The Impact of AI and 5G in Cyber Security
Eniko Toth

The Impact of AI and 5G in Cyber Security

Critical Issues for Companies Looking to Get On Board the 5G, AI Revolution As companies brace themselves for the ongoing fourth industrial revolution, cybersecurity remains high on the agenda. Executives are wary about the challenges that accompany emerging major technologies such as 5G, but Artificial Intelligence (AI) is widely regarded as a cyber-security life line. The connectivity landscape is becoming more intricate. Networks carry an endless array of connected devices, and companies reckon cybersecurity issues may become exasperated as a result. They’ll need to protect more devic...
Read more
Best of 2019 – The 15 Most-Read Cybersecurity News
Eniko Toth

Best of 2019 – The 15 Most-Read Cybersecurity News

Hackers and cyberattack techniques are evolving every day. Hosting companies and every server owner should keep an eye on the cybersecurity news to prepare themselves and protect their systems against the new types of threats. That’s why BitNinja collects the hottest cybersecurity news and sends out a Cybersecurity Digest each month. Now, we’ve summarized the Top 15 articles from 2019 that our readers loved the most. Here is the list: 1. Hackers Planted Backdoor in Webmin, Popular Utility for Linux/Unix Servers On the 10th of August at the DevConf, a Turkish researcher revealed a z...
Read more
2019 Highlights – A Great Year at BitNinja
Eniko Toth

2019 Highlights – A Great Year at BitNinja

As 2019 will be over soon, it’s time to stop for a while and look back on what happened this year. 2019 was a unique year at BitNinja (you’ll see on the results). We got closer to our mission – making the internet a safer place. However, we couldn’t have reached the successes mentioned below without our ninjastic partners. Many new features were inspired by the Ninja Community. Also, the continuous feedback that we are receiving from day to day about how BitNinja changed businesses’ life for the better is a huge motivation for us to keep working harder and harder every day. So, we’d l...
Read more
Ultimate WAF Guide  - How to patch WordPress vulnerabilities and block web attacks
Jacint Lazok

Ultimate WAF Guide - How to patch WordPress vulnerabilities and block web attacks

An exploited CMS vulnerability or vulnerabilities to web-based attacks is a big security issue as one well-aimed attack can cause a data leak, data loss or make your server unavailable. These attacks need to be stopped before they even reach your server and the WAF 2.0 module can do that for you. This powerful defense tool can protect you from these attacks without slowing down your server’s response time or increasing the load. In this guide, I will show you how you can use it to maximize your server’s protection by fine-tuning this module. Spoiler: not by turning on every WAF rule ;)&n...
Read more
Case Study - The Best Security Solution for Valicom Net Cloud Services
Eniko Toth

Case Study - The Best Security Solution for Valicom Net Cloud Services

Valicom Net is a Cloud Hosting Company in Cyprus with more than 15 years of experience specializing in Business Web Hosting, Cloud Services, Virtual Private Servers, Dedicated Servers, Hosted Exchange, Web Development with Content Management System, Network Security, Antispam Services, Online Storage Email & Remote Backup. Challenges „As we offer managed and unmanaged services, the challenge for us was to protect both services. For the managed servers all security updates were done on time which was not the case with the unmanaged servers as customers usually don’t update them. We w...
Read more
Case Study - DDoS Problems Solved at ISO Certified IT Company
Eniko Toth

Case Study - DDoS Problems Solved at ISO Certified IT Company

Aitire is a small MSP (Managed Service Provider) company located in Spain. They have more than 10 years of experience in computer consulting, Free Software, Open Source, GNU / Linux, etc… They aspire every day to maximize their technology and provide the best tools to their clients. Challenges „We usually work with rpm based Linux distributions and we used to face a lot of problems on them. Before using BitNinja we experienced a huge amount of attacks, mostly DDoS.” - Alejandro Escobar Like many others, Aitire also tried different kinds of solutions against cybercrimes....
Read more
How malware could be affecting your business without you realising
Eniko Toth

How malware could be affecting your business without you realising

All businesses need to be doing as much as possible to ensure that they are defended against cyber-attacks. But cyber-crime has become so sophisticated that in many cases your company could be compromised without you even realizing it. Here we take a look at some of the ways that malware could be working within your system without you knowing. Cryptojacking You have probably heard of cryptocurrencies such as Bitcoin. These alternatives to traditional currency were first introduced practically in 2009 and they have become extremely popular very quickly. But you might not realize that some...
Read more
Five key things we can learn from this year’s cyber-attacks
Eniko Toth

Five key things we can learn from this year’s cyber-attacks

The number of cyber-attacks against businesses grows every year, with 2019 likely to see record numbers already. While it is not good news that businesses continue to suffer from attacks, the number of reported incidents in the news does at least provide savvy organizations with learning opportunities to avoid making the same mistakes. Here are five key learnings from high-profile cyber-attacks this year-to-date. Secure your databases properly In April, Canadian telecommunications firm Freedom Mobile suffered a breach when an unprotected database was exposed, leaking sensitive personal a...
Read more
Cyber attack trends – The top 7 attack types
Eniko Toth

Cyber attack trends – The top 7 attack types

Here, at BitNinja we always keep a close look on the defended incidents in order to discover attack trends and new attack types. Currently, BitNinja protects over 5000 servers worldwide and we are effectively defending more than 50 millions incidents every week. Undoubtedly, we still see many “oldtimer” attack types between these incidents such as (D)DoS , SQLi , XSS , etc. However, by analyzing this data, we found these are the top cyberattack types we see today: Brute force Mirai botnet Hexa botnet WordPress attacks Reflection attacks More automated tools Cryptocur...
Read more
A Cybersecurity Guide for Small Businesses
Eniko Toth

A Cybersecurity Guide for Small Businesses

If you use the internet and have valuable information on either your phone, laptop, tablet, or computer, then you are at risk from a cyber attack. Below we will cover five key areas to consider when devising a strategy to protect your business assets. Cybersecurity is the term used to describe how businesses and individuals protect their data and digital assets from loss, theft or any other type of compromise. Cyber attacks can occur in a multitude of different ways, with more being thought up daily. Couple this with more and more business being done online, there is a growing trend in mali...
Read more