Zero trust, zero phish
Protecting against deceptive and dangerous link-based attacks
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
You are now subscribed
Your newsletter sign-up was successful
Link-based attacks have become the go-to method for stealing credentials, loading malware/ransomware, and extracting sensitive information. Join this webinar to learn how organizations can proactively insulate their workforce from malicious web content that comes through email, text messages, instant messaging, social media, cloud productivity apps, and more.
As modern phishing attacks become more deceptive, even the best trained security solutions struggle to accurately identify malicious links 100% of the time. Link shorteners further complicate this problem by enabling deferred attacks, where malicious links embedded in emails are activated post-delivery, effectively evading inbound security controls.
While email is still the primary delivery mechanism for malicious links, attackers have expanded their tactics beyond just email, engaging users across various applications used for daily collaboration. This attack technique, known as multi-channel phishing, has emerged as a preferred method for exposing users to a wide range of threats.
Join us to learn more about:
- Why deferred and multi-channel attacks are becoming more popular (and dangerous!)
- How attackers target users across various applications used for daily collaboration
- How to thwart link-based attacks that bypass traditional security controls
- How Cloudflare’s proprietary isolation technology protects users without them knowing
Provided by Cloudflare
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
ITPro is a global business technology website providing the latest news, analysis, and business insight for IT decision-makers. Whether it's cyber security, cloud computing, IT infrastructure, or business strategy, we aim to equip leaders with the data they need to make informed IT investments.
For regular updates delivered to your inbox and social feeds, be sure to sign up to our daily newsletter and follow on us LinkedIn and Twitter.
-
Low-budget devices are the biggest casualty of the RAM crisisNews Say goodbye to budget devices; vendors are doubling down on high-end options to absorb costs
-
Sectigo taps Clint Maddox to lead global field operationsReviews The appointment follows a year of strong momentum for the security vendor as it expands its global channel footprint
-
The rise of teen hackers ‘makes for a good headline’, but cyber crime activities peak later in lifeNews With family responsibilities and mortgages to pay, it's not teenagers dishing out malware or carrying out cyber extortion
-
Is your new hire an AI clone? Microsoft says North Korean hackers are using AI to impersonate job seekers and steal company secretsNews The groups are increasingly using face-changing or voice-changing software to make their fake identities more plausible
-
LastPass issues alert as customers face second major phishing campaign of 2026News The campaign is the third to hit LastPass users in six months
-
DIY hackers are turning to ‘flat-pack’ malware components to speed up attacks and cut costsNews While these malware campaigns are very basic, researchers noted “they still work”
-
A single compromised account gave hackers access to 1.2 million French banking recordsNews Ficoba has warned that “numerous” scams are already in circulation following the data breach
-
Starkiller: Cyber experts issue warning over new phishing kit that proxies real login pagesNews The Starkiller package offers monthly framework updates and documentation, meaning no technical ability is needed
-
‘They are able to move fast now’: AI is expanding attack surfaces – and hackers are looking to reap the same rewards as enterprises with the technologyNews Potent new malware strains, faster attack times, and the rise of shadow AI are causing havoc
-
Ransomware gangs are using employee monitoring software as a springboard for cyber attacksNews Two attempted attacks aimed to exploit Net Monitor for Employees Professional and SimpleHelp
