Trending Heckin Funny Hack

Hacking has become a huge part of our lives, partly because of popular culture and partly because it can give us some serious headaches when they mess with our beloved computers.  Usually, people see them as either harmful cyber-criminals or as freedom-fighters. But in this article, we are talking about a third group of hackers, […]

Events Ninjas @ WHD global 2017

A part of our Ninjastic Team participated in WHD Global in Rust, Germany for the second time. We gained a lot of experience, made new friends, learned about the trends of our industry and broadened our customer base. If you want to see the exhibition through the Ninjas' eyes, read on. The WHD staff really […]

Release notes 1.16.1 Version-645% performance improvement for SenseLog

This week we released a new version of BitNinja, which contains many significant performance improvements. But what are the changes exactly? We limited the SS usage of our Outbound WAF module. It will only use SS if a malicious request is caught. Its result will be a significant drop in BitNinja's CPU usage. Our SenseLog […]

Events Interview with our CEO

Last week the Chief Content Manager of HostAdvice, a company who provides transparent and handy advice for those who are looking for Hosting Providers, interviewed our CEO George Egri about the nitty-gritty details of BitNinja. They have covered topics like: Why this product is better than other solutions George's views about the future of security […]

Security analysis XML-RPC attacks examined

XML-RPC attacks are “trending” nowadays. If you search for “XML-RPC attack” on Google, you can see approximately 380,000 results. Most of the articles deal with XML-RPC attacks on WordPress-based websites. What is XML-RPC? RPC stands for remote procedure call and XML is the abbreviation of Extensible Markup Language. XML is widely used to represent data […]

Security analysis Cloudifying your legacy applications

In this article we will be dealing with OpenShift and Kubernetes technology. You can find some explanations about the terms used at the end of the article. If you want to take the neccessary steps to upgrade your own application, the first thing to do will be turning your pile of code into a container […]

Security analysis From Monolith to Microservices in 10 Steps

Do you have a monolithic application (for example a complex server-side enterprise application) with big features like support varieties of different clients, API for 3rd parties and some integrations with other web services and message brokers? Code usage is tolerable, but you want to release a smashing feature in the future, though you do not […]

Release notes New versions released

In the last 2 weeks, we released 2 new versions of BitNinja. Let’s take a look at the novelties: BitNinja version 1.12.10: CaptchaChallenge pages now use 403 status code instead of 200. Good bots will notice it and leave it. This means, that the good bots will recognize our captcha pages, and won’t walk around […]

Trending Unix vs. Linux systems

Before the expansion of Windows Operational Systems and the creation of the Linux, the world was ruled by UNIX systems. The UNIX was used predominantly in the 1980’s. Despite of its positive traits it was mainly used by research centers, institutes and school’s operational system. It can be thanked partly to its price, and also […]

Experience the benefits of BitNinja!
Start the 5-min installation with one line of code and use all the security components without commitment and limitation for 7-trial days!
AICPA SOC BitNinja Server Security
Privacy Shield BitNinja Server Security
GDPR BitNinja Server Security
CCPA BitNinja Server Security
2024 BitNinja. All Rights reserved.
Hexa BitNinja Server SecurityHexa BitNinja Server Security
magnifiercross