Magecart and Card Skimming Detection

What is Magecart? Magecart is a type of cybercriminal group that specializes in stealing credit card information from online stores (a.k.a card skimming). The group’s attacks typically involve injecting malicious code into the checkout pages of e-commerce websites to steal payment card data from customers. The Magecart group is known to have targeted numerous high-profile […]
What’s New in PCI-DSS v4.0: HTTP Header Tamper Detection

PCI-DSS is a set of security standards designed to ensure that all companies that accept, process, store or transmit credit card information maintain a secure environment. This article is part of a series of articles under the “What’s New in PCI-DSS v4.0” series where we explore what has changed in PCI-DSS moving to version 4, […]
What’s New in PCI-DSS v4.0: Payment Page Javascript Monitoring

PCI-DSS is a set of security standards designed to ensure that all companies that accept, process, store or transmit credit card information maintain a secure environment. This article is part of a series of articles under the “What’s New in PCI-DSS v4.0” series where we explore what has changed in PCI-DSS moving to version 4, […]
Anyone can enumerate your web server using port scanning tools

In this video, we will discuss how hackers can easily enumerate your web server and potentially find vulnerabilities that they can exploit. It is important to understand how these attacks work so that you can take steps to protect your server and your website. We will walk through the process of enumeration, including common tools […]
Port Scanning – Exposing Your Network’s Points Of Entry

In computer networking, ports are points of entry to your computer – virtual origins and/or destinations of network connections. Port number definition and standardisation is overseen by the Internet Assigned Numbers Authority (IANA). Based on the list maintained by IANA, there are three types of ports amongst the total number of 65536: 1. Well-known ports […]
Enumerate, Secure and Detect changes in DNS records

In this video, we will be sharing with you why your DNS records are important. How an outsider can conduct DNS enumeration to determine the attack surface. What can you do to hide and secure your DNS records. What are some tools WebOrion provide that can detect changes to the DNS records.
DNS – A Brief Summary of an Easily Overlooked System

As a website owner, one would surely come across the Domain Name Service (DNS). DNS is an extremely critical system on the Internet, as it is a system that helps translate domain names (which are easily recognisable and remembered) into IP addresses. It is important for all website owners to know and understand the DNS. […]
Seamless Integration with the WebOrion® API

Discover what is the WebOrion® API and the benefits of integrating the API with various systems such as Content Management Systems like WordPress, and in the coming days, SIEM and SOAR systems. Our simple and easy-to-follow demonstration will also show you how to seamlessly integrate the WebOrion® API with your WordPress system through the use […]
The Serverless Model for the Uninitiated

“Serverless” is a buzzword that is thrown around especially in the cloud industry. For the inexperienced, it may seem intuitive – “server” and “less”. It does not mean having less servers, but it actually refers to lesser (or no) management of servers. Serverless services allow developers to build and run applications without the need to […]
A secure and trusted website through SSL certificates

In today’s digital age, most of our personal and financial information is stored in the internet. The recent data breaches have shown that our online security is not as safe as we thought it was. It is time to rethink how we use the internet and what we can do to protect ourselves, and in […]