Security analysis Configure your Railgun server to see proper logs

Many of our customers who use Cloudflare have recently notified us that they are not able to see the proper visitor IPs in the logs only the railgun server IPs. It is caused due to the fact that the requests are not directly coming from Cloudflare, so mod_cloudflare will not restore the IP’s of the […]

Security analysis Spammer Tactics – How they try to mislead you?

Spammers are enemies of all sysadmins, because they are altering their tactics day by day. Keeping softwares up-to-date on your servers is not always as easy and solvable as we might think. Even though you have the latest application which is protected against the known security risks, you can have a lot of user-related contents which […]

Trending Server Security Checklist – How to maintain the security of your server?

We are convinced that almost all server owners have to struggle with the maintenance of their server, which is not always as easy and transparent as we would assume.  Our treasured servers are vulnerable, sensitive and exposed to many many types of attacks, exploits or malfunctions. That is why we have to take care of […]

Release notes Pi-Ninja-Security for RaspberryPi

The real geek escaped from one Ninjastic developer of ours lately, and in his freetime he decided to try to install BitNinja on his Raspberry Pi 2 model B. And guess what happened? He was successful! What is more, BitNinja also captured some attacks with its port honeypot module. Now, let me describe you the […]

Threat lab BitNinja overcomes CVE-2016-5696 vulnerability

CVE-2016-5696 Linux Kernel vulnerability has been recognized two weeks ago by some watchful researchers , who immediately informed the world of the Internet about the potential dangers waiting for them. This vulnerability can be exploited by an attack called with the umbrella term: “man in the middle attack” and is mainly conducted by off-path hackers. RedHat […]

Trending IPv6 – Plaything of the vicious

Did you know that using IPv6 on your server can completely bypass all your security? On Linux, there are separate kernel stacks, and separate mechanisms to filter traffic for the original IPv4 traffic and for IPv6. The kernel module responsible for this filtration is called ipfilter, and there is an other module called ipfilter6 for […]

Trending Hydra: One of the most well-known bruteforce tools

The Kali Linux is an open source code operational system which is based in Debian. In the system we can find several „penetration” applications, such as: Aircrack-ng Hydra Nmap Wireshark Metasplot framework Maltego Owasp-Zap SQLMap John Burpsuite Johnny Pyrit SIPcrack PWdump Rainbowcrack Maskgen Hexinject SSLSniff Dsniff In this article, I am going to tell you […]

Release notes Our port Honeypot module is out of Beta

We are happy to announce that our developers officially released the port honeypot module. The port honeypot is a perfect way to fight against zero-day attacks and many of our customers are satisfied with it because the module catches and entraps hackers who attempt to break into or scan their servers making them aware of the […]

Security analysis How to monitor your server load?

What is the average load in Linux? The load is a measure of the amount of computational work that a computer system performs. The Linux generates a metric of three average load numbers in the kernel which the user can easily query by running the uptime command. The three values of load average refer to […]

Experience the benefits of BitNinja!
Start the 5-min installation with one line of code and use all the security components without commitment and limitation for 7-trial days!
AICPA SOC BitNinja Server Security
Privacy Shield BitNinja Server Security
GDPR BitNinja Server Security
CCPA BitNinja Server Security
2024 BitNinja. All Rights reserved.
Hexa BitNinja Server SecurityHexa BitNinja Server Security
magnifiercross