Product releases

The following product release is planned for November 27th, 2024

  • Feature
OU-reporting
DESCRIPTION

We’ve now created a custom feature called OU-reporting on the AO platform. If your company is reporting numbers to OU or will start reporting numbers in the future, contact us for configuration.

  • Bug fix
Endless loader on visiting the course page by course link
DESCRIPTION

Some users experienced an endless loading screen when they tried to visit some course pages through their course link. This problem has been resolved now.

  • Bug fix
Error on opening the registration page
DESCRIPTION

Some users experienced an error message when they went to the registration page for a course. This error is fixed now.

No data
  • Feature
Improvements in back-office
DESCRIPTION

We have been working with improving the back-office. Specifically, we’ve worked on improving the speed within multiple areas in the back-office.

  • Feature
Action plan to mitigate hacking attempts on AO platform
DESCRIPTION

Recently we have had some hacking attempts on our platform.

Quick overview of the hacking attempts: hacker mainly tries to exploit publicly available endpoints by querying them with a moderate number of requests. Typically, from a couple of minutes to an hour.

We have created an action plan to mitigate these attempts:

  1. Change the request signature algorithm

  2. Explore the possibility to obfuscate the request signature algorithm

  3. Review hacking attempts logs to assess the impact

  4. Implement a rate limiter (per IP per endpoint per API key) to prevent brute force attacks

  5. Implement a WAF (Web Application Firewall) to filter out malicious requests – ModSecurity for nginx is a good choice

  6. Revise a Content Security Policy (CSP) to prevent XSS attacks

  7. Revise a public endpoints code to prevent SQL injection

  8. Make the input validation for elastic search queries more strict to prevent garbage input

  9. Add ModSecurity metrics to the monitoring system and setup alerts

  10. Explore the possibility to implement a honeypot to distract hackers

  11. Discuss the possibility to block / grey-list IPs that show suspicious activity

No data