our Stack has arrived!

reserve your VPS now!

fyrastack.com

#tech #linux #fyralabs #fyrastack #vps #hosting #webhosting #cloud #servers #networking #server

My #peertube instance has about 72 GB worth of videos.

I use object storage (#s3 compatible) and it costs me about 0.77$ CAD per month.

I can't believe how cheap this is.

#hosting #ovhcloud

ЯнГекс ŃŠµŠ³Š¾Š“Š½Ń Ń€ŠµŃˆŠøŠ» в своём Cloud Š·Š°Ń„ŠµŠ¹Š»ŠøŃ‚ŃŒ ŠæŃ€ŠøŠ½ŠøŠ¼Š°Ń‚ŃŒ платежи.

ŠŠµ смог ŃŠæŠøŃŠ°Ń‚ŃŒ с Š¼ŠµŠ½Ń 68 Ń€ŃƒŠ±Š»ŠµŠ¹, Š¾Š±ŠøŠ“ŠµŠ»ŃŃ Šø заблокировал мне Ń€ŠµŃŃƒŃ€ŃŃ‹.

Š”ŠæŃƒŃŃ‚Ń какое-то Š²Ń€ŠµŠ¼Ń Šø большое количество попыток Ń€ŃƒŃ‡Š½Š¾Š³Š¾ запуска платежа, Š²ŠµŠ»ŠøŃ‡Š°Š¹ŃˆŠ°Ń Š·Š°Š“Š¾Š»Š¶ŠµŠ½Š½Š¾ŃŃ‚ŃŒ была погашена Šø Š°ŠŗŠŗŠ°ŃƒŠ½Ń‚ Š°ŠŗŃ‚ŠøŠ²ŠøŃ€Š¾Š²Š°Š»ŃŃ обратно.

ŠŠ¾, как оказалось, CDN обратно не Š²ŠŗŠ»ŃŽŃ‡ŠøŠ»ŃŃ. ŠŸŠ¾Ń‚Š¾Š¼Ńƒ что они его:

  • Š²Ń‹ŠŗŠ»ŃŽŃ‡ŠøŠ»Šø Š¾Ń‚Š“ŠµŠ»ŃŒŠ½Š¾
  • по какой-то причине не Š²ŠŗŠ»ŃŽŃ‡ŠøŠ»Šø обратно.

И саппорт мне ŠæŠøŃˆŠµŃ‚ не "мы всё исправили", а "у нас проблемы, вы там схоГите Šø почините у ŃŠµŠ±Ń CDN".

#Yandex #Cloud #hosting #Russia #support #WTF #FAIL #quality #pic #fun #sad #shit

Most "cloud hosting" isn't real cloud.

When traffic spikes -> sites crash.

Real cloud should scale instantly & stay online.

šŸ‘‰ Read more:
https://tdwebservices.com/td-web-services-makes-on-demand-cloud-configurations/

#Cloud #Hosting #Tech #Startup

TD Web Services Makes On-Demand Cloud Configurations - TD Web Services

On-Demand cloud configurations allows each customer the opportunity to create a plan that works for them, with all of the support of TDWS.

TD Web Services
The Curator: 4 fuss-free tips for hosting the perfect Easter brunch
The secret to a perfect Easter brunch? Details that make hosting a breeze. Set the scene with standout finds from Our Place, De'Longhi, Fable and more.
#TheCurator #HomeCurated
https://globalnews.ca/the-curator/11120740/how-to-host-easter-brunch/

Building Better Web Security Through Layered Strategies and Collaboration

Open Channels FM Building Better Web Security Through Layered Strategies and Collaboration Play EpisodePause Episode Mute/Unmute EpisodeRewind 10 Seconds1xFast Forward 30 seconds 00:00/00:35:37 SubscribeShare Apple Podcasts CastBox Overcast PocketCasts RSS Spotify RSS Feed Share Link Embed https://openchannels.fm/building-better-web-security-through-layered-strategies-and-collaboration/embed/#?secret=H18tSCOWbg<script> /*! This file is auto-generated */ !function(d,l){"use strict";l.querySelector&&d.addEventListener&&"undefined"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i<o.length;i++)o[i].style.display="none";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute("style"),"height"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):"link"===t.message&&(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document); //# sourceURL=https://openchannels.fm/wp-includes/js/wp-embed.min.js </script> ' title="Embed Code" class="input-embed input-embed-2551715" readonly/>

Download file | Play in new window | Duration: 00:35:37

In this episode join host Adam Weeks as he sits down under the big top at CloudFest with three industry leaders—Andrew Killen, CTO of Servebolt; Aaron Campbell, VP of Product at Monarx; and Mart Virkus, Head of Marketing at Patchstack. In this episode, they dive into how hosting and security companies are collaborating to tackle the ever-evolving landscape of cyber threats.

