Cloudbric participates in DTX Europe (Digital Transformation EXPO Europe) held in the UK. DTX Europe is Europe's largest IT exhibition, where experts from various industries such as network and infrastructure, cloud, and security gather for the successful digital transformation of enterprises. Cloudbric introduces its cloud and edge computing security services through this event. ...
Ransom attacks: Double to triple extortion
Cybercriminals, extortionists, and black hat hackers are finding easier and more lucrative ways to make money. They’ve taken the already powerful model of traditional Ransomware and developed a new strain of cyber-extortion. Now, these threat actors are armed with sophisticated extortion tactics, Ransomware-as-a-Service, and new affiliated business models. Th ...
2021 Web Vulnerability Trend Report Released
The second quarter of 2021 Web Vulnerability Trend Report (CVE/EDB Report) has been released. The Web Vulnerability Trend Report (CVE/EDB Report) is a report written by Cloudbric in-house security experts by analyzing the web vulnerability-related matters of Exploit-DB which anyone around the world can check. In this report, It summarizes not only the analysis results of the risk and ...
The report of Web attack trend in the first half of 2021
The report of Web attack trend in the first half of 2021 (WATT Report: Web Application Threat Trend Report) has been released. The web attack trend report is a web attack trend analysis report based on the detection log statistics of Cloudbric WAF+ and Penta Security's WAPPLES, which have been used by companies worldwide. This report is written and distributed for the purpose of prov ...
Cloudbric, Selected as a Supplier for ‘Data Voucher Support Project’
Cloudbric is selected as the supplier of the 'Data Voucher Support Project' hosted by the Korea Data Agency (K-DATA). Cloudbric provides data security services through this project. It provides the latest security information that is difficult to acquire and improves data transparency and reliability through blockchain technology-based management. The information ...
Cloudbric becomes a member of C-TAS and enhances ‘Threat DB’ performance
'Cloudbric', a Cloud security company, announced that they had upgraded the performance of its threat information sharing platform ‘Threat DB’ as Cloudbric joined 'C-TAS', which is a cyber threat information analysis and sharing system operated by the Korea Internet & Security Agency (KISA). Threat information sharing, and constant updates are ess ...
How to know if a website is safe
Internet phishing scams often use fraudulent websites to impersonate legitimate and steal your personal information. But that is not all; a website might be legitimate, but have the wrong intentions. Sites like this typically offer freeware that ends up installing malware, crypto-mining, bloatware, or botnet software. Additionally, it might be that a website is legit and well-intentio ...
How to Prevent SQL Injection
SQL injection attacks are one of the top threats to the security of websites and web applications. In fact, the SQL injection threat has been number one on OWASP’s Top 10 list since it was publicly disclosed more than 10 years ago. SQL injection attacks have caused historic havoc. They have been used to breach the World Health Organization (WTO) database and steal data fro ...
Cloudbric’s Cloud-Based WAF Certified by the National IT Industry Promotion Agency
Cloudbric announced that its cloud-based WAF received a Certificate of Service Quality and Performance in the Cloud Computing SaaS category from the National IT Industry Promotion Agency (NIPA) of Korea. NIPA, the public body responsible for the promotion of the IT industry in South Korea, and the Ministry of Science and ICT (MSIT) of South Korea issue certifications of service qualit ...
Everything You Need to Know About DDoS Attacks Today – 2021
The entire DDoS attack landscape is changing. Although originally intended to inflict damage by utilizing massive traffic, DDoS attacks have become more pervasive, persistent, obscure, and sophisticated. Additionally, the DDoS attack surfaces continue to grow, as IoTs develop and people become increasingly dependent on the internet. This larger “playground,” makes it more con ...