Joomla & vBulletin RCE vulnerabilities patched by BitNinja WAF 2.0
Eniko Toth

Joomla & vBulletin RCE vulnerabilities patched by BitNinja WAF 2.0

RCE attacks are one of the most dangerous types of attacks as hackers could take complete control of the victim’s host, meaning that they can run commands, install malware, etc. In this article, I’d like to introduce 2 new vulnerabilities, which have been patched by BitNinja WAF: vBulletin RCE Rusty Joomla RCE New botnet utilizes the vBulletin RCE vulnerability In September, a new zero-day vulnerability was found in vBulletin . Nowadays, vBulletin is the most popular internet forum software, so this threat could affect many people. The vulnerability (CVE-2019-16759...
Read more
New Malware Monitoring Tool – Auditd is Replacing Inotify
Eniko Toth

New Malware Monitoring Tool – Auditd is Replacing Inotify

It takes 99.9% less memory usage and 99.9% less time to set up… Unbelievable, but it’s possible with the new malware monitoring tool. While BitNinja believes in the power of prevention and our proactive modules are very robust, we also want to provide an all-in-one server security service. We know that malware infections are a pain point for every server owner because they have very visible signs. “There is always room for improvement.” So, we won’t lie to you. Many old and new users ask our help to clean malware from their servers. That’s the reason why we dedicated several projects to...
Read more
Teamwork makes the dream work: Sub-users and their roles
Jacint Lazok

Teamwork makes the dream work: Sub-users and their roles

Not everyone uses the BitNinja Dashboard for the same reasons when doing their work. We know that. Which is why we have different sub-user roles built into our Dashboard. Why do you need sub-user roles? If you need your accountant to download your subscriptions’ invoices without sharing your BitNinja account's login details, and if you want your support crew to be able to check if an IP address is blocked or not without risking your account’s integrity, you just need an email address to make them an account that lets your staff do their job while you keep your parent user account’s crede...
Read more
BitNinja in the Asia Pacific region - Case Study with ReadySpace
Eniko Toth

BitNinja in the Asia Pacific region - Case Study with ReadySpace

ReadySpace was founded in 2003 and is based in Singapore. They provide cloud-based solutions to their 150,000 customers, mainly from the Asia Pacific region. They are now expanding to the Philippines and Indonesia, and since 2013 started to open towards American businesses. Challenges They were experiencing the harmful effects of heavy DoS attacks mainly, which is one of the most common threats for cloud-based services. Nowadays there are around 45 million infected servers, most of these are used as members of botnets, designed to take down the competitor companies’ websites. „We...
Read more
BitNinja Raised 500k EUR from Industry Veterans to Make the Internet Safer
George Egri

BitNinja Raised 500k EUR from Industry Veterans to Make the Internet Safer

BitNinja was founded in 2014 and became very profitable by the following year. We could quickly grow by using our own resources, however, we are truly committed to our mission. We want to make the internet a safer place, so we decided to speed up our growth with investors. We are pleased to announce that BitNinja got a 500,000 EUR seed investment from cybersecurity veterans and cloud entrepreneurs. Introduction of our new investors In this seed round, we received 500,000 EUR from the investors to help us make the internet a safer place. Let’s meet them now: Founders of Bal...
Read more
Case study - Swiss Web Hosting Company Protected by BitNinja
Eniko Toth

Case study - Swiss Web Hosting Company Protected by BitNinja

Ganesh Hosting is one of our oldest customers, who are with us from the very beginning. A few years ago, we asked them about their experience and created this case study. It was available only for our reseller partners but now we would like to share it with the publicity.   The company Ganesh Hosting is a Swiss web hosting company, based in the charming city of Vevey. They provide various hosting solutions (VPS, dedicated, cloud) with more than 20 years of experience behind their team.  Having established partners like Morand Distillery and GroupeMutuel, quality is never con...
Read more
NEW Feature  - Transparent Proxy for BitNinja WAF 2.0
Eniko Toth

NEW Feature - Transparent Proxy for BitNinja WAF 2.0

Complicated WAF setup? Not anymore! The new BitNinja Transparent Proxy offers a new way for a much easier WAF setup and more convenient WAF management. You don’t have to hassle with enabling the X-Forwarded-For header from now on. Background At the beginning of 2019, we released a brand-new Web Application Firewall. We completely redesigned our previous WAF solution and we’ve already published several articles about WAF 2.0: Brand-new BitNinja WAF 2.0 is out now WordPress hosting and the BitNinja WAF - How to do it right? article series Watch the n...
Read more
Trace Hackers' IP Behind Cloudflare with The New Trusted Proxy Module
Eniko Toth

Trace Hackers' IP Behind Cloudflare with The New Trusted Proxy Module

In the previous quarter, we announced a new beta module, the Trusted Proxy, which became some of our users’ favorite module: “The new Trusted Proxy feature simply blows the competition out of the water especially when you consider the price point at which are offering BitNinja. We couldn’t be happier with how things are proceeding. :)” – Christopher McGill, Lead System Administrator at GekkoFyre Networks In that article, we promised to create a separate menu for managing it, so here it is! :) About proxies A proxy server will reroute online requests, so the real IP of...
Read more
Case study - 2000 Website Owners Protected by BitNinja at Beebyte Hosting
Eniko Toth

Case study - 2000 Website Owners Protected by BitNinja at Beebyte Hosting

Hacked websites? Outdated WordPress versions? Complaining customers? These painful problems cause daily headaches for many web hosting companies out there. We've heard a lot of bad stories from our partners about these memories. We are happy to say that we can welcome a new member to our Ninja Community who can forget about the above-mentioned hassles. Now, I would like to introduce Beebyte(https://www.beebyte.io/ and https://www.beebyte.se/) to you , as they had similar tough times before joining us. However, BitNinja changed their life for the better. We asked their Marketing...
Read more
5 Steps to Creating an Effective Cyber Security Policy for Employees
Eniko Toth

5 Steps to Creating an Effective Cyber Security Policy for Employees

Technology is always evolving, and there are continuous new developments that change the spectrum of what is possible and what companies can do with technology. Because of this, cyberattacks, and therefore cybersecurity, are constantly adapting and reviewing their methods to stay on top of things. This is difficult for cybersecurity teams because technology moves so fast that staying ahead of the curve is harder than it seems. Without even noticing them, vulnerabilities can occur and often the most corrective measures in cybersecurity are taken after a massive breach or failure. Tha...
Read more