Author: Dmitry Tkachuk

Imunify360 Proactive Defense and Real-time AV scanner Performance boost

imunify360 performance boost

The Imunify team is happy to report that we achieved another performance improvement. This time it relates to the Proactive Defense module and Real-time AV scanner.

Imunify360 - Proactive Defense Improvement

proactive-defense-improvement

On December 6th, the Imunify360 team released an improved set of rules for Proactive Defense. The rules are destined to enhance the overall performance of the server. At this time, we already see an average load decrease on servers running Imunify360 as well as significantly lower response time (see Figure 1).

Imunify Security - Monthly Digest July 2021

digest-july-monthly-2021

In July 2021, Imunify360 team introduced several guides covering server security best practices and was happy to share positive feedback of our clients - Guzel Hosting & Interserver.net. Check the posts below to learn more about the latest releases, package updates, case studies, guides and new vulnerabilities and issues discovered by the Imunify360 team.

Imunify Security - Monthly Digest June 2021

digest-june-cover-imunify360

In June, 2021, Imunify360 introduced a new version, v.5.8. In addition to that Imunify360 team devote themselves to creating different security guides and materials that could help both newbies and experienced users to take server security to the top with Imunify360. Read the posts below to stay tuned with the latest updates and security trends.

What are Steps to Secure a Linux Server?

what-are-steps-to-secure-a-linux-server

Overall, the Linux operating system is very secure, but the applications, tools, and configurations administrators install create risks to the environment. Linux powers 75% of the internet, and it’s installed on 6.64 million web servers. Because Linux powers critical systems around the globe, it’s imperative that administrators take the necessary steps to harden the operating system’s security. Although Linux is inherently secure, several configurations and strategies help harden its defenses and reduce the risk of a compromise. This article goes over the following questions:

Blocking Brute Force Attacks On WordPress

brute force wordpress imunify360

One of the easiest ways to attack a web site is to gain entry through a content management system, such as WordPress. To do this, hackers try to force a login to a site’s WordPress installation using frequently used passwords. These sorts of attacks are known as brute-force attacks. Additionally, read our website hosting security and WordPress Security article and learn how to keep your website secure in 2021.

Imunify Security - Monthly Digest May 2021

monthly-digest-may-server-security

May 2021 was a busy month for the Imunify Security team. Another version of Imunify360 was released, version 5.7. In addition to that, the Imunify team took part in CloudTalk 2021 and skyrocketed it with Igor Seletskiy’s speech about Imunify360’ proactive approach to security. Keep on reading to learn more about new features, CloudTalk 2021 and cPanel security tips.

Imunify Security - Monthly Digest April 2021

digest-april-1

Despite the fact that the fact that trees are blooming and everyone is enjoying spring sun, this month was busy for the Imunify Security team. Another version of Imunify360 was released, version 5.6. and Imunify version 5.7 came out in beta. Keep on reading to find out more about the latest package updates and some tips on how to stay secure.

Imunify Security - Monthly Digest March 2021

digest-marchMarch monthly digest gives an overview of version and package updates and the latest security vulnerabilities detected by the Imunify Security team. Read the posts below to learn all and beyond brute force attacks and how Imunify360 could mitigate them.

Configuring brute force protection in Imunify360

Configuring-brute-force-protection-in-Imunify360


Brute-force attacks are the most widely used cyber-attacks in the cyber-sphere. And dependent on the target, the protection method is unique to the attack. There are two main types of brute-force attacks:

  • Service level brute-force, targeting ssh, ftp, smtp services and others.
  • Web application level brute-force, e.g. attacks against WordPress, Magento, and similar CMSes and web-scripts.

Subscribe to Imunify security Newsletter