behalf.</p>
    <div>
      <h3>Routing Status and Metrics</h3>
      <a href="#routing-status-and-metrics">
        
      </a>
    </div>
    <p>The first thing you will see in the new tab is an at a glance view of the service. This includes the routing status (to know if the service is configured and running), whether the necessary DNS records are configured correctly, and the number of custom and destination addresses on the zone.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6pNymBZ2FTzmPLJ5WBTiq2/a7f5c67c4945f3286dc535dc728fdb83/image4-7.png" />
            
            </figure><p>Below the configuration summary, you will see more advanced statistics about the number of messages received on your custom addresses, and what happened to those messages. You will see information about the number of emails forwarded or dropped by Email Routing (based on the rules you created), and the number that fall under other scenarios such as being rejected by Email Routing (due to errors, not passing security checks or being considered spam) or rejected by your destination mailbox. You now have the exact counts and a chart, so that you can track these metrics over time.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5jo7olZgIdmRiAXoCieF01/a941297d7bd7fde5ba6876e962af373b/image2-13.png" />
            
            </figure>
    <div>
      <h3>Activity Log</h3>
      <a href="#activity-log">
        
      </a>
    </div>
    <p>On the Cloudflare Email Routing tab you'll also see the Activity Log, where you can drill deeper into specific behaviors. These logs show you details about the email messages that reached one of the custom addresses you have configured on your Cloudflare zone.</p><p>For each message the logs will show you the Message ID, Sender, Custom Address, when Cloudflare Email Routing received it, and the action that was taken. You can also expand the row to see the SPF, DMARC, and DKIM status of that message along with any relevant error messaging.</p><p>And we know looking at every message can be overwhelming, especially when you might be resorting to the logs for troubleshooting purposes, so you have a few options for filtering:</p><ul><li><p>Search for specific people (email addresses) that have messaged you.</p></li><li><p>Filter to show only one of your custom addresses.</p></li><li><p>Filter to show only messages where a specific action was taken.</p></li></ul>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3iMzDZKZfwXt5IjOoevIs2/75be43c74a2c7d30d23790a75b7035b7/image1-16.png" />
            
            </figure>
    <div>
      <h3>Routes and Settings</h3>
      <a href="#routes-and-settings">
        
      </a>
    </div>
    <p>Next to the Overview tab, you will find the Routes tab with the configuration UI that is likely already familiar to you. That’s where you create custom addresses, add and verify destination addresses, and create rules with the relationships between the custom and destination addresses.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4uXTTb5EPjihecDDyimvoz/466bb0938861e7a6cf9f8c419ee07263/image3-12.png" />
            
            </figure><p>Lastly the Settings tab includes less common actions such as the DNS configuration and the options for off boarding from Email Routing.</p><p>We expect Email Routing Insights to be available to everyone by Monday May 2nd. We hope you enjoy this update. And if you have any questions or feedback about this product, please come see us in the <a href="https://community.cloudflare.com/new-topic?category=Feedback/Previews%20%26%20Betas&amp;tags=email">Cloudflare Community</a> and the <a href="https://discord.gg/cloudflaredev">Cloudflare Discord</a>.</p> ]]></content:encoded>
            <category><![CDATA[Analytics]]></category>
            <category><![CDATA[Email]]></category>
            <category><![CDATA[Insights]]></category>
            <category><![CDATA[Product News]]></category>
            <guid isPermaLink="false">7Mxsgn2QyYIr6JVH57bScL</guid>
            <dc:creator>João Sousa Botto</dc:creator>
            <dc:creator>Steven Raden</dc:creator>
        </item>
        <item>
            <title><![CDATA[Democratizing email security: protecting individuals and businesses of all sizes from phishing and malware attacks]]></title>
            <link>https://blog.cloudflare.com/democratizing-email-security/</link>
            <pubDate>Mon, 14 Mar 2022 12:59:33 GMT</pubDate>
            <description><![CDATA[ Once the acquisition of Area 1 closes, we plan to give all paid self-serve plans access to their email security technology at no additional charge ]]></description>
            <content:encoded><![CDATA[ 
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5t6mGqXJD9qlJOdDYKgFW4/062c99b0769b5c30eb07e056c53a87cd/image1-10.png" />
            
