Parameter tampering can manipulate web applications As we all know, many data breaches are caused by web attacks. A large majority of web attacks aim to access or send unauthorized requests to a web server in order to disclose outgoing sensitive data coming from the web server. To protect against these attacks, Cloudbric works hard to not only monitor incoming website traffic, but to also analyze all outgoing information coming from an internal source. Hackers can
Cloudbric Tips & Tricks   ,
Check out our latest infographic for web attack trends for the first half of 2015. This data is based on WAPPLES (Penta Security’s hardware WAF appliance) and Cloudbric (Cloud WAF) customer web traffic data from January to June 2015. All customers consented to the collection and dissemination of web attack data. Web Attack Infographic Look for the latest news in cybersecurity on our blog:
Web Attacks & Trends   ,
As cybersecurity threats continue to increase, corporations’ cybersecurity budgets continue to grow. In recent years, in order to protect their cyber assets, companies have started investing in strong programming talent, robust cybersecurity internal protocols and even higher physical security in their facilities. However, when companies come to the decision to choose a protection service for their web apps, they often overlook key criteria. Does your web app have a low false positive rate? Web apps
Web Security Tips   ,
We, at Cloudbric, tell our users that we are here to help their websites grow. Whether you need web protection because you are running an e-commerce website or you just love IT, we want to protect your website—big or small. But, we wanted to hear directly from our users about how they felt about our comprehensive web protection. So, we spoke with two Cloudbric users, Selena, an online small business owner, and Victor, an IT
We, at Cloudbric, are always looking to help you grow your website and protect it. So, when we heard that you guys had some questions about Cloudbric registration, we listened and created a registration guide to help you step-by-step. There are two ways to finalize Cloudbric registration, and get free comprehensive website security. Before getting started check out our introductory video below! Web Traffic and Name Servers All web URLs are actually recognized by computer
Cloudbric Tips & Tricks  
Cloudbric recently traveled to Singapore to officially sponsor the SPH Plug and Play Demo Day on October 21st, 2015. SPH Plug and Play is the leading South East Asian startup accelerator located in Singapore. The Cloudbric team sent its representatives to Singapore to help raise awareness for cybersecurity and also to give a great panel discussion about the importance of cybersecurity for SMBs and startups. Check out some of these great photos from our time in Singapore!
Web security seems to be the buzzword in the news the past couple of years with stories of legendary hacks hitting companies like Target, Home Depot, J.P. Morgan, and Sony—just to name a few. However, because we always hear about these hacks happening to big and established companies, we often  think that these kinds of attacks will never happen to us. After all, why would a hacker want to attack a small business when they
Web Security Tips  
If you take a look in any online hacking forum, you’ll find the buzz term “DDoS attack.” Since 2014 alone, the occurrences of DDoS attacks have increased by +132.4%. To normal people, DDoS attacks seem to work like magic—sending a flood of zombie bots that can overwhelm a web app and shut it down. With so much power and chaos, if a website is caught off guard without proper defenses, it is shut down in
Web Attacks & Trends  
There are a litany of reasons why hackers want to hack a website. Back in the day, during the initial inception of the internet and its capabilities, hackers might have hacked websites to boost their egos or to show off that they were capable of pulling off such tasks. Essentially, hacking was synonymous with a “look at what I can do!” mentality. These days, the internet landscape is much more robust and complicated than the
Web Security Tips  
“You’ve Got Mail.” If you know exactly what I’m talking about, then you were probably born before 1990, and you may not be considered as a candidate for the next generation of cyber professionals; however, your role is still vital to these budding Internet savants. Try to think back to 20 years ago ­– do you remember that the extent of our cyber lives meant sending an email to your classmates or talking to strangers
Editorial   ,