Guide to Preventing Web Defacement

In this video, we’ll be discussing the important topic of preventing web defacement – a type of cyber attack that involves unauthorized alteration of a website’s content or appearance. As a technical manager or CTO, it’s crucial to understand the methods and motivations behind web defacement attacks and take steps to prevent them.  By implementing the […]

Preventing Web Defacement: Guide to Securing Web Applications

While web defacement may not be the most prevalent cyber attack in recent years, the consequences of web defacement attacks are real – reputational damage, loss in customer trust, financial losses, and more. Web defacement attacks generally occur in two forms: visual or non-visual (script inclusions). Why Does Web Defacement Happen? Hackers may deface a […]

What’s New in PCI-DSS v4.0: SSL Cert Monitoring

ssl

PCI-DSS is a set of security standards designed to ensure that all companies that accept, process, store or transmit credit card information maintain a secure environment. This article is part of a series of articles under the “What’s New in PCI-DSS v4.0” series where we explore what has changed in PCI-DSS moving to version 4, […]

What’s New in PCI-DSS v4.0: Supply Chain Inventory of Software

Supply Chain software

PCI-DSS is a set of security standards designed to ensure that all companies that accept, process, store or transmit credit card information maintain a secure environment. This article is part of a series of articles under the “What’s New in PCI-DSS v4.0” series where we explore what has changed in PCI-DSS moving to version 4, […]

Magecart and Card Skimming Detection

cardskimming

What is Magecart? Magecart is a type of cybercriminal group that specializes in stealing credit card information from online stores (a.k.a card skimming). The group’s attacks typically involve injecting malicious code into the checkout pages of e-commerce websites to steal payment card data from customers. The Magecart group is known to have targeted numerous high-profile […]

What’s New in PCI-DSS v4.0: HTTP Header Tamper Detection

http

PCI-DSS is a set of security standards designed to ensure that all companies that accept, process, store or transmit credit card information maintain a secure environment. This article is part of a series of articles under the “What’s New in PCI-DSS v4.0” series where we explore what has changed in PCI-DSS moving to version 4, […]

What’s New in PCI-DSS v4.0: Payment Page Javascript Monitoring

PCI-DSS JavaScript

PCI-DSS is a set of security standards designed to ensure that all companies that accept, process, store or transmit credit card information maintain a secure environment. This article is part of a series of articles under the “What’s New in PCI-DSS v4.0” series where we explore what has changed in PCI-DSS moving to version 4, […]

Anyone can enumerate your web server using port scanning tools

In this video, we will discuss how hackers can easily enumerate your web server and potentially find vulnerabilities that they can exploit. It is important to understand how these attacks work so that you can take steps to protect your server and your website. We will walk through the process of enumeration, including common tools […]

Port Scanning – Exposing Your Network’s Points Of Entry

In computer networking, ports are points of entry to your computer – virtual origins and/or destinations of network connections. Port number definition and standardisation is overseen by the Internet Assigned Numbers Authority (IANA). Based on the list maintained by IANA, there are three types of ports amongst the total number of 65536: 1. Well-known ports […]

Enumerate, Secure and Detect changes in DNS records

In this video, we will be sharing with you why your DNS records are important. How an outsider can conduct DNS enumeration to determine the attack surface. What can you do to hide and secure your DNS records. What are some tools WebOrion provide that can detect changes to the DNS records.