NINJA BLOG

Release Note – Easy to Integrate, Automated Subscription Process for Our Resellers

Security can be manageable. Security can be translated into profit. We understand that in the competitive web hosting industry, providers need efficient, stable, and resource-friendly solutions so that they...

header

Log4j Log4Shell Zero-day Vulnerability is Patched…

On the 10th of December, bleepingcomputer.com reported an exploit for a critical zero-day vulnerability called “Log4Shell”. It has been exposed for the Apache Log4j Java-based logging...

header

Serious Vulnerability Patched by the WAF…

We have successfully patched a serious vulnerability that affected over a million websites and improved our UX by updating the table on the Console....

header

The Most Common Types of Cyberattacks…

Phishing has been the most popular tool that attackers have used to steal sensitive information since the beginning of the 2000s and it works,...

header

Evolving Anti-Malware Module

We won’t stop until we have caught all of the malware around the world. With this in mind, we made some developments again in...

TOP ARTICLES