
Diligent teams with Cloudflare, Qualys to deliver cyber risk tool
Diligent has announced a partnership with Cloudflare and Qualys to provide a new cyber risk reporting solution designed for boards and both executive and security leaders.
The Cyber Risk Report, now available on the Diligent One Platform, integrates Cloudflare's real-time threat intelligence and Qualys' cyber risk surface insights with Diligent's cyber risk dashboard. The solution is intended to provide a holistic, real-time view of the most pressing cyber threats facing organisations and to support strategic decision-making among board members and executives.
Brian Stafford, President and Chief Executive Officer of Diligent, said: "In today's complex cyber landscape, boards and executives are demanding faster access to insights. The new Cyber Risk Report provides a holistic view of an organisation's risk posture, mitigating the chance of vulnerabilities to high impact threats. Combined with Diligent's AI-powered risk and governance solutions, this report arms CISOs with the tools for proactive risk management and strong cybersecurity governance."
Diligent's recent 2025 What Directors Think report revealed that while 61% of directors acknowledge the strategic risks from cyber threats, nearly 30% of boards still do not receive regular security updates. The report underscores the challenges that security teams face, including an overload of data, constant emergence of software vulnerabilities, and new risks associated with AI tools.
The new Cyber Risk Report aims to bridge this gap by merging internal controls data, third-party threat intelligence, and business context into a single, executive-focused resource. Its real-time integrations with Cloudflare and Qualys are designed to remove the need for manual reporting cycles and reliance on spreadsheets, streamlining processes such as control testing, evidence collection, and issue remediation through automation.
Grant Bourzikas, Chief Security Officer at Cloudflare, commented: "Severe repercussions of recent attacks, and new threats posed by emerging technologies have moved cyber to the forefront of business leaders' concerns. And while the reckoning that cyber is at the crux of enabling business has finally come, communicating risk clearly, in business terms, is still a major challenge for CISOs. The Cyber Risk Report - underpinned by Cloudflare's telemetry, based on our global network that's one of the largest in the world - will enable security leaders to pinpoint exact relevant issues, overlay them with comprehensive context and ultimately provide clarity to the board on the overall state of your organisation's resilience."
The development of the Cyber Risk Report included feedback from more than 50 chief information security officers and board members. The report offers features such as built-in trend analysis, peer comparisons, and intuitive dashboards, designed to help CISOs prioritise vulnerabilities according to their business impact and convey actionable recommendations to boards. The collaboration allows integration of technologies from both Cloudflare and Qualys into the Diligent One Platform and is intended to provide a basis for future cyber security solutions.
Rich Seiersen, Chief Risk Tech Officer of Qualys, said: "CISOs don't need more dashboards; they need a smarter, business-focused strategy. At Qualys, we help our customers be more effective at measuring, communicating and eliminating their cyber risk with the Risk Operations Center (ROC). Together with Diligent and Cloudflare, we're redefining how cyber risk is communicated to the board, translating technical data into the financial language of business - dollars and cents. At the same time, we're empowering CISOs with clear, actionable insights to manage their risk surface, drive down risk, boost efficiency and elevate security as a true business enabler."
The partnership is expected to address the ongoing challenges faced by security teams in translating technical cyber risk data into information that is meaningful for business and board-level decision-making.
