by Akos Molnar | Jan 6, 2021 | Trending
There is a force to reckon with in computing technology – Linux, an operating system most administrators use in ‘Linux machines’ to complete their command-line interface tasks. This article introduces seven must-have tools that should be installed on your...by Akos Molnar | Oct 27, 2020 | Other
The last quarter of the year is usually one where people tend to relax, spend a little on themselves, take vacations, and devote more time to personal affairs. But this is also the time when we witness an increase in cyberattacks! This article discusses why Q4 can be...by Akos Molnar | Oct 14, 2020 | Other
After last year’s €500,000 seed investment, BitNinja has raised $2.5 million in Series A funding, led by Lead Ventures. Our history BitNinja was founded in 2014 and became very profitable by the following year. In December, 2015 we were one of the eight selected...by Jácint Lázók | Oct 6, 2020 | Other
The Defense Robot in the previous versions blocked the IP address of the uploader and it also replaced the detected malware with a web honeypot, so even if the hacker tried to access the malware or backdoor from another IP address they would be still blocked. ...by Akos Molnar | Sep 4, 2020 | Threat lab
On 2 September 2020 arstechnica reported a zero-day vulnerability in a WordPress plugin. File Manager helps users manage their files on the website. It was downloaded 700,000 times and more than half of the customers are affected. The...