Greetings, from Cloudbric.
Here’s the latest from Cloudbric: for August 1st to August 14th.
- Tech Developments
*Cloudbric Labs (cyber threat information data platform based on blockchain technology)
→ Malicious IP (Blacklist IP) Block service in development: 80% complete (estimated time of completion: 2020 3Q)
→ Support for Hacker Wallet Address and Phishing URL API: 30% complete (estimated time of completion: 2020 3Q)
- Plans to develop a service that blocks all Malicious IPs(Blacklist IP) using the ‘Blacklist IP API’
- Analysis for method of implementing Blacklist IP API completed
- Completed server load test after applying Blacklist IP API
- Front UI/UX for cybersecurity (blocking malicious traffic) completed
- Front UI integration with Malicious IP (Blacklist IP) API completed
- Functions/QA testing in progress.
→ Deposit/withdrawal feature update : 90% complete (estimated time of completion: 2020 3Q)
- User Account feature development completed (New user registration, login, etc.)
- Deposit/withdrawal functions development completed
- Functions/QA testing in progress.
→ Internet Communication Encryption App for Personal Information Protection : 45% complete (estimated time of completion: end of 2020 3Q)
- Planning for technology application in progress.
- Reviewing the direction of cryptographic communication technology and seeking ways to implement it
- Implementation plans for application under review
- Planning details on design and server deployment architecture
*VISION (Deep Learning Security Engine) Commercialization
→ Source code analysis for VISION commercial structuring VISION: 45% Complete.
→ Commercial module development: 25% complete.
- Revisions for improvements regarding source code and engine.
- Review of additional lists to be included in the supervised learning of the Deep Learning Engine
- Ongoing review of different learning strategies by domain
2. Business and Marketing Side Update
Cloudbric security services are gaining popularity in the Japan market. In order to increase brand awareness and expand business opportunities in the Japanese market, meetings with regional partner candidates and partnership agreements with 7 companies have already been made this year, and we plan to further expand regional partners in the future. (Tokyo-3, Osaka-1, Yokohama-1, Fukuoka-1, Hiroshima-1)
- TikTok Surreptitiously Collected Android User Data Using Google-Prohibited Tactic — Threat Post
App concealed the practice of gathering device unique identifiers using an added layer of encryption. TikTok has been collecting unique identifiers from millions of Android devices without their users’ knowledge using a tactic previously prohibited by Google because it violated people’s privacy, new research has found.0.
- Open Source Supply Chain Attacks Surge 430% — Infosecurity Mmagazine
Security experts are warning of a 430% year-on-year increase in attacks targeting open source components directly in order to covertly infect key software supply chains. There were 929 attacks recorded between July 2019 and May 2020, according to Sonatype’s annual State of the Software Supply Chain report.
- In one click: Amazon Alexa could be exploited for theft of voice history, PII, skill tampering — ZDNet
Amazon’s Alexa voice assistant could be exploited to hand over user data due to security vulnerabilities in the service’s subdomains. The smart assistant, which is found in devices such as the Amazon Echo and Echo Dot — with over 200 million shipments worldwide — was vulnerable to attackers seeking user personally identifiable information (PII) and voice recordings.