<iframe src="https://www.googletagmanager.com/ns.html?id=GTM-5HLVVHN" height="0" width="0" style="display:none;visibility:hidden">
Author: Greg Zemskov

What to do if your website is blacklisted



A hacker might not cause any noticeable damage when infiltrating your web server. You may not notice any change in performance or any loss of data.

But that doesn't mean everything is okay. A popular use of a compromised server is to distribute malware.

Malware is malicious software. It gets embedded into your website's pages and can infect any visitors to those sites.

Hackers do this by injecting malicious code into a database or into web page templates. Visitors get redirected to malicious sites, or inadvertently download trojans.

WebShield is back, issue fixed

webshield is back issue fixed

Here we announced the issue related to WebShield in Imunify360. As a quick-fix measure, we disabled WebShield remotely for the customers. 

Temporary disabling WebShield in Imunify360

Temporary disabling Webshield in Imunify360

Recently, we’ve noticed an issue related to WebShield in Imunify360. You can recognize it as an infinite loading of the page for a website using Cloudflare. A few customers with more than 75K greylisted IPs might be affected.

ImunifyAV is now bundled with cPanel & WHM v88


We at Imunify are excited to announce that the new version of cPanel & WHM, version 88, bundles ImunifyAV as its default antivirus solution.

ImunifyAV is provided free of charge. It features a highly efficient malware detection engine that finds most types of malware without stressing your system. With the ImunifyAV+ premium edition, malware is easy to remove with just one click. 

Imunify360 Heuristics: Improving Threat Detection


Imunify360 has six core components: Web Application Firewall, Malware Scanner, Proactive Defense, IDS/IPS, WebShield, and Cloud-Based Security. The last component, Cloud-Based Security, runs according to what we call heuristics. 

In Imunify360, heuristics are a set of rules based on information coming in from thousands of Imunify-protected servers all over the world. These servers send threat information to the Imunify cloud server, where it’s automatically processed by dozens of scripts. It’s also manually processed by our Analytics team.