Understanding WAFs and the Power of Pyxsoft for cPanel-Based Sites

Understanding WAFs and the Power of Pyxsoft for cPanel-Based Sites

In the ever-evolving landscape of cybersecurity, web applications face a constant barrage of threats. To fortify the digital fortresses surrounding our online presence, web developers and administrators turn to robust security measures, and one such crucial defender...
Log4Shell Vulnerability Protection

Log4Shell Vulnerability Protection

Log4Shell Vulnerability Protection As of 10 December, three critical vulnerabilities were reported in Apache’s Log4Shell component. Log4J is a library made in Java that is used to write log files. It is estimated that more than 35,000 applications use Log4J and...
Brute Force Protection explained

Brute Force Protection explained

The brute force is one of the most common ways used by hackers to gain access to a server. This method is used against many targets: SSHFTPMail accountsCMS like WordPress and Joomla! In the lasts times there have been a huge increment in BF attacks against WordPress...
Hacking tools: C99 Shell

Hacking tools: C99 Shell

What is a web shell? A web shell is a script that is often uploaded to a server with the aim of giving a hacker the remote control of a machine. Web servers that become infected can either be internal to the network or internet-facing, where the shell is utilized to...
WordPress load-scripts DoS vulnerability

WordPress load-scripts DoS vulnerability

WordPress Vulnerability CVE-2018-6389 February, 5th, 2017. A new WordPress vulnerability was discovered by Israeli researcher Barak Tawily. According to the official WordPress website, 29% of the existing websites use this platform and, therefore, are affected by this...