Zero trust, zero phish
Protecting against deceptive and dangerous link-based attacks
Link-based attacks have become the go-to method for stealing credentials, loading malware/ransomware, and extracting sensitive information. Join this webinar to learn how organizations can proactively insulate their workforce from malicious web content that comes through email, text messages, instant messaging, social media, cloud productivity apps, and more.
As modern phishing attacks become more deceptive, even the best trained security solutions struggle to accurately identify malicious links 100% of the time. Link shorteners further complicate this problem by enabling deferred attacks, where malicious links embedded in emails are activated post-delivery, effectively evading inbound security controls.
While email is still the primary delivery mechanism for malicious links, attackers have expanded their tactics beyond just email, engaging users across various applications used for daily collaboration. This attack technique, known as multi-channel phishing, has emerged as a preferred method for exposing users to a wide range of threats.
Join us to learn more about:
- Why deferred and multi-channel attacks are becoming more popular (and dangerous!)
- How attackers target users across various applications used for daily collaboration
- How to thwart link-based attacks that bypass traditional security controls
- How Cloudflare’s proprietary isolation technology protects users without them knowing
Provided by Cloudflare
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
ITPro is a global business technology website providing the latest news, analysis, and business insight for IT decision-makers. Whether it's cyber security, cloud computing, IT infrastructure, or business strategy, we aim to equip leaders with the data they need to make informed IT investments.
For regular updates delivered to your inbox and social feeds, be sure to sign up to our daily newsletter and follow on us LinkedIn and Twitter.
-
Complacent Gen Z and Millennial workers are more likely to be duped by social engineering attacksNews Overconfidence and a lack of security training are putting organizations at risk
-
Chinese hackers are using ‘stealthy and resilient’ Brickstorm malware to target VMware servers and hide in networks for months at a timeNews Organizations, particularly in the critical infrastructure, government services, and facilities and IT sectors, need to be wary of Brickstorm
-
15-year-old revealed as key player in Scattered LAPSUS$ HuntersNews 'Rey' says he's trying to leave Scattered LAPSUS$ Hunters and is prepared to cooperate with law enforcement
-
November rundown: CrowdStrike's insider threatITPro Podcast As CrowdStrike grappled with a malicious employee, Cloudflare suffered a major outage
-
The Scattered Lapsus$ Hunters group is targeting Zendesk customers – here’s what you need to knowNews The group appears to be infecting support and help-desk personnel with remote access trojans and other forms of malware
-
Impact of Asahi cyber attack laid bare as company confirms 1.5 million customers exposedNews No ransom has been paid, said president and group CEO Atsushi Katsuki, and the company is restoring its systems
-
Shai-Hulud malware is back with a vengeance and has hit more than 19,000 GitHub repositories so far — here's what developers need to knowNews The malware has compromised more than 700 widely-used npm packages, and is spreading fast
-
The US, UK, and Australia just imposed sanctions on a Russian cyber crime group – 'we are exposing their dark networks and going after those responsible'News Media Land offers 'bulletproof' hosting services used for ransomware and DDoS attacks around the world


