Top

Technology & Development partnership with OpsShield (cPGuard)

Malware.Expert a leading provider well-known for Commercial WAF rules, ClamAV Signatures for PHP and for many other projects under their hood announcing its technology/development partnership with OpsShield, an Indian based development and server management company offering security suite for cPanel servers and other security/management solutions for Linux servers. “We are very excited to join cPGuard […]

Continue Reading

WordPress Two-Factor Authentication Plugins

Most websites are created by using WordPress application because of its user friendly interface and ease of use. Nowadays updates for major web application are released more faster than ever, this situation was due to that hackers are more efficient to break every code for finding any loopholes aggressively. So if any vulnerabilities are reported, […]

Continue Reading

What is Two-Factor authentication

Two-factor authentication is an additional security layer for your Website or business helping to rescue from the vulnerabilities of a standard password-only approach.v Nowadays, It is more dangerous to use online services to store too much data in your cloud, and your credit cards are linked to accounts with retail websites. Two-factor authentication (2FA) adds […]

Continue Reading

Howto Configure CSF with cPanel server

What Is Configserver Security And Firewall (CSF) ? CSF is commonly used firewall that provides a good level of protection with easy to manage commands. It is used for Login/Intrusion detection, SSH login notification, Excessive connection blocking, Suspicious file reporting etc. In this tutorial, we will go through the Configuration of CSF in cPanel server […]

Continue Reading

WordPress GDPR Compliance Plug-in exploited (Privilege Escalation Flaw)

On the 6th of November 2018, a popular WordPress plugin known as WP GDPR Compliance plugin, which is created to help website owners with GDPR compliance, was found to contain harmful vulnerabilities for privilege escalation that could allow for arbitrary code execution. Hackers have exploited this vulnerability to attack a number of websites. The vulnerability […]

Continue Reading

Install CSF firewall on cPanel server

Config Server Firewall (CSF) is a firewall that provides a good level of protection with easy of managing commands. From list of security plugins available, this is the widely used security tool that can protect Linux server against attacks like brute force,malware attacks, phishing etc..This is a free plugin and have well developed interface for […]

Continue Reading

Install cPanel and cPGuard to CentOS 7.x

This tutorial we installing cPanel server with cPGuard plugin. First need fresh minimal install of CentOS. Installation Requirements Minimum of 1 GB RAM (but 2 GB recommended). At least 20GB of free disk space (but 40 GB recommended). A valid cPanel license. Standard hostname (FQDN or Fully Qualified Domain Name) Perl Please note: Once you […]

Continue Reading

Uninstall CSF Firewall

Installation and Removing of CSF and LFD is even more simple. Along with installation CSF provides uninstallation script in configuration folder.You can uninstall CSF firewall by running following script from the terminal. In cPanel servers: Code: cd /etc/csf sh uninstall.sh In DirectAdmin servers: Code: cd /etc/csf sh uninstall.directadmin.sh In No-Panel Linux servers: Code: cd /etc/csf […]

Continue Reading

Malware Scanner Tools for Linux

We all know that Linux is the most powerful operating system around us, but there is a misconception that Linux does not need any antivirus programs on it. For maximum protection this is essential. More than 60% of web-servers are running on Linux servers and most of them are protected with some solutions. From my […]

Continue Reading

Rootkits

As malware go, rootkits are one of the more nasty ones. They are difficult to detect and are capable of causing more serious damage to any system they are installed in. What is a rootkit? Essentially, a rootkit is a software application designed to provide privileged access (hence the “root” in the name) to a […]

Continue Reading