Choose a couple of the best ways to notify you (admin) on critical issues detected by Imunify360?
As always, CloudLinux is a proud sponsor of the cPanel’s events and this year, at Webpros Summit we will represent Imunify Security Products.
Learn webserver security from those who know it best.
This year, cPanel and Imunify team giving you the opportunity to learn more about Imunify through our Imunify Security Products certification training course right at WebProsSummit 2019.
A new vulnerability has been discovered [1] in the popular ClamAV antivirus scanning engine.
ClamAV is one of the antivirus scanning engines used in ImunifyAV and Imunify360.
Malware changes daily, sometimes hourly.
To keep servers safe, you must make sure your Imunify360 malware database is always up to date. We're striving to make Imunify360 the easiest way to keep Linux web servers secure. So we're announcing that, as of July 10, 2019, the Imunify360 and ImunifyAV malware and black hash databases get updates every business day.
Your web server's image processor could be malware hiding in plain sight.
I'm going to describe an interesting type of malware the Malware Intelligence Team recently uncovered during a recent research operation.
At the time of writing, there were 11,320 cases of it detected and neutralized on 265 websites across 183 servers.
It is a particularly ingenious and potentially destructive type of malware: it is designed to appear as a legitimate image processor, and can act as a backdoor to your web server.
In Imunify360 v4.2 beta, we introduced “Hooks”, a new way to handle asynchronous events coming from the Imunify agent. It works like a simple event handler. For example, you can create a script that will run when malware is detected (right after the on-demand or background scan is finished).
The updated version of the article came up and all the essentials of using Imunify Hooks are now covered in a short video, check here.
We no longer use ClamAV for malicious files detection, and keep it as a part of Imunify360 only for detecting suspicious files. Starting from Imunify360 v4.3, we're removing it completely.
We have a nice, new, time-saving tip over on the CloudLinux KnowledgeBase.
An unlucky upshot of running your own website or online store is that, sooner or later, hackers will add it to their ‘juicy list of prey’. Once in their list, hackers will continuously scan and probe your site for weaknesses, trying to find a way to further their illicit goals.