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


Techday NZ
2 days ago
- Techday NZ
Cloudflare thwarts record 7.3 Tbps DDoS attack with automation
Cloudflare has confirmed it recently mitigated what it describes as the largest distributed denial-of-service (DDoS) attack ever publicly disclosed, clocking in at 7.3 terabits per second (Tbps), surpassing previous known records. The attack, which occurred in mid-May 2025, targeted a hosting provider customer utilising Cloudflare's Magic Transit service for network defence. According to Cloudflare data, this incident follows closely on the heels of attacks recorded at 6.5 Tbps and 4.8 billion packets per second, illustrating that DDoS attacks are continuing to increase in both scale and complexity. Cloudflare stated that the 7.3 Tbps attack was 12% larger than its previous record and 1 Tbps greater than another recent attack reported by security journalist Brian Krebs. Attack analysis The 7.3 Tbps DDoS attack delivered a total of 37.4 terabytes of data within a 45-second window. During the attack, the targeted IP address was bombarded across an average of 21,925 destination ports, reaching a peak of 34,517 destination ports per second. The distribution of source ports mirrored this targeting method. The attack employed several vectors but was dominated by UDP floods, constituting 99.996% of total traffic. The residual traffic, amounting to 1.3 GB, involved QOTD reflection, Echo reflection, NTP reflection, Mirai UDP floods, Portmap flood, and RIPv1 amplification techniques. Each vector was identified and catalogued, with Cloudflare detailing how organisations could protect both themselves and the broader Internet from such forms of abuse. Cloudflare explained that the UDP DDoS component worked by sending large volumes of UDP packets to random or specific destination ports, either to saturate the Internet link or overwhelm network appliances. Other vectors, such as the QOTD (Quote of the Day), Echo, NTP, Portmap, and RIPv1, exploited vulnerabilities in legacy protocols and services to reflect and amplify attack traffic onto target systems. Global scale The attack was notable for its global reach. Traffic originated from more than 122,145 source IP addresses across 5,433 autonomous systems in 161 countries. Nearly half of the attack traffic came from Brazil and Vietnam, accounting for around twenty-five percent each. The remainder was largely attributable to sources in Taiwan, China, Indonesia, Ukraine, Ecuador, Thailand, the United States, and Saudi Arabia. At an autonomous system level, Telefonica Brazil (AS27699) contributed 10.5% of attack traffic, with Viettel Group (AS7552), China Unicom (AS4837), Chunghwa Telecom (AS3462), and China Telecom (AS4134) among the other major sources. The attack saw an average of 26,855 unique source IP addresses per second, peaking at 45,097. Technical response Cloudflare utilised the global anycast architecture to divert and dissipate the massive influx of traffic. As packets arrived at Cloudflare's network edge, they were routed to the closest data centre. This incident was managed across 477 data centres in 293 locations worldwide, with some regions operating multiple facilities due to traffic volume. Detection and mitigation were handled by Cloudflare's automated systems, which operate independently in each data centre. The Cloudflare global network runs every service in every data centre. This includes our DDoS detection and mitigation systems. This means that attacks can be detected and mitigated fully autonomously, regardless of where they originate from. Upon arrival, data packets were intelligently distributed to available servers where they were sampled for analysis. Cloudflare employed the denial of service daemon (dosd), a heuristic engine that reviews packet headers and anomalies for malicious patterns. The system then generated multiple permutations of digital fingerprints specific to the attack, seeking patterns that maximised blocking efficacy while minimising impact on legitimate traffic. Within data centres, real-time intelligence was shared by servers multicasting fingerprint information, refining mitigation on both a local and global scale. When a fingerprint surpassed predefined thresholds, mitigation rules were compiled and deployed as extended Berkeley Packet Filter (eBPF) programs to block the offending traffic. Once the attack ceased, associated rules were removed automatically. Botnet feed and future mitigation Cloudflare also maintains a free DDoS Botnet Threat Feed to help Internet service providers and hosting companies identify malicious traffic originating within their own infrastructure. The company said that over 600 organisations have subscribed to this service, allowing them to receive up-to-date lists of offending IP addresses engaged in DDoS attacks. Recommendations from Cloudflare emphasise tailored defences to address the unique characteristics of each network or application, with care taken to ensure that mitigation steps do not inadvertently disrupt legitimate traffic, particularly for services that depend on UDP or legacy protocols. Cloudflare's team highlighted that these successful defences occurred entirely without human intervention, alerting, or incident escalation, underscoring the shift towards fully autonomous, distributed mitigation strategies in response to modern DDoS threats.


