<iframe src="https://www.googletagmanager.com/ns.html?id=GTM-5HLVVHN" height="0" width="0" style="display:none;visibility:hidden">
Tag: advice

Release Notes: Imunify360 firewall module v7.7

IM360-major-release

We are glad to announce the latest release of Imunify360, introducing a new feature: the ability to add Graylist records. This feature enhances server security control by allowing administrators to manage visitor access more precisely in border cases.

Manual malware cleanup

Imu360_manualmalwarecleanupHow to clean a website? How to remove malware? In case ImunifyAV, Linux server antivirus, signals about malware that have been found, please find the guidelines for the malware infection cleanup which can be done manually below:

Elevating Website Security and Client Satisfaction with Imunify360: The Snel.com Success Story

IM_CS_snel
At Imunify, we’re committed to empowering businesses with cutting-edge security solutions. Discover how Snel.com, renowned for being "Your Friendly Hosting Provider" from the Netherlands, revolutionized their server management services with Imunify360.

Release Notes: Imunify support Debian 12

IM360-major-release

We’re pleased to announce the support of Debian 12 (Plesk, DirectAdmin, and generic panels, see stand-alone integration) by Imunify products with one important note: Imunify360-firewall required legacy iptables support. To turn it on execute the following commands:

 

Joomla under attack through a fake-plugin

IM_joomla

Imunify360 researchers have identified a growing number of malicious redirects on Joomla CMS.

In this post, discover how Imunify360 is leading the charge against a sophisticated cyber threat targeting Joomla CMS. This post delves into the rise of malicious redirects caused by a deceptive fake-plugin, capable of injecting harmful scripts into websites. Learn about the insidious mechanism of this threat, which targets unsuspecting visitors with phishing and malware, and how Imunify360's advanced security measures, including its proactive scanner and comprehensive defense system, offer robust protection against such evolving cyber dangers. Protect your Joomla site with Imunify360's integrated antivirus, firewall, and WAF, ensuring the safety and integrity of your online presence.

Blocking Brute Force Attacks On WordPress

Blocking Brute Force Attacks On WordPress

One of the easiest ways to attack a web site is to gain entry through a content management system, such as WordPress. To do this, hackers try to force a login to a site’s WordPress installation using frequently used passwords. These sorts of attacks are known as brute-force attacks. Additionally, read our website hosting security and WordPress Security article and learn how to keep your website secure.

Strengthening Server Security with Imunify360: XetNET's Success Story

IM_CS_xetnet_R01b

In today's digital landscape, server security is crucial for hosting providers. Cyber threats are rampant, demanding the safeguarding of infrastructure and maintaining trust. XetNET faced escalating cyber threats, overwhelmed IT and security teams, and the risk of reputation damage. Their goals were clear: robust protection, uncompromised performance, real-time monitoring, and seamless integration.

How to Manage Imunify Security Notifications

IM_securitynotifications

We designed a set of messages to report information about security threats that are dangerous for the server. Imunify uses cPanel contact manager to send notifications about those threats. We hope you will find them helpful. This feature can be managed through CLI. 

Imunify Firewall Module v7.6 Released

IM360-beta-release

We’re pleased to announce a new beta version of the Imunify360 Firewall module. Version 7.6 is now available!

What are Steps to Secure a Linux Server?

IM_securitysteps

Overall, the Linux operating system is very secure, but the applications, tools, and configurations administrators install create risks to the environment. Linux powers 75% of the internet, and it’s installed on 6.64 million web servers. Because Linux powers critical systems around the globe, it’s imperative that administrators take the necessary steps to harden the operating system’s security. Although Linux is inherently secure, several configurations and strategies help harden its defenses and reduce the risk of a compromise. This article goes over the following questions:

Subscribe to Imunify security Newsletter