Security analysis From Monolith to Microservices in 10 Steps

Do you have a monolithic application (for example a complex server-side enterprise application) with big features like support varieties of different clients, API for 3rd parties and some integrations with other web services and message brokers? Code usage is tolerable, but you want to release a smashing feature in the future, though you do not […]

Release notes New versions released

In the last 2 weeks, we released 2 new versions of BitNinja. Let’s take a look at the novelties: BitNinja version 1.12.10: CaptchaChallenge pages now use 403 status code instead of 200. Good bots will notice it and leave it. This means, that the good bots will recognize our captcha pages, and won’t walk around […]

Trending Unix vs. Linux systems

Before the expansion of Windows Operational Systems and the creation of the Linux, the world was ruled by UNIX systems. The UNIX was used predominantly in the 1980’s. Despite of its positive traits it was mainly used by research centers, institutes and school’s operational system. It can be thanked partly to its price, and also […]

Trending Holiday Vulnerabilities

This time of the year is always very cheerful. It’s the holiday season; everyone is happy and excited with all the festivities going on. But it’s important to be careful, especially during the holidays and going into the new year. Hackers prey during this time period, distractions from the season are all around. Hackers need […]

Security analysis Remote Script Injection caught by BitNinja

Let’s see a real-life evidence from the BitNinja logs how we detect and block script injection.  The hackers always think they can fool the software, but the malicious scripts and packages are constantly dropped by Ninja Security. Being a machine-learning system, BitNinja collects the attack information and spreads it to other protected servers, so they will […]

Release notes Ransomware: what is it and why is it dangerous?

Let’s start with the definition. Ransomware is a kind of malware that installs itself onto an unprotected computer, encrypts some files, and asks for a certain amount of money for decryption or to not publish certain sensitive information online. It is called a denial-of-access attack and it can be very frustrating because you know that the […]

Trending Trump’s 4 Cyber Security Visions

President-elect of the United States, Donald J. Trump, will be inaugurated into office on Friday, January 20th, 2017. In light of this passing of the torch from President Obama to Trump, it’s important to review where Trump stands on cyber security and what his policies and goals may represent. I’ll break down Trump’s four main […]

Trending Have you ever forgot the root password of your server?

We are all human beings and do not work like flawless creatures of artificial intelligence, we are prone to make mistakes and forget things. Although, sometimes we forget crucial information which might be essential to our daily life, like the root password of our server. For a sysadmin it can be a real disaster if […]

Events Our user greylisting feature is one year old
Experience the benefits of BitNinja!
Start the 5-min installation with one line of code and use all the security components without commitment and limitation for 7-trial days!
AICPA SOC BitNinja Server Security
Privacy Shield BitNinja Server Security
GDPR BitNinja Server Security
CCPA BitNinja Server Security
2025 BitNinja. All Rights reserved.
Hexa BitNinja Server SecurityHexa BitNinja Server Security
magnifiercross