Greetings, from Cloudbric. Here’s the latest from Cloudbric: for January 1st to January 31st.1.Technology Developments*Cryptobric App Update → Identity Authentication Enhancement (Travel Rule Compliance) : 20% complete (estimated time of completion: end of 2022 1Q) Travel Rule regulation — Technical review in progress → v3.0 SWG(Secure Web Gateway) SMS Phish ...
[Weekly Security News] Umbrella company Parasol confirms data breach linked to cyber-attack five weeks ago
February 18, 2022 1. Umbrella company Parasol confirms data breach linked to cyber-attack five weeks ago Umbrella company, Parasol has confirmed that some data had been copied and leaked online due to a cyber attack on its systems. An umbrella company employs contractors working on temporary assignments or contracts. It has at least 13,000 contractors. The IT team of the umbrella c ...
What are the security measures for the web application attacks, the No.1 information leakage accident
What are the security measures for the web application attacks, the No. 1 information leakage accident It is no longer an exaggeration to say that more than half of daily life is done through the web, such as shopping at the Rakuten market or researching necessary information on Google. In the case of companies, online business is essential now. However, the web doesn't just bring ben ...
DDoS: The Past is the Future
DDoS: The Past is the FutureDistributed denial-of-service (DDoS) attacks are one of the oldest weapons in the hacker’s arsenal, nearly as old as the Internet itself.The U.S. Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency defines DDoS as the following:“A denial-of-service (DoS) attack occurs when legitimate users are unable to access i ...
WAAP: Trends, Best Practices and Cloudbric
WAAP: Trends, Best Practices and CloudbricThe term Web Application and API Protection (WAAP) was coined by Adam Hils and Jeremy D’Hoinne of Gartner in 2017 to refer to largely cloud-based services designed specifically to safeguard APIs and web applications.According to Gartner, “WAAP development started with cloud-delivered WAF services that were easier to deploy, and from t ...
[Weekly Security News] Biden’s latest security message is based on ‘Zero Trust’
February 11, 2022 1. Biden’s latest security message is based on ‘Zero Trust’ The Biden administration issued its latest memorandum relating to cybersecurity in January 2022. Paul Martini, CEO of Zero trust cloud security firm iboss looked into NIST(National Insititute of Standards and Technology) Special Publication 800-207 which shows the core components of Zero Trust principles and ...
Cloudbric Wins 4 Golds and 5 Silvers in Cybersecurity Excellence Awards
Cloudbric, the No.1 cloud-based website security provider in the APAC region, has earned the prestigious 4 Golds and 5 Silvers in the 2022 Cybersecurity Excellence Awards.Cloudbric has been recognized as a gold winner in Web Application Security, Website Security, Zero Trust Security and Best Cybersecurity Startup of ASIA in Cybersecurity Company and Cybersecurity Product & Service ...
Cloudbric Wins 4 Golds and 5 Silvers at 2022 Cybersecurity Excellence Awards
Cloudbric, No.1 cloud-based website security provider in the APAC , has been awarded a total of 9 awards for the 2022 Cybersecurity Excellence Awards! Cloudbric, the No.1 cloud-based website security provider in the APAC region, has been awarded in the “Cybersecurity Company” & “Cybersecurity Product / Service” categories, and received 4 ...
Cloudbric defends rapidly increasing ransom DDoS attacks with Cloud security services
‘Cloudbric’ warned of the maliciousness and risk of ransom DDoS attacks and introduced the successful defense case of their 'ADDoS' cloud service Distributed Denial of Service (DDoS) is an attack that renders a web server inoperable by sending abnormally large amounts of traffics. It is classified as the most malicious attack because it is a type of attack that exploits t ...
What are the four points to check when choosing a WAF?
Recently, As cyberattacks targeting vulnerabilities in web applications for companies have frequently occurred, the number of companies implementing a WAF as a countermeasure are increasing. There are various products on the market at present, but this time we will focus on four points to look at when choosing a WAF, as to what criteria should be selected. A WAF is an abbreviation ...