Zero trust, zero phish
Protecting against deceptive and dangerous link-based attacks
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
You are now subscribed
Your newsletter sign-up was successful
Link-based attacks have become the go-to method for stealing credentials, loading malware/ransomware, and extracting sensitive information. Join this webinar to learn how organizations can proactively insulate their workforce from malicious web content that comes through email, text messages, instant messaging, social media, cloud productivity apps, and more.
As modern phishing attacks become more deceptive, even the best trained security solutions struggle to accurately identify malicious links 100% of the time. Link shorteners further complicate this problem by enabling deferred attacks, where malicious links embedded in emails are activated post-delivery, effectively evading inbound security controls.
While email is still the primary delivery mechanism for malicious links, attackers have expanded their tactics beyond just email, engaging users across various applications used for daily collaboration. This attack technique, known as multi-channel phishing, has emerged as a preferred method for exposing users to a wide range of threats.
Join us to learn more about:
- Why deferred and multi-channel attacks are becoming more popular (and dangerous!)
- How attackers target users across various applications used for daily collaboration
- How to thwart link-based attacks that bypass traditional security controls
- How Cloudflare’s proprietary isolation technology protects users without them knowing
Provided by Cloudflare
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
ITPro is a global business technology website providing the latest news, analysis, and business insight for IT decision-makers. Whether it's cyber security, cloud computing, IT infrastructure, or business strategy, we aim to equip leaders with the data they need to make informed IT investments.
For regular updates delivered to your inbox and social feeds, be sure to sign up to our daily newsletter and follow on us LinkedIn and Twitter.
-
Claude Code creator confirms cause of massive source code leakNews Over half a million lines of Claude Code source code was leaked, with the company attributing the blunder to human error
-
Apple turns 50: ITPro's favorite devicesOpinion From a garage in California to one of the world’s most celebrated companies, Apple has spent five decades building some of our favorite tech products
-
‘The build pipeline is becoming the new frontline’: Axios npm compromise highlights growing software supply chain risks, experts warnNews Cyber criminals exploited a hijacked maintainer account to compromise one of the world's most widely used JavaScript libraries
-
'AI-generated phishing became the baseline' for hackers last year – Kaseya warns it's going to get worse in 2026News Forget looking for typos and bad grammar, phishing campaigns are using AI to boost their attack success
-
Interpol teams up with tech firms to seize 45,000 malicious IPs, servers in global cyber crime crackdownNews Operation Synergia III saw 94 arrests - and counting - with malicious IP addresses used in phishing and fraud schemes seized
-
'It's destructive, not ransomware': Security experts weigh in on motivation behind Stryker cyber attackNews The attack on medical tech company Stryker has severely impacted operations globally
-
Thousands of Asus routers are being used to fuel a massive cyber crime spreeNews Black Lotus Labs has spotted a massive botnet of Asus routers built by malware that uses a common peer networking tool
-
The rise of teen hackers ‘makes for a good headline’, but cyber crime activities peak later in lifeNews With family responsibilities and mortgages to pay, it's not teenagers dishing out malware or carrying out cyber extortion
-
Is your new hire an AI clone? Microsoft says North Korean hackers are using AI to impersonate job seekers and steal company secretsNews The groups are increasingly using face-changing or voice-changing software to make their fake identities more plausible
-
LastPass issues alert as customers face second major phishing campaign of 2026News The campaign is the third to hit LastPass users in six months
