WebOrion® Blog

Joint Webinar with ST Engineering

WebOrion Team had collaborated with ST Engineering to organise a webinar titled, “Website Defacement Monitoring: Securing Your Digital Business in the New Normal “on 26 November 2020. Lim Han Chin, Division Manager, Managed Security Services and Director, Cybersecurity Operations from ST Engineering began the webinar by highlighting the impacts caused by web defacement as well as some insights and statistics. He...

Read More
WebOrion Virtual Summit 2020

The inaugural WebOrion® Virtual summit was held on 20 November 2020. Many of our end users and partners joined us. We are glad that the attendees had fun learning what WebOrion® can do through our quizzes and games. In the first track of our webinar we have touched on the following topics: • Keynote Address by our Founder and CEO,...

Read More
Web Hosting Reviews of 2020 by WhoIsHostingThis Team

When building a small business website, one of the first decisions you'll make is which web hosting service to use. But how do you know which type of web hosting service you should choose, and which web hosting service is best? Click here for a comprehensive guide on web hosting service and providers written by WhoIsHostingThis Team. ...

Read More
AWS CloudGoat and mitigation strategies: Part 4

AWS Cloudgoat and mitigation strategies Part 4 This is part 4 of the series on AWS Cloudgoat Scenarios and the mitigation strategies. In this part, we cover Scenario 6. This part of the article presumes that Cloudgoat has already been configured. Please refer to part 1 of this series to see how to install and configure Cloudgoat. Scenario 6: rce_web_app Description: Start as the IAM user...

Read More
AWS CloudGoat and mitigation strategies: Part 3

AWS Cloudgoat and mitigation strategies Part 3 This is part 3 of the series on AWS Cloudgoat Scenarios and the mitigation strategies. In this part, we cover Scenarios 4 and 5: Scenario 4: Privilege escalation via EC2 instance (iam_privesc_by_attachment) Scenario 5: Privilege escalation via SSRF web application exploit (ec2_ssrf) testerjm.pem --region us-east-1 --profile kerrigan Next just set the permission on the SSH key on...

Read More