            </figure><p>Since our founding, Cloudflare has been on a mission to take expensive, complex security solutions typically only available to the largest companies and make them easy to use and accessible to everyone. In 2011 and 2015 we did this for the <a href="https://www.cloudflare.com/learning/ddos/glossary/web-application-firewall-waf/">web application firewall</a> and SSL/TLS markets, simplifying the process of protecting websites from application vulnerabilities and encrypting HTTP requests down to single clicks; in 2020, during the start of the COVID-19 pandemic, we made our Zero Trust suite available to everyone; and today—in the face of heightened phishing attacks—we’re doing the same for the email security market.</p><p>Once the acquisition of Area 1 closes, as we expect early in the second quarter of 2022, we plan to give all paid self-serve plans access to their <a href="https://www.cloudflare.com/zero-trust/solutions/email-security-services/">email security technology</a> at no additional charge. Control, customization, and visibility via analytics will vary with plan level, and the highest flexibility and support levels will be available to Enterprise customers for purchase.</p><p>All self-serve users will also get access to a more feature-packed version of the <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust solution</a> we made available to everyone in 2020. Zero Trust services are incomplete without an <a href="https://www.cloudflare.com/zero-trust/products/email-security/">email security solution</a>, and <a href="https://www.cisa.gov/news/2021/10/01/cisa-kicks-cybersecurity-awareness-month">CISA’s recent report</a> makes that clearer than ever: over 90% of successful cyber attacks start with a phishing email, so we expect that over time analysts will have no choice but to include email in their definitions of secure access and zero edges.</p><p><b>If you’re interested in reserving your place in line, register your interest by logging into your Cloudflare account at dash.cloudflare.com, selecting your domain, clicking Email, and then “Join Waitlist” at the top of the page; we’ll reach out after the Area 1 acquisition is completed, and the integration is ready, in the order we received your request.</b></p>
    <div>
      <h3>One-click deployment</h3>
      <a href="#one-click-deployment">
        
      </a>
    </div>
    <p>If you’re already managing your authoritative DNS with Cloudflare, as nearly 100% of <a href="https://www.cloudflare.com/plans/">non-Enterprise plans</a> are, there will just be a single click to get started. Once clicked, we’ll start returning different MX records to anyone trying to send email to your domain. This change will attract all emails destined for your domain, during which they’ll be run through Area 1’s models and potentially be quarantined or flagged. Customers of Microsoft Office 365 will also be able to take advantage of APIs for an even deeper integration and capabilities like post-delivery message redaction.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5CbqzMF8kBl1AP1z62smRo/54807cd4dcf81335a7f0471d01fc67be/image2-10.png" />
            
            </figure><p>In addition to routing and filtering email, we’ll also automagically take care of your DNS email security records such as SPF, DKIM, DMARC, etc. We launched a tool to help with this last year, and soon we’ll be making it even more comprehensive and easier to use.</p>
    <div>
      <h3>Integration with other Zero Trust products</h3>
      <a href="#integration-with-other-zero-trust-products">
        
      </a>
    </div>
    <p>As we wrote in the <a href="/why-we-are-acquiring-area-1/">acquisition announcement post</a> on this blog, we’re excited to integrate email security with other products in our Zero Trust suite. For customers of Gateway and Remote Browser Isolation (RBI), we’ll automatically route potentially suspicious domains and links through these protective layers. Our built-in <a href="/data-loss-prevention/">data loss prevention (DLP) technology</a> will also be wired into Area 1’s technology in deployments where visibility into outbound email is available.</p>
    <div>
      <h3>Improving threat intelligence with new data sources</h3>
      <a href="#improving-threat-intelligence-with-new-data-sources">
        
      </a>
    </div>
    <p>In addition to integrating directly with Zero Trust products, we’re excited about connecting threat data sources from Area 1 into existing Cloudflare products and vice versa. For example, phishing infrastructure identified during Area 1’s Internet-wide scans will be displayed within the recently launched Cloudflare Security Center, and 1.1.1.1’s trillions of queries per month will help Area 1 identify new domains that may be threats. Domains that are newly registered, or registered with slight variations of legitimate domains, are often warning signs of an upcoming phishing attack.</p>
    <div>
      <h3>Getting started</h3>
      <a href="#getting-started">
        
      </a>
    </div>
    <p>Cloudflare has been a happy customer of Area 1’s technology for years, and we’re excited to open it up to all of our customers as soon as possible. If you’re excited as we are about being able to use this in your Pro or Business plan, reserve your place in line today within the Email tab for your domain. Or if you’re an Enterprise customer and want to get started immediately, fill out <a href="https://www.cloudflare.com/lp/emailsecurity/">this form</a> or contact your Customer Success Manager.</p> ]]></content:encoded>
            <category><![CDATA[Security Week]]></category>
            <category><![CDATA[Email]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[Phishing]]></category>
            <category><![CDATA[Malware]]></category>
            <category><![CDATA[Cloudflare Zero Trust]]></category>
            <guid isPermaLink="false">3FxihkQRtKc61pl0Sevyjt</guid>
            <dc:creator>Patrick R. Donahue</dc:creator>
            <dc:creator>Shalabh Mohan</dc:creator>
        </item>
        <item>
            <title><![CDATA[Email Routing is now in open beta, available to everyone]]></title>
            <link>https://blog.cloudflare.com/email-routing-open-beta/</link>
            <pubDate>Tue, 08 Feb 2022 11:21:12 GMT</pubDate>
            <description><![CDATA[ Cloudflare Email Routing transitioned from closed beta to open beta. It’s now available to everyone, including free zones ]]></description>
            <content:encoded><![CDATA[ 
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1AL0Vf9w01BxW3DaGrj0MV/cc1bd2060376015b62130232c01a5d9c/image2-8.png" />
            