From the critical importance of layered security and the impact of AI-driven malware to real-world stories of vulnerabilities and practical strategies for keeping websites safe and high-performing, this conversation is packed with insights, anecdotes, and a touch of humor. Whether you’re setting up an e-commerce store or securing client sites, this episode has something for everyone looking to stay ahead in the cybersecurity arms race.

Thanks to our sponsors…

The best time to migrate is before you’re under pressure. Omnisend moves everything essential for you now, so you’re fully ready when you plan for that large campaign. Use the code OpenChannels and get 30% off your first 3 months of any paid plan.

If you build stores for clients, WooCommerce gives you the flexibility to create exactly what merchants need. Customize workflows, extend with thousands of integrations, and scale without switching platforms. Check it out at WooCommerce.com.

Takeaways

Layered Security Is Essential: Security cannot be handled by a single tool; a layered approach with specialized solutions targeting different attack vectors is now mandatory due to the complexity and frequency of modern threats, especially as hackers can quickly adapt and bypass generic protections 04:25.

AI Accelerates Both Attacks and Defenses: The rise of AI has dramatically increased the volume, uniqueness, and sophistication of malware, making traditional defense methods like signature-based detection insufficient. Attackers can now generate millions of modified malware files quickly, requiring defenders to shift toward behavior-based detection 07:24.

Monetary Motivation Drives Attackers: The majority of cyberattacks are financially motivated, resulting in activities like ad fraud, redirection, crypto mining, and credential theft. Once inside, attackers are creative in monetizing compromised assets, often hiding their activity from site owners using advanced cloaking techniques 20:07.

Performance Cannot Be Overlooked in Security: Security tools can’t come at the expense of site performance; users and hosts expect robust protection that doesn’t introduce significant delays or resource drain. Choosing performant, specialized security solutions is key for customer satisfaction and effective protection 12:30.

Compromises Are Often Undetected Until Monitored: Many sites operate with dormant backdoors or hidden malware that neither hosts nor users notice until advanced security monitoring is deployed. Approximately one in three existing sites typically have a latent issue uncovered at initial scanning 28:22.

Reactive Security Is Too Slow: The window between a vulnerability disclosure and widespread exploitation has shrunk to about five hours, mainly due to AI. Prevention and real-time defense are imperative—waiting for post-incident reaction is not viable anymore 31:22.

The Human Factor Remains a Weak Link: Security solutions can be undermined by weak passwords or lack of user security awareness, highlighting the need for not just technical but also user-based security layers 04:15.

Specialization and Collaboration Win: Security is most effective when companies focus on what they do best, collaborating to cover vulnerabilities, malware, and operational layers in concert, rather than trying to be all-in-one solutions 29:24.

Supply Chain Risks Are Real: Vulnerabilities can originate from trusted partners or agencies, such as when third parties inadvertently or maliciously deliver sites already compromised, necessitating security checks even for newly delivered websites 25:44.

Education, Transparency, and Continuous Improvement Are Crucial: Hosts and agencies must stay vigilant, continuously evaluate their stack and practices, and communicate the dynamic nature of risk to users and clients to maintain trust and protection 33:58.

Mentioned Links and Resources

  • Patchstack – Specializes in identifying and mitigating vulnerabilities in the WordPress ecosystem, offering research and a white paper on attacker trends. šŸ”— https://patchstack.com/
  • Monarx – Provides behavior-based malware detection focused on performance and layered security for hosting environments. šŸ”— https://monarx.com/
  • Servebolt – Hosting company implementing a multi-layered security approach, integrating both Patchstack and Monarx for optimal site security and performance. šŸ”— https://servebolt.com/

