
These fears are unfounded. Malware Scanner removes malicious code that’s been injected into a file, while leaving the rest of the file intact. It also removes malicious files that have been included into other files. Enabling Auto Cleanup is completely safe and effective.

In version 4.5, Imunify360 introduced a new way to prevent brute-force attacks against mail accounts: a PAM module extension that integrates with cPanel to block attacks that target the Exim and Dovecot bundle.
Let’s explore the problems that this new PAM module extension solves, examine how it works, and learn how to use it.

When the Imunify360 Malware Scanner for Linux servers component identifies an injected code snippet as malicious, how can you tell it’s malicious? How can you avoid reporting this malicious code as a false-positive? The Imunify product team can show you how.

Previously, Imunify360 had to be installed through a particular control panel, such as cPanel (read more about cPanel security), DirectAdmin, or Plesk (read more about Plesk security). Now, with version 4.5, it can be installed directly on the server, independent of any panel, regardless of the administrative interface.
This new version of Imunify360 can be run on any CentOS 6/7, Ubuntu 16/18, RHEL 6/7, or Cloudlinux 6/7 server with Apache web server. It provides complete six-layer security for Linux VPS, dedicated, and shared servers--without requiring any web control panel.

At 12 noon (Eastern Standard Time) on Wednesday, 12 February, we’ll be conducting a webinar on Imunify360. Click hereto sign up and join the conversation on what’s new with our automated server protection suite. You could check webinar recording here.

Imunify360 is now integrated with the JetBackup server backup application. Anyone using JetBackup with WHM or cPanel can now elect to use Imunify360.

The new version of Imunify360, version 4.5, is almost here (beta version will be available in December), and it will include default scanning values that should eliminate all risk of malware infection.
.png)
The popularity of WordPress makes it a prime target for hackers. In one of our regular investigations, we recently encountered a particular strain of malware that targeted it. Here’s an analysis of that malware that we’d like to pass on to sysadmins.
.png?width=929&name=unnamed%20(3).png)
Doorway pages are a great way to improve a website’s SEO ranking.
They’re also a great way to get your domain blocked by major search engines.
So why are they still prevalent? How do they work, and why should you care if your web server hosts them?
That’s what I’ll cover in this article.


.png?width=115&height=115&name=pci-dss%20(1).png)
