Security analysis Fix your log rotate rules and eliminate high load

One of our developers has encountered with an issue deriving from the usual process of system upgrade, ocurring in case of rpm-based systems, while configuring one of our clients’ software. It’s reasons and solution are pretty understandable and easy, but still may affect more of our customers without their awareness to it. The Story One […]

Trending Malware Museum

Today’s malwares are designed to be silent, unnoticeable and effective without drawing the attention of users to their maleficent activities. They steal our credit card and personal details without us realizing it. Although, it was not always the popular way to infect servers/computers. A couple of decades ago viruses usually featured colorful pictures, scrambled codes […]

Security analysis How strong is a „strong” password? 1/2

The idea Authentication methods have gone through huge development in the past few years and I believe that the spread of IoT devices will bring further advancement. Currently, however, the most widely used authentication method on the Internet is password-based authentication and we know that this method is far from being ideal – at least […]

Security analysis The Ninjas Mount Some Docks

Building and deploying Docker – the hottest topic of every devops forum and IT blogs. We kinda had the impression before, that we won’t miss our chances with it either. Why Docker? If you are in the web hosting business, containers and Docker technology cannot be such big news for you. Docker triumphed over virtualization. […]

Trending Censys vs. BitNinja

What is Censys? It is a search engine which allows people to search for the details on the devices and networks that compose the Internet. It uses the database of Zmap and ZGrab network scanners. Day by day, it analyses more than 4 billion IP addresses, which can be examined with the help of Censys.io. […]

Release notes New CloudFlare Integration

Our CloudFlare integration has been released not so long ago, giving new opportunities and more automated, flawless service to our customers. Our developers worked this project out, because many of our ninja clients use CloudFlare in parallel with our services. The aim of this article is to describe why we needed this development and also to give […]

Security analysis How does a malware/spam campaign work?

The onset of the Internet has brought many rewarding benefits to human race. Thanks to it, communication that was pegged to letters, faxes and phone calls back then, have now become faster, reaching more audiences. Social media has also made it possible to connect with people from all around the globe. Although, with this new […]

Trending Ad-Blockers from Security Aspect: Curse or Blessing?

Have you ever thought about ad-blockers a potential security risk in your everydays? You’d better be banner blind with ad-blockers on or watch out where you click. Ad-blocker pros Ad-blocker is an application that is used worldwide to protect your computers from the annoying, flashy and memory-devouring online advertisements. It is an easy-to-use and easy-to-install […]

Release notes How to protect your company and yourself from insulters?

There’s one thing in IT security that cannot be patched as many other vulnerabilities: human beings. And as far as the ‘human factor’ is much of a concern, it is our responsibility to educate and protect our employees, customers and businesses from hacks. Data Breach and Social Engineering Data breach stands for the unsolicited phishing […]

Experience the benefits of BitNinja!
Start the 5-min installation with one line of code and use all the security components without commitment and limitation for 7-trial days!
AICPA SOC BitNinja Server Security
Privacy Shield BitNinja Server Security
GDPR BitNinja Server Security
CCPA BitNinja Server Security
2024 BitNinja. All Rights reserved.
Hexa BitNinja Server SecurityHexa BitNinja Server Security
magnifiercross