Timestamped Overview

  • 00:00 CloudFest speaker introductions
  • 06:01 Importance of specialized cybersecurity layers
  • 07:24 AI evolving malware tactics
  • 11:22 Balancing security, performance, and usability
  • 13:57 Switching email platforms easily
  • 17:41 Analyzing post-incident vulnerabilities
  • 20:57 How hackers manipulate website traffic
  • 25:44 Dealing with website security issues
  • 27:45 Understanding malware risks
  • 31:51 Layered security approach explained
  • 33:20 Layered security measures explained
Episode Transcript

Adam Weeks:
This is Adam Weeks from Open Channels FM and I’m here at CloudFest and sitting in a carousel tent type of situation at CloudFest. You never know who you’re going to run into. And I have run into three incredible gentlemen who are going to share how a host and security companies come together to work together for the end user. And so I’m just going to let them introduce themselves. We’re going to start off with Andrew. Andrew, would you mind introducing who are you and what do you do?

Andrew Killen:
Hi, I’m Andrew Killen. I am the CTO for Servebolt. We are performance host. Focus on that the most. Basically we build everything from the ground up which gives us about 40% more performance on the same hardware as other people. I’ve been doing the web now since 1994 when I was Intel’s Internet engineer.

Aaron Campbell:
And I’m Aaron Campbell. I am VP of Product at Monarx. We help hosts address malware and security issues. We take a very unique behavior based approach to identifying and finding malware. That is a much more effective approach, especially in the modern world of AI created malware.

Mart Virkus:
Yeah, good. And I’m Mart Virkus, I’m the head of marketing at Patchstack and I think we can be best described as a good hacker army that specializes in finding vulnerabilities in the WordPress ecosystem of which there are many and a growing number. And yeah, we basically help web hosts and agencies mitigate those vulnerabilities sort of faster than hackers can find out about these new threats.

Adam Weeks:
That’s fantastic. Mar. I was excited to walk by your booth and I think you have the most creative booth at CloudFest. People getting permanent tattoos. A reminder of CloudFest 2026. That’s pretty special booth you guys have over there.

Mart Virkus:
Yeah, thanks. That’s. It is. So the booth is an excuse for me to actually get a free tattoo.

Adam Weeks:
There you go.

Mart Virkus:
And expense it to the company. And then you know, just like, you know, I just, you know, masqueraded as like a marketing stunt. So that’s awesome. You know, it’s, that’s. I mean I have a budget and a free will basically, so I love it.

Adam Weeks:
So you’re sitting next to Aaron who is also from a security company and talking to Andrew from Servebolt, a hosting company. I’d love to a little bit know like how does it work that you. There’s two security companies that are happily working together to serve. Servebolt’s customers. How does that work?

Mart Virkus:
Yeah, I mean, that’s, that’s how it actually always should have worked. So I feel like, you know, in the past, maybe especially in enterprise with hosting companies, it’s security has always been something like a cost center. You want to consolidate, so you buy like a massive suit. It promises to do everything, like DDoS protection, you know, bots vulnerabilities. It has WAFs. You roll everything into one product. But the problem with that is that hackers are pretty smart. And there’s like, attack vectors are very different. So really you can’t. I don’t think there’s any one tool that solves everything all at once. So with security, you have to approach every attack vector with a slightly different solution because these attack methods are very specific. So we look at vulnerability exploits in WordPress. They are very, very context sensitive. And it’s not something that regular firewalls can flag plugin vulnerabilities, such as they are. If a plugin tells the actor that, yes, it’s okay to do this weird thing to this website, a regular firewall will go like, oh, yeah, that sounds good. Sounds good to me. Go right in. But again, but we only do vulnerabilities, right? So we don’t want to do malware scanning, we don’t want to do other stuff. We want to laser focus on one thing. And I think that’s how you gotta approach security. You gotta have something at the server layer. You know, we operate on the application layer. You want something on a network, you want something for bots. At the end of the day also, user is a security layer. So, you know, everything we do wouldn’t work if like your user has like no2fa and pizza123 as a password. So it’s like a complex system. Security is a system, right?

Adam Weeks:
How did you guess my password?

Mart Virkus:
I got to go do a thing right now.

Adam Weeks:
Oh, man. So that’s great, your patchwork. Patchstack is doing the good work. Sitting next to Aaron. Aaron, as we were talking, you know, about AI and you know, I’m really excited about AI. You know, people have told me that AI is going to solve all of my problems. I don’t have to worry about it. It’s going to do it for me. You know, life is good. Can you, can you. Are you going to pop my bubble that maybe I should have some concern about AI what’s happening these days?

