Top 5 Malware Signatures - Week 25-26
Akos Molnar

Top 5 Malware Signatures - Week 25-26

Our team is always thriving to make the internet even safer with awesome innovations. We launched our brand new detecting method, the Source Code Structure Analysis in the past weeks and thought that you would be interested how well it works. Below you can find the Top 5 malware signatures with the most catches and don't forget that you are able to create your own malware signature too! We experienced that this crowdsourcing method between severals thousands of servers works fantastic in our IP reputation system, that's why we implemented it also to our malwa...
Read more
Release Note - New Way of Malware Detection
Akos Molnar

Release Note - New Way of Malware Detection

It’s been a while since we wrote a release note so there are plenty of new upgrades, features and fixes to tell you about. Our tech ninjas worked harder than ever. We invented a brand new way of malware detection and raised the SenseLog performance hugely.  In the past months we also: created a new licensing system, made a new Captcha design, added a service detector, upgraded the HaProxy, and of course we fixed bugs and added plenty of other features which made the UI/UX much better. Let’s see the details of what happene...
Read more
#CloudFest2020 cancelled – NinjaFest Day is here
Eniko Toth

#CloudFest2020 cancelled – NinjaFest Day is here

We know that many of you were excitedly waiting for CloudFest2020. This conference is always the best event throughout the year to bring the amazing cloud community together. It was sad news that CloudFest was cancelled due to the Coronavirus threat, however, it was the right decision from the organizers. However, as thousands of people were preparing for this week-long event, we thought that you shouldn’t miss everything. We decided to bring a little piece of CloudFest to you online. We organize an online „NinjaFest” day on 18 March 2020, where you’ll have the opportunity to: Atte...
Read more
Meet with the BitNinja Team at CloudFest 2020
Eniko Toth

Meet with the BitNinja Team at CloudFest 2020

28 Febr, 2020 16:44 PM UPDATE: We know that it was a hard decision for the organizers, and we feel really sorry that we can't meet with the wonderful cloud community in the Europa Park this year. However, it was the right decision because security always comes first. We, however, have a plan B. ;) As you could read in this article below we would have held 2 presentations at the CloudFest. But you won't have to miss them due to the event cancellation! Instead of CloudFest 2020, we'll organize webinars for the topics: Detecting Obfuscated Malware by George Egri...
Read more
10 Best Tech Conferences for Web Hosting Companies
Eniko Toth

10 Best Tech Conferences for Web Hosting Companies

Why should you visit tech conferences? As our world is changing quickly, new types of technologies are constantly being made. To keep up with the rapid pace of the technology changes and to learn more about the most advanced solutions, we highly recommend everyone to visit at least 1 tech conference every year. Fortunately, there are countless opportunities to meet with the industry leaders and learn about the latest trends. Also, these tech conferences help you with more than just discovering new tools. As the list of exhibitions could be very long, we’ve collected the top 10 ev...
Read more
Zero-day Duplicator Plugin Vulnerability – Patch it with BitNinja WAF
Eniko Toth

Zero-day Duplicator Plugin Vulnerability – Patch it with BitNinja WAF

On 19 February 2020, Wordfence reported a highly critical vulnerability found in the popular Duplicator plugin for WordPress. This plugin is useful when users want to migrate and copy WordPress sites. With Duplicator, sysadmins can create a new copy of the site and the generated file can be downloaded from the WP dashboard. WordPress Duplicator Plugin Zero-day Vulnerability Exploiting the newly discovered zero-day vulnerability allows hackers to download arbitrary files from the target sites. More than 1 million WordPress websites are affected by this security flaw. When users crea...
Read more
The Impact of AI and 5G in Cyber Security
Eniko Toth

The Impact of AI and 5G in Cyber Security

Critical Issues for Companies Looking to Get On Board the 5G, AI Revolution As companies brace themselves for the ongoing fourth industrial revolution, cybersecurity remains high on the agenda. Executives are wary about the challenges that accompany emerging major technologies such as 5G, but Artificial Intelligence (AI) is widely regarded as a cyber-security life line. The connectivity landscape is becoming more intricate. Networks carry an endless array of connected devices, and companies reckon cybersecurity issues may become exasperated as a result. They’ll need to protect more devic...
Read more
Best of 2019 – The 15 Most-Read Cybersecurity News
Eniko Toth

Best of 2019 – The 15 Most-Read Cybersecurity News

Hackers and cyberattack techniques are evolving every day. Hosting companies and every server owner should keep an eye on the cybersecurity news to prepare themselves and protect their systems against the new types of threats. That’s why BitNinja collects the hottest cybersecurity news and sends out a Cybersecurity Digest each month. Now, we’ve summarized the Top 15 articles from 2019 that our readers loved the most. Here is the list: 1. Hackers Planted Backdoor in Webmin, Popular Utility for Linux/Unix Servers On the 10th of August at the DevConf, a Turkish researcher revealed a z...
Read more
2019 Highlights – A Great Year at BitNinja
Eniko Toth

2019 Highlights – A Great Year at BitNinja

As 2019 will be over soon, it’s time to stop for a while and look back on what happened this year. 2019 was a unique year at BitNinja (you’ll see on the results). We got closer to our mission – making the internet a safer place. However, we couldn’t have reached the successes mentioned below without our ninjastic partners. Many new features were inspired by the Ninja Community. Also, the continuous feedback that we are receiving from day to day about how BitNinja changed businesses’ life for the better is a huge motivation for us to keep working harder and harder every day. So, we’d l...
Read more
Ultimate WAF Guide  - How to patch WordPress vulnerabilities and block web attacks
Jacint Lazok

Ultimate WAF Guide - How to patch WordPress vulnerabilities and block web attacks

An exploited CMS vulnerability or vulnerabilities to web-based attacks is a big security issue as one well-aimed attack can cause a data leak, data loss or make your server unavailable. These attacks need to be stopped before they even reach your server and the WAF 2.0 module can do that for you. This powerful defense tool can protect you from these attacks without slowing down your server’s response time or increasing the load. In this guide, I will show you how you can use it to maximize your server’s protection by fine-tuning this module. Spoiler: not by turning on every WAF rule ;)&n...
Read more