Here are the results.

Trending Is Big Brother Watching us ?

Since the release of Pokemon Go two weeks ago, several accidents and flabbergasting incidents occurred to its users.  For example there was a person who drove to a tree by car because he was using the app while driving. Furthermore, since last week, we can talk about the first lethal accident connected to the mobile […]

Trending China’s Great Cannon uses Web traffic for DDoS attacks

Most of us might have heard about the strict Internet censorship of China conducted by the Great Firewall, which bans all web requests that threaten their democracy. The browser either shows a blank page or a reminder about the censorship. However, not so long ago researchers found that China is deploying a tool, called the […]

Security analysis The Ninjas Mount Some Docks

Building and deploying Docker – the hottest topic of every devops forum and IT blogs. We kinda had the impression before, that we won’t miss our chances with it either. Why Docker? If you are in the web hosting business, containers and Docker technology cannot be such big news for you. Docker triumphed over virtualization. […]

Security analysis How does a malware/spam campaign work?

The onset of the Internet has brought many rewarding benefits to human race. Thanks to it, communication that was pegged to letters, faxes and phone calls back then, have now become faster, reaching more audiences. Social media has also made it possible to connect with people from all around the globe. Although, with this new […]

Trending Biggest hacks of 2015

In today’s world more and more features are available online. New solutions become available day by day for making our life easier, simpler, faster. Regarding the last decade we have been able to say goodbye to long hours of administration. The notion of physical distance has changed too as we can speak now with anyone […]

Trending Abdullkarem attack – a hack against sysadmins’ bad practice

Mystery is on the horizon, ladies and gentlemen! And we always get excited about unappreciated server attacks. Just like in case of this ‘abdulkarrem’ one. Come, put on the role of Sherlock Holmes with us. Recently, there is a very frequent attack type. More and more sysadmin experience and complain about malicious request like these: […]

Security analysis CryptoPHP – stop it with BitNinja

We have terrific news again: BitNinja is able to directly fight against CryptoPHP malware. But what is this backdoor? And what does it do with your servers? Find out from our blog. What is CryptoPHP? CryptoPHP is a backdoor used for spamming and illegal search engine optimization (blackhat SEO) actions. This script provides remote control to […]

Events On the spot: HostingCon 2015

Every year the top elite of web hosting industry come together for 4 days at HostingCon Global. This year San Diego hosted the conference with all its Californian vibes which provided an extraordinary atmosphere for networking, learning and collaboration. Not only the biggest and most influental companies attended as exhibitors this year, but BitNinja was […]

Security analysis How bots rule the Internet – and your performance

Bots have been on the Internet for a really long time. Maybe you weren’t even born, when the first one was programmed to automate a task or pretend to be a real person. During the time, their role became more and more important. They are the majority of the internet by now. According to the […]

AICPA SOC BitNinja Server Security
Privacy Shield BitNinja Server Security
GDPR BitNinja Server Security
CCPA BitNinja Server Security
2024 BitNinja. All Rights reserved.
Hexa BitNinja Server SecurityHexa BitNinja Server Security
magnifiercross