Aaron Campbell:
I mean, AI is great. It’s such a cool, fun, interesting time to be doing stuff in our tech space because it is really changing the way everything works. It is changing it for us and for the malicious actors. And so there is a downside to it. We’ve seen. Thinking back on some of the numbers that I pulled kind of working into coming into this event, I looked back to when AI really launched in a popular way in like 2022.

Adam Weeks:
Sure.

Aaron Campbell:
And year over year, unique malware files that we have found and processed, it doubled from 2022 to 2023. It was like 2.2. X for the next year, 2.8. X for the next year. And, you know, last year we saw 8.6 trillion unique malware files.

Adam Weeks:
That’s a lot.

Aaron Campbell:
Yes.

Adam Weeks:
That feels like a big number.

Aaron Campbell:
It’s a lot. And when you start seeing that numbers like that, you start realizing why maybe you need multiple companies. Because someone needs to focus very heavily on the malware space. Just like a patch stack needs to focus very heavily on that application layer and that WordPress specialty. Because the volume and the uniqueness of attacks now is so, so different that that layered approach of blocking at the network, then blocking at the server, then blocking in the runtime. You really need quality protection at each of those layers. And so we own one of those layers and we think that we own it the absolute best of everyone. And we’re focused at it and becoming experts. And that’s just. We can’t do that at every, like, we can’t give that quality at every single layer. And I don’t think anyone can.

Mart Virkus:
Wow.

Adam Weeks:
So what we’re seeing with AIs and what you’re doing is kind of this arms race that everybody has more tools and more tools. Is that what you’re seeing?

Aaron Campbell:
Yes. I mean, so I think that in the past, there’s always been malware since the beginning of computers. Right. And some of it was better than others.

Adam Weeks:
Malware was like the second program written probably.

Aaron Campbell:
Probably. And the thing is, there used to be some malware that was difficult to get. Some people could write some really good comments. Complex, like polymorphic malware that self modified and was very hard to track down and chase, but that was the exception, not the rule. And now people are just telling AI, take this one bad thing, this one piece of malware that’s relatively simple, but that I use as a backdoor and make it modify itself, make it hide better, make it. And the AI is capable of doing that. So suddenly everyone has these really intense capabilities of making very Difficult to track down malware. And so it is an arms race, because now we can no longer do what you used to do for malware, which was you’d look at a file, you’d say, that’s bad. You’d make a unique identifier, probably a hash of that file that says, we’ve seen this. We know it. It’s bad. Every time you see this hashtag, that’s a bad file. You can’t do that anymore because they’ll take that same file and say, okay, make me a million different versions of this that all look a little different.

Adam Weeks:
That’s terrifying.

Aaron Campbell:
And so now you have to look at, like, behaviors. What does that file do? And do these million different files do the same thing? Then they’re all the same thing, and they’re all bad. And so you have to take a whole different approach to it. It’s absolutely an arms race.

Adam Weeks:
Wow. Yeah. No, that’s. That’s. That’s getting scary. So, Andrew, you’re. You’re on the front line working with clients. You’re. You’re serving their needs, you’re serving their files. And what. Everything was. Everything was going fine. Hunky Dory Servebolt was humming along. What was the impetus to say, hey, we need. We need some partners to help us make sure that we are serving our customers well. What. What have you been seeing?

Andrew Killen:
We saw quite a few sites getting hacked. Simple as that.

Adam Weeks:
Okay.

Andrew Killen:
It became really apparent that it was a massive problem.

Mart Virkus:
Okay.

Andrew Killen:
When I. It wasn’t that we were getting hundreds or whatever, but when you get over double figures, that’s when you think, hey, hang on. This really needs some attention.

Mart Virkus:
Okay.

Andrew Killen:
And so I’ve known Oliver from Patch Tac for years. Used to run a Facebook group, and had him come in and do an AMA. So it was an obvious choice to go and speak to him.

Mart Virkus:
Okay.

Andrew Killen:
It was just. Yeah. Okay. So I reached out to him, and our former CEO met up with monarchs. Okay. I can’t remember what event it was, but we started looking at it. Can we make something that covers that and a little bit more? So we have Patch Stack, obviously, for all the configurabilities in the software. We had all the malware checking for monarchs. We set up an IP blocking situation where customers themselves can type in blocks, block IP addresses or ranges. And also we set up geo security where you can choose which countries are even whitelisted or blacklisted. So you can go, okay, I’m just not. I’m. For example, I’m in America. I’ve only got American clients.

