Untitled1

User Feedback Means New Console and Better Results

Today, Cloudbric has launched the upgraded Console 2.0. Cloudbric has received tons of precious customer’s feedback since February last year which helped build the upgraded console and match the voices of the customers. There are quite a few aesthetic changes to point out, however, let us first take you through a deeper look at the data being captured with Console 2.0.   New ...

345

SQL Injection: What Is It and How to Protect Yourself?

SQL Injection attacks can manipulate data or code SQL (Structured Query Language) is a programming language used to create and maintain databases. Its easy syntax and cheap implementation make it one of the most popular tools among programmers. This also means it is well-known by hackers who are always looking for chances to hack your website. SQL Injections are types of injection at ...

board-780323_1920

Can Cloudbric Protect Me From Malware?

Malware can approach your website in many different ways. Lately we've been receiving a lot of questions about malware and how malware can be removed/avoided. In this short article, we'll briefly touch on some subtopics about malware to help clarify exactly what malware is and what it can do. Malware infections are extremely troublesome and can not only cause severe distractions f ...

Untitled

Misconceptions About The Safest IT System

Rarely do things come easy within the business world, especially within the information security sector. Various misconceptions are often made concerning best practices when approaching information security, but hopefully this article can help clear some things up in order to help small/large business pursue cyber protection efficiently and become more familiar with IT structure. Inform ...

SCAWARDS2016_EUROPE_FINALIST_Horiz

Cloudbric Selected as a Finalist for The SC Magazine Awards

On June 7th, SC Magazine will announce the winners for this year's SC Magazine Awards.   SC Magazine announces Penta Security Systems Inc. (Cloudbric’s parent company) as one of seven finalists for this year’s SC Magazine Europe Awards highlighting outstanding leadership within the information security industry. Cloudbric has also been recognized as one of five finali ...

work

Which Industry Is Most Vulnerable To Hacks?

The Dark Web is a hacker's playground.   Previously, we discussed the different industries that are targeted for DDoS attacks. Below, we'll begin by pointing out some interesting industry facts and then look at some examples of how hackers like to get creative with their revenue strategies. Which Industry Is Most Vulnerable To Hacks? Research performed by a Korean media com ...

cloudbric-cloud-300x219-1

How Does Cloudbric Hide Your IP Address?

If you have a website or have interest in owning a website, you might have heard about an IP address one time in your life. Simply, the IP address means that Internet Protocol Address, which is a numerical label that indicates where your website is located. Recently, people have been easily able to discover your original IP address just by typing a one-line code or using a free softwa ...

Cloudbric_WAPPLES_IP

Cyber Defense Magazine Honors WAPPLES

As you may well know, Cloudbric detection technology is based on WAPPLES, the hardware based Web Application Firewall (WAF) product by Penta Security. WAPPLES is known as an intelligent WAF that specializes in minimizing four types of web risks—web hacking, data leakage, malicious access and web defacement. Penta Security was recently honored as the Hot Company in Web Applicatio ...

coding-924920_1920

4 Common Web Vulnerabilities Expected to Surface in 2016

Common Web Vulnerabilities in 2016 Many of the cyber-crimes that have been highlighted in the past few years were made possible due to common web vulnerabilities. Adversaries are finding it easy to pinpoint flaws in web pages, making it trivial for even novice hackers to exploit them. In this post, you’ll learn about four of the most common web vulnerabilities in websit ...

programming-942487_1920

Website Security 101: How Hackers Hack

Did you ever wonder how hackers actually hack a website? We often hear in the news that a website was hacked—ending up with millions of customers’ personal data being compromised and often times ending up with identity theft. However, how exactly do hackers steal all that precious customer information? In order to properly hack, hackers understand how the website is b ...