Cloudbric Progress Report (9/26 ~ 10/8)

  1. Tech Developments
  • Malicious IP(Blacklist IP) Block function updated in Cloudbric user Console
  • Cloudbric has updated the list of Malicious IP addresses (Blacklist IP) based on more advanced, reliable standards. In line with this new standard, the Malicious IP data is updated daily, which is then stored using blockchain technology.
    This integration of cybersecurity threat data with blockchain technology is significant as it is a first attempt for any security company to tie blockchain with security data.
    Currently only Cloudbric provides services based on blockchain-integrated Malicious IP list, but we hope to extend the data usage to other companies via API, for a safer, more secure online environment for everyone.
  • Planning for technology application in progress.
  • Reviewing the direction of cryptographic communication technology and seeking ways to implement it
  • Implementation plans for application under review
  • Planning details on design and server deployment architecture
  • Revisions for improvements regarding source code and engine.
  • Review of additional lists to be included in the supervised learning of the Deep Learning Engine
  • Ongoing review of different learning strategies by domain
  • Cloudbric has been selected to participate in ‘Go, Virtual! K-Solution Fair’ hosted by National IT Industry Promotion Agency (NIPA) of Korea. This year’s K-Solution fair is the first-ever virtual event, where Korea IT Cooperation Center, Singapore branch, will introduce 19 Korean companies that specialize in Digital Transformation and Enterprise Innovation to buyers, resellers, and distributors in Singapore and bordering Southeast Asian Countries. Join us, and explore the suite of security solutions from Cloudbric at ‘Go, Virtual! K-Solution Fair’ on Thursday, October 15th and Friday, 16th through this link: https://k-solution.vfairs.com/
  • Cloudbric is also honored to present a Live Webinar at the same event: ‘Go, Virtual! K-Solution Fair,’ a speaking slot given to only 4 of the participating companies. Please join in the webinar to learn more about “Evolving Web Threats, and Smart Web Security” on Thursday, October 15th, 12:20 PM (Korean Standard Time). (Webinar Link: https://zoom.us/w/95547349459?tk=S0jsolXrJ1ORDjwhN67ZFk0pkByGYg08ddeGjvYxlA4.DQIAAAAWPxDZ0xY0T2k0aktKNVN3Q2ZGbldzUXhLcUhBAAAAAAAAAAAAAAAAAAAAAAAAAAAA)
  • Hackers abuse Windows error service in fileless malware attack — Bleeping Computer
    An unknown hacking group injected malicious code within the legitimate Windows Error Reporting (WER) service to evade detection as part of a fileless malware attack as discovered by Malwarebytes researchers last month. Exploiting the WER service in attacks for defense evasion is not a new tactic but, as Malwarebytes Threat Intelligence Team researchers Hossein Jazi and Jérôme Segura said, this campaign is most likely the work of a yet unknown cyber espionage group.
  • UN maritime agency says it was hacked — ZDNet
    The United Nations International Maritime Organization (UN IMO) disclosed a security breach over the weekend that the agency categorized as a “sophisticated cyber-attack” against its IT systems. The incident was discovered on Thursday and impacted the IMO public website and other web-based services, the UN agency said in a press release.
  • Customer records stolen in data breach of Asian food delivery service Chowbus — Silicon Angle
    Asian food delivery service Chowbus, owned by Fantuan Group Inc., has suffered a data breach with hundreds of thousands of customer records stolen. Exactly how the data breach took place is not known. The stolen data included customer names, email addresses, phone numbers and email addresses. Credit card data was not accessed.

--

--

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store