Adam Weeks:
Sure.

Andrew Killen:
I’m only going to whitelist that. And that just cuts down on the amount of traffic that comes to us.

Adam Weeks:
Yeah.

Andrew Killen:
We have everything going through Cloudflare, so we only allow their IP addresses to get to our servers.

Adam Weeks:
Yeah.

Andrew Killen:
And that creates quite a good security. Is it perfect? No, we’re still looking to expand and do something that’s like a software firewall kind of thing. We’re looking at Blackwall at the moment, but it’s, it’s disappointing for us. It doesn’t offer the flexibility that we need.

Adam Weeks:
Okay.

Andrew Killen:
To keep performance, they’re adding like 50 to 100 milliseconds, which to us is too much.

Mart Virkus:
Yeah.

Andrew Killen:
It’s crazy. So we don’t want to go down that path if we can help it, but we need to find something for fraud protection and they’re looking like a really good solution where we end up. I’m not quite sure yet, but I’m really hoping to find something much better.

Adam Weeks:
You’re optimistic?

Andrew Killen:
Yeah.

Adam Weeks:
Okay.

Aaron Campbell:
Aaron, I just, I love the bringing performance into the security talk here because that is, there’s always trade offs between security and other things. Right. I mean, your site could be completely secure if you just throw it on a thumb drive and lock it in a safe and don’t put it on the web. Right. And so there’s some balance between ease of use, access and performance that we’re always trying to balance out with the security side. And like, that’s one of our big focuses at monarchs. And probably why we play so well with Servebolt is not just do we need to be able to win this arms race and be able to block all this unique new malware, but we need to do it in a performance way that doesn’t slow down any of the servers, the sites on the servers. Because really in the end, the whole reason for doing this is for the end user so that they have a better site. And a better site is both clean and performant. And it adds a whole new layer of challenge to it, but it’s an important one to address.

Adam Weeks:
Awesome. Aaron, what you reminded me there of in a former time, I was a school principal and we had to deal with school security and it was my responsibility to put a gate in. And so like, all right, we’re going to put a gate up there. Well, the. And it had like an access pad. The problem with a gate is that it slows you down. I didn’t have to stop here before I could just walk right into the school. And it’s like, all right, well what happens when someone just like props the gate open? All right, well now you’ve lost all of your security because if you make the gate too difficult to go through and it’s not like I buzz in and there’s no one there to help and if it’s too much, then we lose all security because too much security isn’t any security because it’s not usable. So finding that balance.

Aaron Campbell:
Yeah, if someone’s site slowed down and they would immediately get upset at Servebolt,

Adam Weeks:
but it’s super secure, they would complain

Aaron Campbell:
to Servebolt and if Servebolt then went, oh, that’s because of Monarx’s malware protection on your site, they would be like, well how do I turn that off? And that’s terrible. That would be propping the gate open. So yeah, we absolutely, we have to do better. Can we. In your gate scenario, can people’s badges be RFID so it recognizes them as they’re getting there, unlocks the gate so they can just push through it right in. That’s the level of like thought and effort that has to be put into all of this. Love that.

Adam Weeks:
Yeah, yeah, very cool. Martin I would love to hear some of the stories that you have because I’m sure you have stories of some of those vulnerabilities. What are you seeing that is new that you guys haven’t necessarily seen a lot of before? Where are some of the trends in security that we should be paying attention to?

Mart Virkus:
Oh, big question, I think. So coming just from the vulnerability perspective. So I was talking to a few months ago with our principal research guy, the head of our ethical hacker army.

Adam Weeks:
Basically like he’s like the overlord ethical hacker army. I just want to stop right there and just. That’s a great phrase.

