Zero-day Duplicator Plugin Vulnerability – Patch it with BitNinja WAF
Eniko Toth

Zero-day Duplicator Plugin Vulnerability – Patch it with BitNinja WAF

On 19 February 2020, Wordfence reported a highly critical vulnerability found in the popular Duplicator plugin for WordPress. This plugin is useful when users want to migrate and copy WordPress sites. With Duplicator, sysadmins can create a new copy of the site and the generated file can be downloaded from the WP dashboard. WordPress Duplicator Plugin Zero-day Vulnerability Exploiting the newly discovered zero-day vulnerability allows hackers to download arbitrary files from the target sites. More than 1 million WordPress websites are affected by this security flaw. When users crea...
Read more
Best of 2019 – The 15 Most-Read Cybersecurity News
Eniko Toth

Best of 2019 – The 15 Most-Read Cybersecurity News

Hackers and cyberattack techniques are evolving every day. Hosting companies and every server owner should keep an eye on the cybersecurity news to prepare themselves and protect their systems against the new types of threats. That’s why BitNinja collects the hottest cybersecurity news and sends out a Cybersecurity Digest each month. Now, we’ve summarized the Top 15 articles from 2019 that our readers loved the most. Here is the list: 1. Hackers Planted Backdoor in Webmin, Popular Utility for Linux/Unix Servers On the 10th of August at the DevConf, a Turkish researcher revealed a z...
Read more
2019 Highlights – A Great Year at BitNinja
Eniko Toth

2019 Highlights – A Great Year at BitNinja

As 2019 will be over soon, it’s time to stop for a while and look back on what happened this year. 2019 was a unique year at BitNinja (you’ll see on the results). We got closer to our mission – making the internet a safer place. However, we couldn’t have reached the successes mentioned below without our ninjastic partners. Many new features were inspired by the Ninja Community. Also, the continuous feedback that we are receiving from day to day about how BitNinja changed businesses’ life for the better is a huge motivation for us to keep working harder and harder every day. So, we’d l...
Read more
Ultimate WAF Guide  - How to patch WordPress vulnerabilities and block web attacks
Jacint Lazok

Ultimate WAF Guide - How to patch WordPress vulnerabilities and block web attacks

An exploited CMS vulnerability or vulnerabilities to web-based attacks is a big security issue as one well-aimed attack can cause a data leak, data loss or make your server unavailable. These attacks need to be stopped before they even reach your server and the WAF 2.0 module can do that for you. This powerful defense tool can protect you from these attacks without slowing down your server’s response time or increasing the load. In this guide, I will show you how you can use it to maximize your server’s protection by fine-tuning this module. Spoiler: not by turning on every WAF rule ;)&n...
Read more
Case study - 2000 Website Owners Protected by BitNinja at Beebyte Hosting
Eniko Toth

Case study - 2000 Website Owners Protected by BitNinja at Beebyte Hosting

Hacked websites? Outdated WordPress versions? Complaining customers? These painful problems cause daily headaches for many web hosting companies out there. We've heard a lot of bad stories from our partners about these memories. We are happy to say that we can welcome a new member to our Ninja Community who can forget about the above-mentioned hassles. Now, I would like to introduce Beebyte(https://www.beebyte.io/ and https://www.beebyte.se/) to you , as they had similar tough times before joining us. However, BitNinja changed their life for the better. We asked their Marketing...
Read more
5 Steps to Creating an Effective Cyber Security Policy for Employees
Eniko Toth

5 Steps to Creating an Effective Cyber Security Policy for Employees

Technology is always evolving, and there are continuous new developments that change the spectrum of what is possible and what companies can do with technology. Because of this, cyberattacks, and therefore cybersecurity, are constantly adapting and reviewing their methods to stay on top of things. This is difficult for cybersecurity teams because technology moves so fast that staying ahead of the curve is harder than it seems. Without even noticing them, vulnerabilities can occur and often the most corrective measures in cybersecurity are taken after a massive breach or failure. Tha...
Read more
How to optimize your websites for SEO success with security
Boglarka Angalet

How to optimize your websites for SEO success with security

Building a winning website is hard, and comprises of many components. Plus, every client wants great page speed, uptime, UX, design, and marketing to make the business profitable. However, many VPS owners forget to focus on security - from SEO aspect. Until they get hacked and the rankings drop... How website security directly affects SEO  Keywords, meta tags, contents, backlinks. All of these terms are worth noting, especially if your websites are down, poisoned or flagged by Google. Marketers often skip security in their SEO strategy. Alternatively, it could be that th...
Read more
Cyber attack trends – The top 7 attack types
Eniko Toth

Cyber attack trends – The top 7 attack types

Here, at BitNinja we always keep a close look on the defended incidents in order to discover attack trends and new attack types. Currently, BitNinja protects over 5000 servers worldwide and we are effectively defending more than 50 millions incidents every week. Undoubtedly, we still see many “oldtimer” attack types between these incidents such as (D)DoS , SQLi , XSS , etc. However, by analyzing this data, we found these are the top cyberattack types we see today: Brute force Mirai botnet Hexa botnet WordPress attacks Reflection attacks More automated tools Cryptocur...
Read more
Recently discovered Hexa botnet is targeting WordPress hosts
Eniko Toth

Recently discovered Hexa botnet is targeting WordPress hosts

There is a huge demand for buying botnets on the Dark Web, so it’s not a surprise that new kinds of botnets appear from time to time in order to meet the needs of the cybergangs. Of course, there are some old but constantly attacking botnets, like the most popular Mirai botnet or the Hello Peppa botnet which was discovered and named by us. However, we’d like to show you a new botnet, that we haven’t talked about yet. This is the Hexa botnet. Discovery of the Hexa botnet Back in March, we introduced our new security module, the Defense Robot . It was a pleasure to us that we coul...
Read more
WordPress Hosting Protected by BitNinja - Case Study with Mijn Websitehosting
Boglarka Angalet

WordPress Hosting Protected by BitNinja - Case Study with Mijn Websitehosting

WordPress is by far the most popular CMS today. However, this popularity has an unfortunate side effect of also making WordPress sites extremely exposed to potential attacks. It means quite a huge challenge to web hosting providers to keep the hackers out of their business. Fortunately, this task is not impossible.   https://kinsta.com Our great partner, Mijn Websitehosting has over 14 years of expertise in this field and chose BitNinja to help them successfully protect their customers.  Read on to learn about their struggles, before they stepped on the road...
Read more