Product Announcement: Enhanced Email Alerts for WebOrion Defacement Monitor

Email alerts are the primary method that WebOrion Defacement Monitor uses to inform our customers about the changes to their websites. Through these email alerts, users are informed if their website becomes unreachable, or if any of WebOrion’s various engines are triggered during webpage monitoring. The email alerts are important for customers and SOC analysts […]
Cloudsine | WebOrion® is excited to partner with SGInnovate New Frontier Event to build up Deep Tech Community

Cloudsine is excited to partner with SGInnovate at the New Frontier event on 10 Apr 2021 to help build up the deeptech community. The New Frontier event is organized by SGInnovate with Guest of Honour, Lawrence Wong (Minister for Education), to promote the growth of the deeptech ecosystem in Singapore with skills, jobs and career […]
Cloudsine | WebOrion® Supports the Launch of community-focused AI Security Quarter in Div0 on 31 Mar 2021
AI Security Quarter of Div0 was officially launched on 31 Mar 2021 over virtual Zoom and attended by >50 cybersecurity and AI enthusiasts in Singapore. Cybersecurity and AI are both critically important technologies for the digital future. Attackers are using more automation and AI to help them probe and attack systems. In addition, adversarial attacks […]
Product News: End-of-Support for Old WebOrion Appliances and Upgrade Path to New WebOrion VX2 Appliances.

This is to announce the following: End of Software Support (EOSL)for all WebOrion® virtual and physical appliances purchased before 28 Feb 2017 . EOSL for this batch of appliances will be with effect from 31 Aug 2021. This means no bug fixes, security patches, feature updates will be provided. End of Software Support (EOSL)for all […]
WebOrion® launches Javascript Malware Detection Engine (JME)

WebOrion® is pleased to announce the launch of our new Javascript Malware Detection Engine(JME). The JME adds to the powerful capabilities of our WebOrion® Monitor to detect defacements, malicious scripts and other website threats. Today, practically every website uses JavaScript. The power and flexibility of a scripting language embedded within the browser has allowed websites […]
AWS CloudGoat and mitigation strategies: Part 5

AWS Cloudgoat and mitigation strategies Part 5 This is part 5 of the series on AWS Cloudgoat Scenarios and the mitigation strategies. This part of the article presumes that Cloudgoat has already been configured. Please refer to part 1 of this series to see how to install and configure Cloudgoat. Scenario 7: Stealing secrets […]
AWS CloudGoat and mitigation strategies: Part 4

AWS Cloudgoat and mitigation strategies Part 4 This is part 4 of the series on AWS Cloudgoat Scenarios and the mitigation strategies. In this part, we cover Scenario 6. This part of the article presumes that Cloudgoat has already been configured. Please refer to part 1 of this series to see how to install and […]
AWS CloudGoat and mitigation strategies: Part 3

AWS Cloudgoat and mitigation strategies Part 3 This is part 3 of the series on AWS Cloudgoat Scenarios and the mitigation strategies. In this part, we cover Scenarios 4 and 5: Scenario 4: Privilege escalation via EC2 instance (iam_privesc_by_attachment) Scenario 5: Privilege escalation via SSRF web application exploit (ec2_ssrf)</a This part of the article presumes […]
AWS CloudGoat and mitigation strategies: Part 2
AWS Cloudgoat and mitigation strategies Part 2 This is part 2 of the series on AWS Cloudgoat Scenarios and the mitigation strategies. In this part, we cover Scenarios 2 and 3: Scenario 2: Privilege escalation via AWS Lambda (lambda_privesc) Scenario 3: Misconfigured EC2 Reverse Proxy to S3 Breach (cloud_breach_s3)</a This part of the article presumes […]
AWS CloudGoat and mitigation strategies: Part 1

Introduction As cloud computing is becoming mainstream, the security concerns associated with it has been increasing as well. Most of the public cloud users understand that this is a shared responsibility between the cloud provider and the users as well. According to Gartner, 95% of all cloud security failures are due to misconfigurations. We thought […]