Mart Virkus:
I love that. It’s, it’s like, you know, the forces of good and evil. Right? So there’s a lot of good hackers out there. So that’s, that’s, you know, there’s good guys fighting the fight as well. But he. So, you know, he’s. So we classify little backstory, so we classify vulnerabilities by, like, you know, low, medium, and, you know, high priority. And we don’t actually do anything for, like, low priority, you know, vulnerabilities, because these are something that you really can exploit under real life circumstances. So, you know, it just basically fatigues people to send them news about, like, vulnerabilities that aren’t really dangerous. So we just basically don’t have to address those. But we had a conversation and he said that what we are starting to see is that previously vulnerabilities that weren’t dangerous, they’re out there. They’ve been out there for a while. They’re not that easy to exploit. But suddenly attackers have access to AI tools. So suddenly an attack campaign that took, like, a long time and a lot of complexity and skill to put together. Yeah, same thing you were mentioning. Right. It’s. Now they’re doing that in seconds. They go like, okay, can we chain like, these together, use this vulnerability to achieve this automatically, and then automatically achieve this, and finally you get access to, like, something that wasn’t a risk but now is. Because it’s so easy to do those things. And that’s a scary pace. But the attackers are very, very good at basically monetizing AI. Okay, actually, it’s. It’s an interesting thing because it’s like defenders are always like, oh, do we want to. Do we have to pay for security? It’s like, that seems like a drag. But attackers are always motivated financially. They have very strong incentives to learn and craft better strategies. So they’re a few steps ahead and just the AI speeding stuff up.

Adam Weeks:
Okay, I want to stop on this for a second because motivations are very important to me. Like security. Yeah, we should definitely have security. You know, just kind of like a list of things that we need to have. But let’s just sit a little bit in this. Security. What are the bad actors? Like, what is motivating? And specifically, how do they benefit from unsecured websites?

Mart Virkus:
Oh, I mean, that’s pretty creative. Most common, I would actually say monarchs has a lot more insight here into, like, what we did because we just, you know, published a white paper and we collaborated on the white paper. So we looked at, like, you know, main vulnerability statistics from 2025, and we asked monarchs for some input into, like, what are hackers actually doing once they get access? So we know how they get access, but monarchs can see, like, what they’re actually doing. So I think I’ll probably give that to you to answer, but let me think. I’ll probably have some anecdotal. So, okay, one example, actually, this is a real life story. This was, I think last year there was an agency that came to us after they’ve had an incident, because after you’ve had an incident, suddenly security becomes very sure. So they were like, so they got compromised. Their client’s website got compromised. And so what the attackers did was they redirected all of the Facebook ad traffic to some malicious other pages because

Adam Weeks:
everybody on Facebook is super savvy and they’re not going to get tricked.

Mart Virkus:
Absolutely not. But no, but on the Facebook, they will see a normal ad, but it would lead somewhere else. But obviously, these days, malware uses cloaking techniques a lot. So it’s like if you’re like the site owner or agency owner and you check your landing pages, everything is good, it’s fine. But, you know, they can really control, like, who goes where. And that agency didn’t realize the problem until they had lost like six figures in ad revenue, which they had to bankroll, basically. So they had to pay that because the customers weren’t like, I’m not paying. Like, you wasted like 200,000 or something dollars of ad revenue. Like, we’re not paying for that for, like, you know, the hack traffic. So they had to eat the cost. And compared to that, like, by the way, like, then security starts to look really cheap. So a few dollars here or there, it’s like, that’s good. But, you know, I’ll give it to you, I think, to like, dig into the malware, because you guys have some pretty interesting cases, I think.

Adam Weeks:
All right, Aaron, scare me a little bit. There is a ride here at Cloud Fest where you can, like, go through. It’s like kind of like Disneyland has the Haunted Mansion. It’s a similar thing. But, like, here you actually go to hell. Yeah, it’s intense. So, yeah, scare me a little bit.

Aaron Campbell:
I mean, first of all, he hit on probably one of the biggest ones, which is redirecting to malicious sites specifically to essentially steal money if you can, from. From ads and such. Right. That’s one of the big ones. I mean, you see everything. It all comes back to money. But you see everything. You see everything from, from crypto miners, which may be a little easier to find actually because they tend to suck so many resources that even the hosts sees them right away. But ads on sites, redirecting paid ads to other places so that they can promote things, even selling products straight on sites or faking your login page or whatever to just steal your customers details so that they can then go get money from your customers in various ways. It really basically anything that you can imagine that you could make money on the web but doing that by stealing it from someone else along the way.

Mart Virkus:
Right.

