CleanTalk launches a major project to create a cloud service for the safety of websites. The project will include several functions: protect the site against brute force attacks, vulnerability scanner and virus removal. Each function will have a number of features which help you easily keep the website safe from hackers.
Visualization of attacks, anomalies and security breaches with OpenGraphiti
Those who visit our headquarters in San Jose (Cisco Systems) always amazes large video wall that displays a picture of attacks in real time with the ability to drill after touching certain areas of the screen. However, like any map attacks, and I have collection of already 34, any such visualization is ineffective in real
Phishing on a new level: Cloudflare + Protonmail + Unvalidated Redirects – set of young Fisher
“… you come to me, and you ask something, but you don’t ask with respect …” Vito Corleone Phishing is still the most popular and most successful type of hacker attacks. It’s simple, attacked is not the software, not servers, not networks, and the most vulnerable components of information systems – users. I often meet
Best practices to protect e-commerce sites
Online shopping has always attracted intruders: it is a source of credit card data (now almost irrelevant); user data; data about orders and market trends (consumer demand); a traffic source; manipulation with the discount coupons, etc. An e-commerce site may be attacked as intruders in “free hunting” (non-targeted attack) and by the request of unfair
Protect SSH from brute-force on any port
Today I was interested in the survey whether it is necessary to move SSH to a nonstandard port. The survey is not as interesting as the way the author @zivot_je_cudo to protect SSH from brute-force password: after wrong connection attempts to block new attempts within 20 seconds. The delay apparently chosen empirically on the basis
How to strengthen the protection of passwords of “12345” from brute-force attack
Object: Web login form. Given task: to strengthen the protection of the user’s account from the selection of a simple password to his account, using a minimum of resources. What is the minimum of resources? It does not use a table-reference to block by IP-address and User-Agent. Do not use unnecessary requests to the system;
Fraud Prevention with CleanTalk
CleanTalk started to provide its database of IP addresses for banks, payment services, and the companies, evaluating the risk of fraud that strengthens the existing security system of the organization bringing it to a new level. Fraud can happen anywhere in the eCommerce world. It doesn’t matter if you’re running a small online business or
Check domain for backlinks in spam comments/messages.
We are pleased to announce the launch of check the availability of backlinks to domain in spam comments/messages. CleanTalk keeps track of the links in spam comments/messages; this will help you to learn about the incorrect SEO techniques in promoting the website and to maintain the reputation of the website. The presence of the domain
Email marketing for the cloud service
For cloud services, email marketing is an important tool that should be used for maximum impact. Email remains one of the main driving forces in the marketing and is the basis for creating customer relationships. Properly configured email marketing can provide significant growth in the customer base. We want to tell about our developments used
The development of chat-bots for Telegram and Slack with PHP
General information This article describes how to create simple chat-bots of services Telegram and Slack on the example checks the IP|Email for spam using antispam service CleanTalk. Telegram The first step is the creation of your bot (in our case @CleanTalkBot) – for this purpose there is a bot Telegram @BotFather. Add it to your