Greetings, from Cloudbric.
Here’s the latest from Cloudbric: for March 13th to March 26th.
- Technology Developments
*ADDoS(Advanced DDoS Protection) Dashboard
→ Development of ADDoS Dashboard for client UI: 95% complete (estimated time of completion: 2021 1Q)
- Technical coverage review completed
- DB design and back-end development completed
- Functional testing complete
- New Dashboard features being added
*Blockchain service development
→ Development of database management based on blockchain technology: 20% complete (estimated time of completion: 2021 2Q)
- Technical review in progress
→ New product development re: CLBK Tokens : 15% complete (estimated time of completion: 2021 3Q)
- Technical review in progress
*Remote Access Solution
→ Supported protocols added: 40% complete (estimated time of completion: 2021 2Q)
→ Cloudbric now provides a stronger infrastructure security for the service. The updated dashboard and report presents users with usage and service status for a better user experience.
- Technical review completed
- New system components and coverage reviewed
- Frontend UI planning in progress
*Cloudbric Labs (cyber threat information data platform based on blockchain technology)
→ Support for Hacker Wallet Address and Phishing URL API: 40% complete (estimated time of completion: 2021 1Q)
- Updated the Hacker Wallet Address and Phishing URL list.
- API implementation methods analysis.
- Development of the APIs and related technical documents.
*Cryptobric v2.0
→ Mobile App for securing your digital assets with CLBK wallet support
→ Users can view and transfer funds (either CLBK, Cloudbric’s own cryptocurrency or KLAY, a Klyatn cryptocurrency) in ‘Klip’ wallet, integrated into Cryptobric(2020.12). Check our medium post below for a step-by-step guide for integrating Klip!
*Klip: a digital asset wallet for Klaytn-based cryptocurrencies from Kakao
> http://reurl.kr/4CEECD3DOL
*Cryptopbric — SWG
→ Encrypted personal information and secured internet connection: 45% complete(Hacker Wallet Address and Phishing URL API Blocking) (estimated time of completion: end of 2021 2Q)
- Reviewing the direction of cryptographic communication technology and seeking ways to implement it.
- Planning details on design and server deployment architecture.
*VISION (Deep Learning Security Engine) Commercialization
→ Source code analysis for VISION commercial structuring VISION: 30% Complete (estimated time of completion: end of 2021 2Q)
→ Commercial module development: 30% complete(estimated time of completion: end of 2021 2Q)
- Revisions for improvements regarding source code and engine.
- Review of additional lists to be included in the supervised learning of the Deep Learning Engine.
- Ongoing review of different learning strategies by domain.
2. Cloudbric News
- Cloudbric was invited to participate in the “ATISI Digital Forum: Cybersecurity and Data Protection in 2021 and Beyond” to share their technical expertise in web security. The ATISI Digital Forum, organized by the Association of Technology for Security Industry Indonesia on March 25, was a chance for the cybersecurity community of Indonesia, and in a broader sense Southeast Asia to connect.
- Mr. Albert Oh, Head of Global Business represented Cloudbric at the Forum; He spoke about artificial intelligence (AI) in web security and Cloudbric’s endeavors to innovate the detection engine in its web application firewall (WAF).
> Cloudbric Blog : https://www.cloudbric.com/blog/2021/03/cloudbric-atisi-digital-forum-2021/
> Cloudbric twitter : https://twitter.com/cloudbric/status/1375261858483957762
> Cloudbric linkedin : https://www.linkedin.com/feed/update/urn:li:activity:6781027956052557824
> Cloudbric facebook : https://www.facebook.com/cloudbric/posts/2913339525603619
3. Security News
- FatFace tells customers to keep its data breach ‘strictly private’ — TechCrunch
Clothing giant FatFace sent an email to customers this week disclosing that it first detected a breach on January 17. A hacker made off with customers’ names, email and postal addresses, and the last four digits of their credit cards. But despite going out to thousands of customers, the email said to “keep this email and the information included within it strictly private and confidential,” an entirely unenforceable request. - Facebook says Chinese hackers used its platform in targeted campaign to infect, surveil user devices — ZDNet
Facebook said it has disrupted a network of hackers tied to China who were attempting to distribute malware via malicious links shared under fake personas. The social network’s cyber espionage investigations team has taken action against the group, disabled their accounts, and notified the roughly 500 users who were targeted. - 9,000 employees targeted in phishing attack against California agency — SC Media
A California state agency was victimized by a phishing incident last week in which an employee clicked on a link that provided access to the employee’s account for some 24 hours. During that time, the attackers allegedly stole social security numbers and sensitive files on thousands of state workers and then sent targeted phishing messages to at least 9,000 other state workers and their contacts.