New Detection Capabilities in Our Monitoring Tools
We're excited to announce a significant upgrade to our suite of monitoring tools designed to enhance the security and integrity of your digital assets. Our latest rollout includes new checks that encompass a wide range of file types and configurations, aimed at identifying potential vulnerabilities before they can be exploited.
Enhanced Configuration File Checks
Configuration files are often targeted by attackers due to their sensitive content and critical role in system operations. Our new set of checks includes:
- •YAML and YML Files: Monitoring
/config.yml
and/config.yaml
files, ensuring they do not exceed 500 KB to prevent bloating and potential manipulation. - •PHP Configuration Files: The
/config.php
files, often containing sensitive PHP settings, are now checked for specific content markers, capping at 500 KB. - •Web and Database Configuration: High-impact checks for
/web.config
and SQL dump files like/dump.sql
,/backup.sql
, and/database.sql
to monitor SQL commands and database directives within a 5 MB size limit. - •WordPress Configuration: Reinforced monitoring of WordPress configuration and setup files, including
wp-config.php
andwp-admin/setup-config.php
.
Database Integrity and Security
Maintaining the integrity of database backups and configurations is crucial for data security. Our enhanced checks include:
- •SQL Content Monitoring: Scrutinizing SQL dump files for potential exposures of structure and data insertion commands.
Source Code and Version Control
Source code and version control systems can be avenues for information leaks if not properly secured. To address this, we've added:
- •Archive Files and Version Control Systems: Checks on archive files such as
/backup.zip
and/backup.tar.gz
, along with Git HEAD files in/.git/HEAD
.
Sensitive Credential Protections
Credentials stored in system files are a prime target for cyber threats. Our system now includes checks for:
- •SSH Private Keys: Files such as
/.ssh/id_ed25519
,/.ssh/id_ecdsa
, and/.ssh/id_rsa
are monitored closely to ensure they contain private keys and do not exceed 50 KB.
This rollout reflects our commitment to providing robust, comprehensive monitoring solutions that safeguard your digital infrastructure against evolving security threats. By continuously expanding our detection capabilities, we ensure that our tools remain effective in the dynamic landscape of cybersecurity threats.