Techday NZ
11-06-2025
- Techday NZ
Diligent adds AI tools to Entities for faster, smarter governance
Diligent has introduced new artificial intelligence features to its entity management software, Diligent Entities, aimed at improving access to corporate records for legal, tax, finance and audit professionals. The updated solution now includes a refreshed user interface and several AI assistants. According to Diligent, these enhancements are designed to make essential corporate data more easily accessible and to integrate with existing enterprise tools, such as Microsoft Teams, to further streamline workflows. AI integration Diligent Entities now leverages purpose-trained AI to summarise, validate and share key insights from large data sets within a corporate record. This move is expected to increase efficiency and reduce risks associated with manual data management. The AI tools also aim to improve the accuracy of data, with automatic tagging and summarisation of documents included as part of the enhancements. Four major capabilities have been introduced with this software release: an AI report generator and charting tool, AI-powered integration with Microsoft Teams, automated document import and summarisation, and an AI virtual assistant. The report generator allows users to create customised reports and charts with simple prompts, ensuring information is always current and relevant. The deeper integration with Microsoft Teams enables governance data to be accessed and queried directly inside the Microsoft application. With the AI-powered assistant, employees can obtain instant answers to questions about entity data, supporting a self-service model within organisations. Increasing demand Organisational pressures from regulatory changes, workforce reductions in legal departments, and the widening complexity of compliance across multiple jurisdictions are cited by Diligent as key reasons for the expansion of AI functionality in its platform. The company notes that more than 70% of legal departments plan to increase AI usage over the next three years, seeking to maintain security and responsible AI practices while improving operational scale. Diligent says the new features help organisations avoid risk, improve data integrity, and boost productivity throughout the entity management workflow. Users, who number over 100,000 monthly for Diligent Entities globally, will now be able to intuitively access and analyse governance information in ways that are designed to align with modern GRC demands. Corporate commentary Amanda Carty, General Manager, Compliance, at Diligent, commented on the new capabilities: Our new AI capabilities in Diligent Entities are designed to empower our customers with a trusted, AI engine allowing them to find director and entity information faster, create reports and visualisations on the fly and establish a self-service model for peers. By integrating these capabilities within the Diligent One Platform, we are creating a seamless, closed-loop governance system that keeps all stakeholders aligned and informed. Product ecosystem The addition of AI enhancements to Diligent Entities aligns with the company's wider strategy, which includes previous launches such as GovernAI and AI Risk Essentials, as well as the recent acquisition of Vault Platform, an AI-driven ethics and compliance solution. These moves indicate an ongoing investment in artificial intelligence as part of Diligent's broader approach to governance, risk, and compliance software solutions.


Techday NZ
09-06-2025
- Techday NZ
ClickFix phishing surge spoofs Booking.com to target hotels
Research from Cofense Intelligence has identified a series of phishing campaigns targeting hotel chains in the accommodation and food services sector. These campaigns have been ongoing since November 2024, with a significant increase observed in March 2025, accounting for 47% of the total campaign volume. The phishing emails impersonate directing recipients to a fake CAPTCHA website that prompts them to run a malicious script. This method of malware delivery, known as a ClickFix attack, is designed to convince users to execute scripts which install remote access trojans (RATs) or information-stealing malware. ClickFix attacks are distinguished by their use of fake CAPTCHA screens that convincingly mimic brands such as and Cloudflare. When users interact with these fake verifications, they are instructed to carry out steps, such as using Windows keyboard shortcuts, to inadvertently run a malicious script. This script is commonly delivered through users' clipboards, typically triggered by a specific button on the fraudulent site. Analysis from Cofense Intelligence shows that 75% of campaigns using fake CAPTCHAs employed spoofing templates, while other less frequent variants mimic Cloudflare Turnstile CAPTCHAs and cookie consent banners. Among these, 64% delivered RATs, 47% information stealers, and 11% were observed distributing both types of malware. This campaign has been increasing in popularity since November 2024, with 47% of total campaign volume being from March 2025 alone. 75% of all active threat reports (ATRs) with fake CAPTCHAs used ClickFix templates. Other notable but rare ClickFix templates include Cloudflare Turnstile-spoofing and cookie consent banner-styled templates. 64% of campaign ATRs delivered RATs, 47% of campaign ATRs delivered information stealers, and 11% of campaign ATRs were seen delivering both RATs and information stealers. 53% of all campaign ATRs deliver XWorm RAT, making it the most popular RAT used in these campaigns. Pure Logs Stealer (19% of ATRs) and DanaBot (14% of ATRs) are the most popular information stealers for these campaigns. The most commonly observed malware is the XWorm RAT, present in 53% of the analysed campaigns. Other malware includes Pure Logs Stealer and DanaBot, making up 19% and 14% of cases, respectively. The content and tone of the phishing emails have evolved since the campaign's inception. Earlier messages featured generic or vague language, whereas more recent examples exploit concerns over guest satisfaction and incorporate references to specific guest reservations. These tactics are designed to elicit a response and drive the recipient to interact with malicious links. Some emails specify that the link will only function on Windows, and the recipients who access the site on other operating systems receive a message indicating this limitation. The malicious scripts are typically delivered as PowerShell commands or Microsoft HTML applications, which, once executed, can install RATs or steal data from victim devices. ClickFix is described as a technique for persuading victims to run malicious Windows scripts themselves, often by pasting code into the Windows Run command prompt. Sometimes, these scripts are obfuscated to appear as verification codes, increasing the likelihood that the user will not recognise them as harmful. In addition to fraudulent CAPTCHA screens, recent campaigns include cookie consent banners that prompt users to run malicious scripts under the pretext of accepting cookies.