Aaron Campbell:
And yeah, that’s the thing is you just see that and then you see them hiding it. The bit that he mentioned about how as a site owner you don’t see it, they’ve gotten more and more creative over the years. And so yeah, if you go straight to your site. When I go to my site I always just type it in the URL bar cause I know where my site is. But if my site is compromised, it probably looks fine when I do that. But if I do a Google search and follow a link to my site and Google was the referrer, then it might redirect to someone else’s site who’s claiming to be me and doing whatever. Or maybe if I had paid ads out there, maybe it’s only when it’s coming in from a Facebook click that it redirects. And so they do that in order to just stay on the site longer. The longer it takes the site owner to recognize it, the longer they can be siphoning off money from that company. Which is why companies like Servebolt have companies like us that catch that ideally without the site owner needing to notice.

Adam Weeks:
Yeah, the noticing part I’ve always, you know, I’m a tech savvy guy and like I go to a website and like oh, that’s fishy, they spelled that thing wrong. Or the logo doesn’t look quite right or something’s different. AI is making me look dumb because I can’t tell anymore for sure.

Aaron Campbell:
All those little telltale signs where there were mistakes like that are almost completely gone with AI when they’re faking a page, they just are telling AI go grab this page and change all the links to do this.

Adam Weeks:
All the links, everything is legit. Like it looks perfect.

Aaron Campbell:
Right. And, and, and, and, and that’s because like bit for bit. It basically is.

Adam Weeks:
Yeah.

Aaron Campbell:
And, and, and no mistakes made by the AI in that case.

Adam Weeks:
Yeah, yeah, no, AI is good at doing that. Much better than someone who English wasn’t there, you know, the second language and you know, different things like that.

Aaron Campbell:
And it’s just a lot simpler than like we all see like AI images and we’re like, oh, we can see, you know, oh, that dude’s got six fingers. Like we, we noticed but many times

Adam Weeks:
not anymore, but like.

Aaron Campbell:
Right, but, but the images still often have some of those telltale signs. But something that AI is really good at is text based code. And, and, and that is, that’s what they’re copying now. And it’s just fantastically good at that.

Adam Weeks:
And it’s going to get better and better.

Mart Virkus:
I’ll add to that. And here’s an irony, right? AI is really powerful, really good in the hands of capable attackers. But AI also sucks in the hands of a very incapable developer. So you have this compounding effect. You have really clever AI attack solutions. But now we’re wipe coding. So earlier you asked about what trends we see. So we see the wipe coding trend and you know, people are also wipe coding like plugins in the WordPress space. And you know, there’s also like the fully wipe coded apps, but we see vulnerabilities there as well. Like basic things that you know, the AI ignores to do that leads to like, yeah, basically like a little security bug in the code base. And if you’re not a developer, even good developers have security bugs. Like actually like even the really most reliable software gets security bugs, serious ones. It just happens, it’s just like, you know, it’s what you do about it. Yeah. But if you don’t know what you’re looking at, you look at this code go like this looks great, like, thank you, Claude. You know, let’s push to production. And then you know, our researchers are just like going there, sitting like, aha, that’s interesting. Who made this? Yeah, we had. And this is, I don’t know if this was vibe coded, but I’ll give you like, we, I think this week found like a new vulnerability.

Adam Weeks:
Did you?

Mart Virkus:
Okay, there was a. Well we found thousands I think on a monthly basis. But so there was one that was like, it’s a little side topic, but it was something like an AI endpoint issue where basically if you type in like you register a user for a website, you type in like an email of an existing user and hit enter. It just logs you in instead of oh my goodness. Which is like, how the hell, who made this?

Adam Weeks:
It was an AI bot. Andrew, I’m going to jump back to you real quick. Do you have any more Specifics about examples, use names or not. But from the client’s perspective, what are some of the things that you’re seeing? And again, kind of like the need for this layer of security and maybe some of the technical perspective that you have.

Andrew Killen:
I think the first thing is to echo what Aaron’s been saying. It comes from stupidity quite a lot.

Adam Weeks:
What are you trying to say?

Andrew Killen:
Well, one customer, they had had a new website made by an agency. I don’t know the agency’s name, but inside the php, they had actually left a malware in there when they handed it over to the customer. And it’s exactly like you say, people come to the site direct. It looked fine, but from ads, from this, from that, it was going all over the place and it’s just ridiculous. They can’t trust their supply chain. And so we felt, yeah, got to step up there a bit more just to protect our customers. There’s other problems as well. Technically speaking, our hacks, like, generally tends to take a lot more energy, tends to be a lot more noisy, and we just don’t want that on our servers.

