Top

Rootkits

As malware go, rootkits are one of the more nasty ones. They are difficult to detect and are capable of causing more serious damage to any system they are installed in. What is a rootkit? Essentially, a rootkit is a software application designed to provide privileged access (hence the “root” in the name) to a […]

Continue Reading

wp-crawl.php

WordPress Duplicator version below <1.2.42 have Remote Code Execution (RCE) vulnerability, which allow modify wp-config.php file and inject malicious PHP code in there. Vulnerable code in this case isn’t present within the Duplicator plugin directory itself. The flaw becomes exposed when using Duplicator to migrate or restore a backed-up copy of a WordPress site. Reminder […]

Continue Reading

The 7 Popular Blacklists To Keep Away Spam Emails

IPs or domains that cause threat to your inboxes will be listed by the blacklists. If you are on a blacklist you should not keep quite you must act quickly. There are several email blacklists which tries to impress you with a long list, which might not be good tool. So, here is a list […]

Continue Reading

Email Blacklist and how do they work?

Are you fed up with spams on your Email? Don’t worry! You can fight them using RBLs and DNSBL. RBL stands for Real-time Black-hole List and DNSBL stands for Domain Name Server Blacklist. It helps to decrease the issues of email spamming. It is effectively used all around the world to share the IP addresses […]

Continue Reading

How to Install Nginx with ModSecurity v3.0

Mod Security is an open-source web-based firewall application (or WAF) supported by different web servers: Apache, Nginx and IIS. Mod Security’s Open Source availability has resulted in it becoming one of the world’s most popular Web application firewalls and this application layer firewall is developed by Trustwave’s SpiderLabs and released under Apache License 2.0. Mod […]

Continue Reading

Modx Revolution <=2.6.4 (Remote Code Execution)

Description Last week published two critical vulnerabilities affecting MODX Revolution <=2.6.4 which include remote script execution and file/directory removal. Hackers thereby able to compromise the website or spoil or delete files or directories. In the MODX Revolution Version <= 2.6.4, filtering users have an incorrect access control capability in the parameters, which becomes the phpthumb class that causes the […]

Continue Reading

Importance of configuring firewall

A firewall is a security tool used in networks for preventing attacks from hackers, viruses, worms, malware etc. If we didn’t configure it correctly, it will not give the correct use. So configuring firewall is important. It can be either hardware or software based. It is like a physical gate in our house, it blocks […]

Continue Reading

All in one Security Plugins for cPanel Servers

In this century, no of hackers and malware they created has been increased day by day. There are some basic security plugins and inbuilt protection available on cPanel, but nowadays they are not aggressive as earlier. Since new malware’s are being created by hackers, we need a new software’s to fight against malware threats and […]

Continue Reading

Marvins.php webshell

The malware is a PHP webshell – a script, which when installed on a compromised system, presents a sophisticated administration platform allowing the attacker to browse the filesystem of the compromised server to upload, create, edit, download or delete files. Today we found this new PHP webshell from one of client server, which we have […]

Continue Reading

cPanel Security Hardening

Server Security is something an exception. One day or another, your server will be attacked and the integrity of your data will be at risk, that does not mean you will lose the current and existing customers in the process. cPanel provides easy access to your search and accessibility, user-friendly interface for managing your website. […]

Continue Reading