WebOrion® launches Javascript Malware Detection Engine (JME)

WebOrion® is pleased to announce the launch of our new Javascript Malware Detection Engine(JME). The JME adds to the powerful capabilities of our WebOrion® Monitor to detect defacements, malicious scripts and other website threats. Today, practically every website uses JavaScript. The power and flexibility of a scripting language embedded within the browser has allowed websites […]

AWS CloudGoat and mitigation strategies: Part 5

AWS Cloudgoat and mitigation strategies Part 5 This is part 5 of the series on AWS Cloudgoat Scenarios and the mitigation strategies. This part of the article presumes that Cloudgoat has already been configured. Please refer to part 1 of this series to see how to install and configure Cloudgoat.   Scenario 7: Stealing secrets […]

AWS CloudGoat and mitigation strategies: Part 4

AWS Cloudgoat and mitigation strategies Part 4 This is part 4 of the series on AWS Cloudgoat Scenarios and the mitigation strategies. In this part, we cover Scenario 6. This part of the article presumes that Cloudgoat has already been configured. Please refer to part 1 of this series to see how to install and […]

AWS CloudGoat and mitigation strategies: Part 3

website defacement

AWS Cloudgoat and mitigation strategies Part 3 This is part 3 of the series on AWS Cloudgoat Scenarios and the mitigation strategies. In this part, we cover Scenarios 4 and 5: Scenario 4: Privilege escalation via EC2 instance (iam_privesc_by_attachment) Scenario 5: Privilege escalation via SSRF web application exploit (ec2_ssrf)</a This part of the article presumes […]

AWS CloudGoat and mitigation strategies: Part 2

AWS Cloudgoat and mitigation strategies Part 2 This is part 2 of the series on AWS Cloudgoat Scenarios and the mitigation strategies. In this part, we cover Scenarios 2 and 3: Scenario 2: Privilege escalation via AWS Lambda (lambda_privesc) Scenario 3: Misconfigured EC2 Reverse Proxy to S3 Breach (cloud_breach_s3)</a This part of the article presumes […]

AWS CloudGoat and mitigation strategies: Part 1

Introduction As cloud computing is becoming mainstream, the security concerns associated with it has been increasing as well. Most of the public cloud users understand that this is a shared responsibility between the cloud provider and the users as well. According to Gartner, 95% of all cloud security failures are due to misconfigurations. We thought […]

Unpatched Code Snippets Plugins Puts over 200,000 WordPress Sites at Risk

More than 200,000 websites using WordPress with unpatched open-source code snippets allows attackers to take over WordPress sites due to missing referrer checks on the import menu. (Figures are based on the number of active installations in the WordPress Library). Wordfence researchers explained that “The plugin developer protected nearly all endpoints of this plugin with […]

Next Generation WebOrion MonitorX System

  Here is a sneak peak at our upcoming MonitorX with new and improved features enhanced with the following Deep Learning Engine for Advanced Image Moderation Scalable to thousands of webpages in seconds Intelligent reduction of false positives by 5 times or more Insightful Dashboard with Refreshed Visualization Charts Stay tuned as we roll out […]

How Ransomware Attacks Affect Your Website

Ransomware is an especially nasty attack that holds your data hostage until you pay the attacker a fee. This fee can be anywhere from $50 to several thousands of dollars. If you don’t pay, usually the attacker continues to increase the fee until you are forced to wipe your server’s hard drive and start over. […]