How malware could be affecting your business without you realising
Eniko Toth

How malware could be affecting your business without you realising

All businesses need to be doing as much as possible to ensure that they are defended against cyber-attacks. But cyber-crime has become so sophisticated that in many cases your company could be compromised without you even realizing it. Here we take a look at some of the ways that malware could be working within your system without you knowing. Cryptojacking You have probably heard of cryptocurrencies such as Bitcoin. These alternatives to traditional currency were first introduced practically in 2009 and they have become extremely popular very quickly. But you might not realize that some...
Read more
BitNinja at #webpros2019
Boglarka Angalet

BitNinja at #webpros2019

We were proud to be sponsoring Webpros Summit 2019 in Atlanta, Georgia. Built on the previous success of the annual cPanel Conference, this year WebPros brands (cPanel, Plesk, SolusVM and Xovi) brought Webpros Summit to life, a highly technical conference with the best professionals and the best networking events in the industry. To bring the web hosting community together, they organized a 3-day event at the Marriott Marquis Hotel in Atlanta Georgia from September 23rd - 25th. We hope that you - who’s reading this - were able to join us there, because the amazing line...
Read more
How to optimize your websites for SEO success with security
Boglarka Angalet

How to optimize your websites for SEO success with security

Building a winning website is hard, and comprises of many components. Plus, every client wants great page speed, uptime, UX, design, and marketing to make the business profitable. However, many VPS owners forget to focus on security - from SEO aspect. Until they get hacked and the rankings drop... How website security directly affects SEO  Keywords, meta tags, contents, backlinks. All of these terms are worth noting, especially if your websites are down, poisoned or flagged by Google. Marketers often skip security in their SEO strategy. Alternatively, it could be that th...
Read more
New chapter in BitNinja’s life – Version 2.0.0 is here
Eniko Toth

New chapter in BitNinja’s life – Version 2.0.0 is here

Did you find something new on your Dashboard? Almost 5 years ago, we announced BitNinja 1.0.0 and sooo many things happened since then. I could write a whole book if I would like to summarize the results of this period. Instead, let’s meet with the BitNinja 2.0.0! What 2.0.0 brings to you? This is the beginning of a new chapter, which will provide much more possibilities to keep servers safe. You’ll be able to flexibly adjust BitNinja to your company’s internal processes, enjoy brand-new features which will highly increase the protection level on your servers and experienc...
Read more
Five key things we can learn from this year’s cyber-attacks
Eniko Toth

Five key things we can learn from this year’s cyber-attacks

The number of cyber-attacks against businesses grows every year, with 2019 likely to see record numbers already. While it is not good news that businesses continue to suffer from attacks, the number of reported incidents in the news does at least provide savvy organizations with learning opportunities to avoid making the same mistakes. Here are five key learnings from high-profile cyber-attacks this year-to-date. Secure your databases properly In April, Canadian telecommunications firm Freedom Mobile suffered a breach when an unprotected database was exposed, leaking sensitive personal a...
Read more
8 Best Cybersecurity Books to Read
Eniko Toth

8 Best Cybersecurity Books to Read

In our Ninja HQ, we have a library with more than 400 books. We love learning new things and we truly believe in the life-long learning approach. In this quickly changing world, keeping yourself up-to-date is essential. There are tons of books on cybersecurity, but in this article, we’d like to give you a personal recommendation if you’d like to find the best books about this topic. I asked our CEO, George Egri about his favorite books and here comes the Top 8s: Malware Forensics Field Guide for Linux Systems Written by: Cameron H. Malin, Eoghan Casey, James M. Aquilina De...
Read more
Two-Factor Authentication is Available now
Eniko Toth

Two-Factor Authentication is Available now

Eniko Toth
Which sentence do you think is true? I have a strong password, so nobody could hack my account. My servers’ security is so important, which is why I have to do the most to avoid hackers gaining access to my BitNinja account. If you are one of those, who agree with the second sentence, then this article has been written just for you. We are happy to announce that the two-factor authentication is now available on the Dashboard login. Keeping your account safe Hacked accounts and leaked passwords issues are always seen in the news on cybersecurity. However, stealing a password...
Read more
Cyber attack trends – The top 7 attack types
Eniko Toth

Cyber attack trends – The top 7 attack types

Here, at BitNinja we always keep a close look on the defended incidents in order to discover attack trends and new attack types. Currently, BitNinja protects over 5000 servers worldwide and we are effectively defending more than 50 millions incidents every week. Undoubtedly, we still see many “oldtimer” attack types between these incidents such as (D)DoS , SQLi , XSS , etc. However, by analyzing this data, we found these are the top cyberattack types we see today: Brute force Mirai botnet Hexa botnet WordPress attacks Reflection attacks More automated tools Cryptocur...
Read more
A Cybersecurity Guide for Small Businesses
Eniko Toth

A Cybersecurity Guide for Small Businesses

If you use the internet and have valuable information on either your phone, laptop, tablet, or computer, then you are at risk from a cyber attack. Below we will cover five key areas to consider when devising a strategy to protect your business assets. Cybersecurity is the term used to describe how businesses and individuals protect their data and digital assets from loss, theft or any other type of compromise. Cyber attacks can occur in a multitude of different ways, with more being thought up daily. Couple this with more and more business being done online, there is a growing trend in mali...
Read more
Release note – A bunch of new features are available in agent 1.29.X and 1.30.0
Eniko Toth

Release note – A bunch of new features are available in agent 1.29.X and 1.30.0

Where are our tech ninjas? The first quarter of 2019 was quite stirring. We have also published several articles about our work. So, let’s start just by thinking about these developments: FTP CAPTCHA New SenseLog rules Newly discovered file uploader botnet Patched Drupal vulnerability Defense Robot Anti-Phishing Also, what happened in Q2? Malware Scanner Slack integration The contrast is huge… Well, our tech ninjas thought have a little rest after the Cloudfest exhibition. Haha, just kidding… :) Actually, the opposite happened. They worked harder than ever...
Read more