            </figure><p>I won’t beat around the bush: we’ve moved <a href="/introducing-email-routing/">Cloudflare Email Routing</a> from closed beta to open beta ?</p><p>What does this mean? It means that there’s no waitlist anymore; every zone* in every Cloudflare account has Email Routing available to them.</p><p>To get started just open one of the zones in your <a href="https://dash.cloudflare.com/?to=/:account/:zone/email/overview">Cloudflare Dashboard</a> and click on <i>Email</i> in the navigation pane.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2H4sSM4n0aBeDZ08i7MQng/6a2890b943d472adb6b5a1e8212ac1b3/image1-2-3.png" />
            
            </figure>
    <div>
      <h3>Our journey so far</h3>
      <a href="#our-journey-so-far">
        
      </a>
    </div>
    <p>Back in September 2021, during Cloudflare’s Birthday Week, we <a href="/introducing-email-routing/">introduced</a> Email Routing as the simplest solution for creating <a href="https://www.cloudflare.com/learning/email-security/what-is-email-routing/">custom email addresses</a> for your domains without the hassle of managing multiple mailboxes.</p><p>Many of us at Cloudflare saw a need for this type of product, and we’ve been using it since before it had a UI. After Birthday Week, we started gradually opening it to Cloudflare customers that requested access through the wait list; starting with just a few users per week and gradually ramping up access as we found and fixed edge cases.</p><p>Most recently, with users wanting to set up Email Routing for more of their domains and with some of <a href="https://support.google.com/a/answer/2855120">G Suite legacy</a> users looking for an alternative to starting a subscription, we have been onboarding tens of thousands of new zones <i>every day</i> into the closed beta. We’re loving the adoption and the feedback!</p><p>Needless to say that with hundreds of thousands of zones from around the world in the Email Routing beta we uncovered many new use cases and a few limitations, <a href="https://developers.cloudflare.com/email-routing/known-limitations">a couple of which</a> still exist. But these few months of closed beta gave us the confidence to move to the next stage - open beta - which now makes <b>Cloudflare Email Routing available to everyone, including free zones</b>.</p><p>Thank you to all of you that were part of the closed beta and provided feedback. We couldn’t be more excited to welcome everyone else!</p><p>Check out this blog post for more details on <a href="/migrating-to-cloudflare-email-routing/">how to migrate to Cloudflare Email Routing</a>. And if you have any questions or feedback about this product, please come see us in the <a href="https://community.cloudflare.com/new-topic?category=Feedback/Previews%20%26%20Betas&amp;tags=email">Cloudflare Community</a> and the <a href="https://discord.gg/cloudflaredev">Cloudflare Discord</a>.</p><p>___</p><p><sup>*</sup>we do have a few limitations, such as not currently supporting Internationalized Domain Names (IDNs) and subdomains. Known limitations are listed in the documentation.</p> ]]></content:encoded>
            <category><![CDATA[Email Routing]]></category>
            <category><![CDATA[Email]]></category>
            <category><![CDATA[Beta]]></category>
            <category><![CDATA[Free]]></category>
            <guid isPermaLink="false">25BRZuxuAwucLlXzvr8fVL</guid>
            <dc:creator>João Sousa Botto</dc:creator>
        </item>
        <item>
            <title><![CDATA[What’s new with Notifications?]]></title>
            <link>https://blog.cloudflare.com/whats-new-with-notifications/</link>
            <pubDate>Sat, 11 Dec 2021 13:59:18 GMT</pubDate>
            <description><![CDATA[ We know that notifications are incredibly important to our customers. Cloudflare sits in between your Internet property and the rest of the world. When something goes wrong, you want to know right away because it could have a huge impact on your end users. ]]></description>
            <content:encoded><![CDATA[ 
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/Sxg57IttTVk04ZLpBTGR4/d36e2d321405131fe7f151590b315117/image1-64.png" />
            
            </figure><p>Back in 2019, we <a href="/new-tools-to-monitor-your-server-and-avoid-downtime/">blogged about our brand new Notification center</a> as a centralized hub for configuring notifications on your account. Since then, we’ve talked a lot about new types of notifications you can set up, but not as much about updates to the notification platform itself. So what’s new with Notifications?</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/20CKBWq8cNuT7F039v4Rp9/fc002415a966f5051c94ed3cf72234f3/image3-31.png" />
            
