To protect your sites, we utilize a commercially accessible ruleset on our Web Application Firewall,called ModSecurity.
Mod_security is an Apache module that assists with shielding your site from different threats. It is used to block commonly known exploits by use of regular expressions and rule sets and is enabled on all Cyberin servers by default.
Mod_Security can possibly block common code injection threats which strengthens the security of the server.
We will help to disable the mod_security rules if it's required by your application. When coding a dynamic site, in some cases clients neglect to write code to help prevent hacks by doing things, for example, validating input.
Mod_security can help at times those clients that run the web app that don't have security checks in their code. This is a straightforward SQL injection, where visiting this would make the database DROP and erase the clients' table from the database.
On the off chance that you are running Mod_security on your server it will obstruct this from running. Ordinarily, you would see a 406 error for this situation if mod_security is enabled.
You set up rules for Mod_security to check http calls against and check whether a risk is available.
Finding Mod_security is entirely simple. Any site that calls a string prohibited by a mod_security rule will give a 406 error instead to showing the page.
Disable ModSecurity on cPanel:
1- Login to your cPanel and under Security you will get plugin ModSecurity.
2- Click on ModSecurity and you will get option to ON/OFF Mod_security for the domain.