The official OZON blog

Shoplift: the Magento nightmare is back

Shoplift: the Magento nightmare is back

The Magento team has released a patch for a critical security breach (SUPEE-5344) that allows for remote shell the root account (RCE – Remote Command Execution). One year after, it appears that more than 50% of Magento eCommerce retailers have yet to patch their store...

HTTPS security : a requirement for your online business

HTTPS security : a requirement for your online business

OZON announce today that they will automatically deliver a free SSL/TLS certificate for every business site you are securing with their cybsercurity solution. With this enhancement, OZON’s customers benefit from new fields of strengths to improve the SEO and the...

Discover OZON’s Magento anti-fraud module

Discover OZON’s Magento anti-fraud module

Regardless their turnover, OZON enables every eCommerce and mCommerce to detect sophisticated fraud and fraudulent transactions. With OZON’s module designed for Magento platforms, each order is analysed in depth and in real-time by different intelligent filtering...

Discover OZON’s PrestaShop anti-fraud module

Discover OZON’s PrestaShop anti-fraud module

Regardless their turnover, OZON enables every eCommerce and mCommerce to detect sophisticated fraud and fraudulent transactions. With OZON’s module designed for PrestaShop platforms, each order is analysed in depth and in real-time by different intelligent filtering...

Discover the new OZON: your eCommerce Cybersecurity Solution

Discover the new OZON: your eCommerce Cybersecurity Solution

After months of hard work and technical expertise on the beta version, we are proud to announce the commercial release of our innovative cybersecurity solution dedicated to eCommerce SMBs. An all-in-one solution to protect your site against hackers and fraudsters:...

3 types of ecommerce attacks you should know

3 types of ecommerce attacks you should know

The tremendous increase in online transactions has been accompanied by an equal rise in the number and type of attacks against the security of eCommerce sites. Some of these attacks have utilized vulnerabilities that have been published in reusable third-party...