As a member of the BitNinja Development Team, one of our most important tasks is to develop the protection of BitNinja. When we deal...
Our world would be insecure without bug bounty platforms. We don’t know who we can or cannot trust. If we find a vulnerability in...
The “Hello, Peppa!” botnet and the /ept/out.php vulnerability were newly discovered attacks by our Attack Vector Miner. But now, it has recognized the reactivation of a forgotten IoT botnet. This botnet exploits the D-Link router...
In a previous article, we’ve discussed the BitNinja safe minimum ruleset for the BitNinja WAF, that consists of 15 rules from the OWASP Core...
After the “Hello, Peppa!” zero-day botnet, our Attack Vector Miner detected another zero-day vulnerability. Some vulnerable websites contain an /ept/out.php file, which can work as an open proxy. That’s...
Start the 7-day free trial with full functionality without spending a cent.
After the “Hello, Peppa!” zero-day botnet, our Attack Vector Miner detected another zero-day...
At the end of the last year, we made...