WordPress hosting and the BitNinja WAF - How to do it right? (Part 1: The basics)
Nikolett Hegedüs

WordPress hosting and the BitNinja WAF - How to do it right? (Part 1: The basics)

We know that our customers care a lot about their own customers, too. Just like we care about you, and about making the internet a safer place. So, with the following series of articles titled “Wordpress hosting and the BitNinja WAF - how to do it right?”, I’d like to help those who work in Wordpress hosting, and would like to use the BitNinja WAF to protect their servers. The BitNinja WAF is a really great tool for security - when used properly. And to use it, you’ll need to understand the terminology that we’re using. So let’s start with the basics, shall we? :) What are rule...
Read more
What is going on  in the background of the cyberworld
Laszlo Takacs

What is going on in the background of the cyberworld

There are things we are not really waiting for, in fact we are looking for a way to bypass or avoid them. Unfortunately, some of them are inevitable just like the Cyber Worldwar, which in fact has already begun. Mentionable acts from history There was a historical milestone on May 12th, 2017 when within only one day one country has invaded 150 other countries. Now you would start to think: why can't I remember anything like this? Well, the answer is simple, it was the "in"famous WannaCry ransomware, it has invaded more than 200 thousand computers. By assumptions, it originated from North...
Read more
Kevin Mitnick the most famous hacker
Laszlo Takacs

Kevin Mitnick the most famous hacker

Laszlo Takacs
Where it all began Kevin David Mitnick is one of the most famous hackers. At age 13 Mitnick used dumpster dicing and social engineering to bypass the bus ticketing system in Los Angeles, this way he was able to ride the LA area using unused transfer slips. First big step His first unauthorized access to a network was in 79’ , when he was only 16 years old. He broke into DEC’s ( Digital Equipment Corporation ) computer network and simply copied their software, later he was charged for this action in 1988,  got sentenced for 12 months in prison. The prison h...
Read more
3rd Drupalgeddon alert! How to be protected with BitNinja?
Eniko Toth

3rd Drupalgeddon alert! How to be protected with BitNinja?

Third critical Drupal vulnerability discovered!!! Those who are running a Drupal website couldn’t have a rest over the past few weeks. This is the third time when Drupal recommends to update these sites. During exploring the previous remote code execution (RCE) vulnerability, the CVE-2018-7600, the team discovered a new RCE vulnerability (CVE-2018-7602). If  you or your customers have Drupal websites and would like to avoid  backdoors, cryptocurrency miners and other malwares, BitNinja is here to  help you! Just make sure your WAF rule #402003 is enabl...
Read more
Security by design
Laszlo Takacs

Security by design

Our team has attended the CloudFest back in March where during the security panel we have attended a presentation about the importance of security by design an important thing in terms of responsibility and suggested OWASP as a standard to start with. In this blog post we would like to show, why it is important for developers too, not just for security providers. The best way to define it is an approach to software and hardware development where the main goal is to make a system as free of vulnerabilities and imprevious to attack as possible. To achieve this there is a need for a huge amoun...
Read more
Castle Vs Airport Model in security
George Egri

Castle Vs Airport Model in security

Apart from changing the way we live, this virtual connectivity has exposed us to an array of attacks. Cyber risks are a growing concern in virtually every aspect of our lives. The integration of technology into our everyday tasks has paved way for more efficient work performance yet left us vulnerable to many cyber-attacks.  To combat the situation, easy-to-use server security tool was introduced into the equation with BitNinja being one of the top contenders.  With more and more malicious programs and hackers trying to penetrate systems on a daily basis via the use of latest tech...
Read more
Ten Dangerous Places on the Internet
Dani Molnár

Ten Dangerous Places on the Internet

Dani Molnár
The internet is undoubtedly one of the mankind's greatest achievements which now has more than one billion websites on it. However, something being great doesn’t imply that is also safe and that is the case with our beloved creation. Here, we are going to show you 10 types of sites (or a site in particular) that hold the biggest threat to its viewers. Gaming Sites I know, I know it sounds strange but hear me out! Online gaming is a huge hit nowadays, so big that according to a Nielsen NetView survey in the USA gamers spend approximately 407 million hours every year playing their favorite...
Read more
The Next Level of Hacking
Dani Molnár

The Next Level of Hacking

Dani Molnár
In December 2015 and 2016 there were two blackouts in Ukraine that caused hundreds of thousands of Ukrainians to endure the notorious eastern cold winter for a few hours. At first, this wasn’t an alarming event as blackouts can happen anywhere and anytime, but the scale of it made people suspicious about it.  Later it turned out, that both attacks were cyber-attacks coming from Russia. Makes you think of Ian Fleming’s James Bond title “From Russia with Love” am I right? But why is it important? Why can we say that it is a milestone in the world of cyber-terrorism? Hackers can be found...
Read more
The most common CMS attack types
Daniel Mecsei

The most common CMS attack types

Nowadays, the Internet plays a huge part in our lives. It gets bigger and bigger every day, now it has more than one billion websites. Most of these sites are built with CMS which stands for Content Management System. It is a tool that provides an easy-to-use method for users without any programming skills in creating websites. The most common CMSs are written in PHP because most shared-hosting providers only provide this way to share/operate your website with the community. According to the statistics, WordPress has the largest market share with 52%, followed by Joomla with only 6%. The...
Read more
Heckin Funny Hacks
Dani Molnár

Heckin Funny Hacks

Dani Molnár
Hacking became a huge part of our lives, partly because of popular culture and partly because they can give us some serious headaches when they mess with our beloved computers.  Usually people see them as either harmful cyber-criminals or as freedom-fighters. But in this article we are talking about a third group of hackers, those who are just doing it for the “lolz”. These pranksters - whether we agree with their method or not – will definitely make you laugh! AC/DC Power Plant What do you get when you combine AC/DC’s Thunderstruck with several nuclear research facilit...
Read more