            </figure>
    <div>
      <h3>Why we care about notifications</h3>
      <a href="#why-we-care-about-notifications">
        
      </a>
    </div>
    <p>We know that notifications are incredibly important to our customers. Cloudflare sits in between your Internet property and the rest of the world. When something goes wrong, you want to know right away because it could have a huge impact on your end users. However, you don’t want to have to sit on the Cloudflare Dashboard all day, pressing refresh on analytics pages over and over just to make sure that you don’t miss anything important. This is where Notifications come in. Instead of requiring you to actively monitor your Internet properties, you want Cloudflare to be able to directly inform you when something might be going wrong.</p><p>Cloudflare has many different notification types to ensure that you don’t miss anything important. We have notifications to inform you that <a href="/announcing-ddos-alerts/">you’ve been DDoS’d</a>, or that <a href="/get-notified-when-your-site-is-under-attack/">the Firewall is blocking more requests than normal</a>, or that <a href="/smarter-origin-service-level-monitoring/">your origin is seeing high levels of 5xx errors</a>, or even that <a href="/introducing-workers-usage-notifications/">your Workers script’s CPU usage is above average</a>. We’re constantly adding new notifications, so make sure to check our <a href="https://developers.cloudflare.com/fundamentals/notifications/notification-available">Cloudflare Development Docs</a> to see what’s new!</p>
    <div>
      <h3>Emails are out, webhooks are in</h3>
      <a href="#emails-are-out-webhooks-are-in">
        
      </a>
    </div>
    <p>So we have all of these super great notifications, but <i>how</i> do we actually inform you of an event? The classic answer is “we email you.” All of our customers have the ability to configure notifications to send to the email addresses of their choosing.</p><p>However, email isn’t always the optimal choice. What happens when an email gets sent to spam, or filtered out into another folder that you rarely check? What if you’re a person who never cleans out their inbox and has four thousand unread emails that can drown out new important emails that come in? You want a way for notifications to go directly to the messaging platform that you check the most, whether that’s Slack or Microsoft Teams or Discord or something else entirely. For customers on our Professional, Business, and Enterprise plans, this is where webhooks come in.</p><p>Webhooks are incredibly powerful! They’re a type of API with a simple, standardized behavior. They allow one service (Cloudflare) to send events directly to another service. This destination service can be nearly anything: messaging platforms, data management systems, workflow automation systems, or even your own internal APIs.</p><p>While Cloudflare has had first class support for webhooking into Slack, Microsoft Teams, Google Chat, and customer’s own APIs for a while, we’ve recently added support for DataDog, Discord, OpsGenie, and Splunk as well. You can read about how to set up each of those types of webhooks in our <a href="https://developers.cloudflare.com/fundamentals/notifications/configure-webhooks">Cloudflare Development Docs</a>.</p><p>Because webhooks are so versatile, more and more customers are using them! The number of webhooks configured within Cloudflare’s notification system doubles, on average, every three months. Customers can configure webhooks in the Notifications tab in the dashboard.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4IK1GmOJoBLbBekVr4q2N3/15a7598ca9cced6394158b4cf5e1d6ad/image2-47.png" />
            
            </figure>
    <div>
      <h3>Those who forget history are doomed to repeat it</h3>
      <a href="#those-who-forget-history-are-doomed-to-repeat-it">
        
      </a>
    </div>
    <p>Webhooks are cool, but they still leave room for error. What happens when you receive a notification but accidentally delete it? Or when someone new starts at your company, but you forget to update the notification settings to send to the new employee?</p><p>Before now, Cloudflare notifications were entirely point in time. We sent you a notification via your preferred method, and we no longer had any visibility into that notification. If that notification gets lost on your end, we don’t have any way to help recover the information it contained.</p><p>Notification history fixes that exact issue. Users are able to see a log of the notifications that were sent, when they were sent, and who they were sent to. Customers on Free, Professional, or Business plans are able to see notification history for the past 30 days. Customers on Enterprise plans are able to see notification history for the past 90 days.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5LqewbFwuPn6q8uhizFiXU/a70a18b548a09ac6720cead1de36bb11/image4-27.png" />
            
            </figure><p>Right now, notification history is only <a href="https://api.cloudflare.com/#notification-history-properties">available via API</a>, but stay tuned for updates about viewing directly in the Cloudflare Dashboard!</p> ]]></content:encoded>
            <category><![CDATA[CIO Week]]></category>
            <category><![CDATA[Notifications]]></category>
            <category><![CDATA[Email]]></category>
            <guid isPermaLink="false">1z30mcJRU8FhUxPza6TpLe</guid>
            <dc:creator>Natasha Wissmann</dc:creator>
        </item>
    </channel>
</rss>