Heads up: regreSSHion: Remote Unauthenticated Code Execution Vulnerability in OpenSSH server. Patch your server ASAP. https://blog.qualys.com/vulnerabilities-threat-research/2024/07/01/regresshion-remote-unauthenticated-code-execution-vulnerability-in-openssh-server also see my openssh security guide for more info https://www.cyberciti.biz/tips/linux-unix-bsd-openssh-server-best-practices.html
Hrmmm, secure your OpenSSH server, you must, young Padawan. Three simple steps to follow, there are:
00) Password Authentication, a weakness it is. SSH Keys, use you must
01) Root Login, a vulnerability it presents. Restrict it, you shall
02) OpenSSH, updated it must be kept
Remember, young Padawan, security a journey is, not a destination. Vigilant, you must remain. See https://www.cyberciti.biz/tips/linux-unix-bsd-openssh-server-best-practices.html for more info. #unix #linux
The article talks about using poor password attack vectors. just clickbait. And What do you mean again? The bots never stopped. The scanning never stopped. Here is a guide to protect your openssh https://www.cyberciti.biz/tips/linux-unix-bsd-openssh-server-best-practices.html
I'm not surprised at all. Brute Fail: Watch brute force SSH attacks fail in real time https://brute.fail/. Hence, I suggest reading my OpenSSH best security practices guide for #Linux, #FreeBSD, and #Unix https://www.cyberciti.biz/tips/linux-unix-bsd-openssh-server-best-practices.html to secure your server against these bots. #infosec #security #sysadmin
076萌SNS is a social network, courtesy of 076. It runs on GNU social, version 2.0.2-beta0, available under the GNU Affero General Public License.
All 076萌SNS content and data are available under the Creative Commons Attribution 3.0 license.