Securing Websites with Threat Intelligence API

Posted on January 04, 2017 by Yury Sergeev


Securing Websites with Threat Intelligence API

Many researchers have been monitoring malicious activities of cyber criminals who compromised vulnerable e-commerce websites in an effort to steal payment card information provided by their customers. Those hackers often injected a keylogger code function directly into the sites. It was the Javascript, PHP or another language keylogger which installed as a part of the websites and captured payment information entered by users. For examples, Magento Commerce and OpenCart platforms were impacted in 2016.


Tags: Threat Intelligence IP reputation machine learning security e-commerce


8 reasons why your site can be hacked

Posted on October 18, 2016 by Nikolay Arefiev


8 reasons why your site can be hacked

When you use the Internet for your business, you are confronted with a task of protecting your Internet resource. Some small Internet-based companies believe that if they don’t store the customer payment information at their web resource, no hacker attack can significantly harm their business. However, nowadays there are exist attacks that indirectly influence all participating parties, even though your resource may not have been the target of the attack.


Tags: signatures IP reputation machine learning log analysis anomalies security


Web Server Log Analysis

Posted on May 28, 2016 by Yury Sergeev


Web Server Log Analysis

If you have a web app running on a web server, you know that it is so helpful to analyse the access and error logs to get information about how it is functioning. Systems administrators use different tools to analyse HTTP statistics, but not all of them provide enough information. For instance, Google Analytics can't provide client IP addresses which might be really useful to have then you want to investigate what was going on. By looking into a website access log it is possible to extract client IP addresses and analyse their reputation. Therefore, it is essential to use special instruments for log analysis. As an illustration, RST Cloud shows which malicious sources that had repeatedly attacked other websites contacted your web server.


Tags: apache iis nginx machine learning log analysis anomalies security