The hosting industry never stands still. Every year, new technologies, fresh challenges, and unexpected opportunities change the way providers serve their customers. That’s exactly why we publish the Industry Year in Review report. It captures where we’ve been, where we’re going, and what it all means for the future of hosting.
Server security is a top concern for hosting providers, and finding ways to enhance it while also generating revenue can be a challenge. However, with the launch of MyImunify, a revolutionary addition to the Imunify security suite, hosting companies now have the opportunity to transform server security into a lucrative revenue stream and take their security game to the next level.
Server security is a top concern for hosting providers, and finding ways to enhance it while also generating revenue can be a challenge. However, with the launch of MyImunify, a revolutionary addition to the Imunify security suite, hosting companies now have the opportunity to transform server security into a lucrative revenue stream and take their security game to the next level.
We are thrilled to announce that the Imunify Security team from CloudLinux will be attending CloudFest USA 2023 from May 31st to June 3rd in Austin, TX, USA. As the proud Gold Sponsor of this event, we're gearing up to connect with you and showcase our innovative solutions that keep the cloud safe and secure.
We are thrilled to announce that the Imunify Security team from CloudLinux will be attending CloudFest USA 2023 from May 31st to June 3rd in Austin, TX, USA. As the proud Gold Sponsor of this event, we're gearing up to connect with you and showcase our innovative solutions that keep the cloud safe and secure.
The recent cyber attack found by Patchstack researcher Rafie Muhammad on the "Advanced Custom Fields" plugin for WordPress is a stark reminder of how vulnerable websites can be to hackers. In this case, over two million users were at risk of cyberattacks due to a vulnerability (a flaw, tracked as CVE-2023-30777) that allowed miscreants to inject malicious code into webpages and potentially hijack administrative accounts.
The recent cyber attack found by Patchstack researcher Rafie Muhammad on the "Advanced Custom Fields" plugin for WordPress is a stark reminder of how vulnerable websites can be to hackers. In this case, over two million users were at risk of cyberattacks due to a vulnerability (a flaw, tracked as CVE-2023-30777) that allowed miscreants to inject malicious code into webpages and potentially hijack administrative accounts.

We’re pleased to announce a new beta version of the Imunify360 Firewall module. Version 7.1 is now available!

We’re pleased to announce a new beta version of the Imunify360 Firewall module. Version 7.1 is now available!

With Apple’s recent release of a security update for the iPhone, iPad, and Mac, it brings attention to the critical importance of regular software updates. We’re going to explore the significance of staying up-to-date with the latest security patches and highlight the efforts of Imunify360 in enhancing their update process to deliver faster and safer protection for servers.

With Apple’s recent release of a security update for the iPhone, iPad, and Mac, it brings attention to the critical importance of regular software updates. We’re going to explore the significance of staying up-to-date with the latest security patches and highlight the efforts of Imunify360 in enhancing their update process to deliver faster and safer protection for servers.

We’re pleased to announce a new beta version of Imunify360. Version 7.0 is now available!

We’re pleased to announce a new beta version of Imunify360. Version 7.0 is now available!

We’re pleased to announce a new beta version of the Imunify360 Firewall module. Version 7.0 is now available!

We’re pleased to announce a new beta version of the Imunify360 Firewall module. Version 7.0 is now available!

Infection of cron files is a serious threat to any Linux system that uses task automation. Hackers can use these files to regularly launch malicious programs and scripts.

Infection of cron files is a serious threat to any Linux system that uses task automation. Hackers can use these files to regularly launch malicious programs and scripts.
Dear Imunify customers,
We would like to inform you about a recent security incident that may have affected the analytical data collected from your servers by the Imunify product (e.g., attacker IP addresses, captcha events, etc.). Your privacy and information security are our top priorities, and we deeply regret any inconvenience this may cause.
Dear Imunify customers,
We would like to inform you about a recent security incident that may have affected the analytical data collected from your servers by the Imunify product (e.g., attacker IP addresses, captcha events, etc.). Your privacy and information security are our top priorities, and we deeply regret any inconvenience this may cause.
Welcome to the video recording of our interactive webinar on server security. CloudLinux Technical Account Manager Eric Ellis and Hivelocity Sr System Admin Eric Lewellen provide an overview of common server security ideas and engage in a lively debate about which ones matter and which ones don't.
Welcome to the video recording of our interactive webinar on server security. CloudLinux Technical Account Manager Eric Ellis and Hivelocity Sr System Admin Eric Lewellen provide an overview of common server security ideas and engage in a lively debate about which ones matter and which ones don't.

.png?width=115&height=115&name=pci-dss%20(1).png)
