We’re pleased to announce a new beta version of Imunify360. Version 6.10 is now available. The following features are new in the v6.10 beta release:
We’re pleased to announce a new version of Imunify360. Version 6.9 is now available. The following features are new in the v6.9 release:
We’re pleased to announce a new version of Imunify360. Version 6.8 is now available. The following features are new in the v.6.8 release:
We’re wrapping up Cybersecurity Awareness Month with a webinar that’ll cover key tips to protect your servers from cyber attacks. Just in time for Halloween, we’ll dive deep into the online threats that lurk in the dark – and show you how to protect yourself from the dangers you can’t see.
An insider’s point of view is always valuable. Arianna Della Valle shared her perspective on server security with our own Eric Ellis in our webinar “Imunify360 Cybersecurity Awareness Month: Spotlight on Netsons” – now available on demand by clicking here.
To celebrate Cybersecurity Awareness month in October, we planned a special webinar to cover everything you need to know about how to protect your servers against unknown threats, specific types of attacks you may not know about, and why it matters more now than ever.
Join us on Tuesday, October 18 at 11 am EST / 5:00 pm GMT+2 for a conversation with Arianna Della Valle about her server security journey with hosting company Netsons. She’ll share the challenges Netsons faced, why change was critical, and how she’s been able to increase both productivity and profits.
September was a busy month at Imunify360. Check out our latest news, upcoming webinars, and recent release notes.
We are happy to announce that we made some significant protection improvements for the cases when different protection modules work in cooperative mode.
We’re pleased to announce a new version of Imunify360. Version 6.7 is now available. The following features are new in the v6.7 release:
On Sep 15, we detected a malicious campaign. It was evident that the attackers we discovered were using phishing techniques to trick users into downloading a malicious binary file. They used a fake message on websites stating that a user has been blocked by Cloudflare. Meanwhile, infected websites getting the message would not necessarily even use Cloudflare services.