At Imunify, we’re committed to empowering businesses with cutting-edge security solutions. Discover how Snel.com, renowned for being "Your Friendly Hosting Provider" from the Netherlands, revolutionized their server management services with Imunify360.
We’re pleased to announce the support of Debian 12 (Plesk, DirectAdmin, and generic panels, see stand-alone integration) by Imunify products with one important note: Imunify360-firewall required legacy iptables support. To turn it on execute the following commands:
Imunify360 researchers have identified a growing number of malicious redirects on Joomla CMS.
In this post, discover how Imunify360 is leading the charge against a sophisticated cyber threat targeting Joomla CMS. This post delves into the rise of malicious redirects caused by a deceptive fake-plugin, capable of injecting harmful scripts into websites. Learn about the insidious mechanism of this threat, which targets unsuspecting visitors with phishing and malware, and how Imunify360's advanced security measures, including its proactive scanner and comprehensive defense system, offer robust protection against such evolving cyber dangers. Protect your Joomla site with Imunify360's integrated antivirus, firewall, and WAF, ensuring the safety and integrity of your online presence.
One of the easiest ways to attack a web site is to gain entry through a content management system, such as WordPress. To do this, hackers try to force a login to a site’s WordPress installation using frequently used passwords. These sorts of attacks are known as brute-force attacks. Additionally, read our website hosting security and WordPress Security article and learn how to keep your website secure.
In today's digital landscape, server security is crucial for hosting providers. Cyber threats are rampant, demanding the safeguarding of infrastructure and maintaining trust. XetNET faced escalating cyber threats, overwhelmed IT and security teams, and the risk of reputation damage. Their goals were clear: robust protection, uncompromised performance, real-time monitoring, and seamless integration.
We designed a set of messages to report information about security threats that are dangerous for the server. Imunify uses cPanel contact manager to send notifications about those threats. We hope you will find them helpful. This feature can be managed through CLI.
We’re pleased to announce a new beta version of the Imunify360 Firewall module. Version 7.6 is now available!
Overall, the Linux operating system is very secure, but the applications, tools, and configurations administrators install create risks to the environment. Linux powers 75% of the internet, and it’s installed on 6.64 million web servers. Because Linux powers critical systems around the globe, it’s imperative that administrators take the necessary steps to harden the operating system’s security. Although Linux is inherently secure, several configurations and strategies help harden its defenses and reduce the risk of a compromise. This article goes over the following questions:
The internet contains over 1.7 billion websites, and every one of them is hosted by at least one web server. A web server can host hundreds of sites on one physical machine, but depending on the way it’s hosted, just one hacked website can be the downfall for all sites on the server. Security for web hosters is more important than ever as more customers depend on your cybersecurity best practices and monitoring to find ongoing attacks. Web servers usually host several business sites, which store customer data, so they are common targets for attackers. So, we've put together a list of hosting security best practices and tips essential for web hosting security. This articles covers the following hosting security topics:
A system administrator (or sysadmin) is perhaps one of the most stressful careers available to an aspiring computer science and information technology student. Sysadmins are typically responsible for network and computer systems, including but not limited to server security. A sysadmin’s job, therefore, is stressful because at any time an organization’s servers may fall victim to cyber attacks.