WebOrion® / Security Articles

AWS CloudGoat and mitigation strategies: Part 2

AWS Cloudgoat and mitigation strategies Part 2 This is part 2 of the series on AWS Cloudgoat Scenarios and the mitigation strategies. In this part, we cover Scenarios 2 and 3: Scenario 2: Privilege escalation via AWS Lambda (lambda_privesc) Scenario 3: Misconfigured EC2 Reverse Proxy to S3 Breach...

Read More

AWS CloudGoat and mitigation strategies: Part 1

Introduction As cloud computing is becoming mainstream, the security concerns associated with it has been increasing as well.Most of the public cloud users understand that this is a shared responsibility between the cloud provider and the users as well. According to Gartner, 95% of all cloud security...

Read More

Five Ways a Website Can be Hacked

In today’s world, one must think twice before claiming that (s)he is safe from hackers. Be it ordinary individuals, small companies, large technology corporations or even governments with vast resources, it seems everybody falls victim to a hacking incident these days. We collected the top 6...

Read More

Web Security and Defacement Statistics

Did you know there has been at least 50,000 successful website defacement attacks each month for the past year, or that 55% of successful attacks are actually re-defacements? Web defacement attacks have been rising over the years, with 2015 recording almost a million of such...

Read More

The Comprehensive Approach to Securing Websites

No website is an impenetrable fortress. Ad-hoc security measures are not good enough. The integrity and security of official websites are very important because they represent the reputation and trustworthiness of organizations. Incidences of website-attacks may shake the confidence of investors and customers towards that organization....

Read More