by Tóth Enikő | Nov 26, 2019 | Threat lab
RCE attacks are one of the most dangerous types of attacks as hackers could take complete control of the victim’s host, meaning that they can run commands, install malware, etc. In this article, I’d like to introduce 2 new vulnerabilities, which have been patched by...by Tóth Enikő | Aug 15, 2019 | Trending
In our Ninja HQ, we have a library with more than 400 books. We love learning new things and we truly believe in the life-long learning approach. In this quickly changing world, keeping yourself up-to-date is essential. There are tons of books on cybersecurity, but in...by George Egri | Jun 4, 2019 | Trending
I was about to outline the most important conclusions – in terms of results and values that we can give, after ending the 100th user interview this month at BitNinja. Although many of our partners have been happy to see how BitNinja transformed their server...by Tóth Enikő | Aug 3, 2018 | Threat lab
Our Attack Vector Miner (based on AI) is a very effective tool to identify 0. day attacks. Here comes the first catch! Discovery of a New Botnet At the beginning of July, our Attack Vector Miner created a new cluster, filled with logs about a new type of botnet. We...by George Egri | Mar 27, 2018 | Security analysis
We have collected the best practices of the most successful BitNinja customers. Would you like to completely eliminate hackers on your servers? Follow this guideline to achieve the most with BitNinja and stop all hackers. The initial steps When you first install...