Adam Weeks:
Sure.

Andrew Killen:
We have a quality.

Adam Weeks:
It costs you money.

Andrew Killen:
Yeah. Well, it’s not just that. It really annoys the other people on

Adam Weeks:
the server, which will then cost you money eventually.

Andrew Killen:
And excuse me, I mean, technically speaking, other things like word fence, they really slow the machine down or the website down to be able to add protection. And that to us is just not a good thing. We want to be able to maintain that performance, milliseconds count. And that’s why both these gents here, their companies work well for us, especially monarchs. Very low level on the operating system, really. We notice it as a blip rather than as a nightmare.

Adam Weeks:
Yeah.

Andrew Killen:
That for us is just really important. And I don’t know if Aaron mentioned how many websites tend to look like they’ve been hacked at some point, but when we turned it on for the first time. Oh, my God. Really? Oh, my God.

Adam Weeks:
Turn it back off. Turn it back off.

Mart Virkus:
Yeah.

Andrew Killen:
And every customer thinks that they’re safe.

Adam Weeks:
Yeah.

Andrew Killen:
They don’t have a clue until it gets turned on and they’re like, oh, God.

Adam Weeks:
Yeah.

Andrew Killen:
And okay, it might not have been active at that actual problem, that hack that time, but still it sat there waiting and.

Mart Virkus:
Yeah, yeah.

Andrew Killen:
Painful.

Aaron Campbell:
That’s the real problem with, you know, a lot of malware is essentially backdoor. Right. The first thing they do is drop a piece of malware that lets them in to drop other stuff whenever they want, and that can sit dormant for quite a While, and you may not notice it on your servers, certainly the end user isn’t noticing it, but it’s a constant risk sitting there because it could suddenly start sucking up resources and being that bad neighbor on the site. And so by coming in and we usually, I mean, you mentioned the numbers. We usually, on average when we launch on a new Host, see, about 30% of existing users have something like that. One in every three has something like that on their site. And by going through and taking care of that, what we’re doing ideally is making sure that you can offer all the resources of that server to your customers like you want to. You can use these resources for a performance performant sight. And we know that they’re not going to be sucked up by something bad any moment. Right. And so that’s what we try to do. And we try to do that as efficiently as possible.

Adam Weeks:
Awesome. Love it. Well, as we’re starting to wrap up, I’m just going to give you guys each a chance to kind of summarize what are we doing here? What does this relationship mean to you? I’ll start with you. Yeah, summarize. What does this relationship mean to you? And then, yeah, also, how can someone find you online if they want to get a tattoo or, you know, learn more about Patchstack.

Mart Virkus:
Yeah, you know what I was thinking? And this is something our support engineer actually came up with. Like, we are really good with Patchstack at, you know, finding and, you know, blocking those vulnerabilities. So we do that really well. We don’t really want to do anything else. We want to specialize. But it’s like, you know, Patchstack is like a very perfect fence around your website.

Adam Weeks:
Yeah.

Mart Virkus:
But I would encourage anyone before you put that fence up, maybe go to monarchs and like, maybe look at that, your house before you put the fence up. Because if you put a fence up after the robbers have been in the house, I got news for you. I think you should be focusing on. You got other problems. But that’s the thing. It’s like, you know, make sure site is clear first. We have sometimes customers coming in and they go like, you know, but can you also clean my site? And like, okay, hold on. You need to deal with this first. Yeah, like, we can’t. Yes, we will protect you from new stuff, but you’ve got a problem now and that’s something else. Somebody else needs to deal with it. But that’s a relationship. And there’s other ways people can get into your site. It’s like, and for the Readers, listeners. One more time. Your password was pizza123. If they get in with that, you need something else. So it’s the perfect example of the layer.

Adam Weeks:
Right, Got it. If I put an exclamation mark at the end, does that help?

Mart Virkus:
Well, thanks for telling me one, but yeah, I mean, yeah, that’s all I gotta say. Think about layers. You know, it’s like different solutions for different problems and, you know, if they’re good for performance as well, you know, extra, extra points. Right.

Adam Weeks:
Very cool.

Mart Virkus:
Yeah. Patchtack.com Patchstack.com Check out the site. We got some interesting research as well. I mentioned the white paper we did with monarchs. Read that. A lot of interesting, slightly scary data about, like, what’s going on in that attacker world. But I really recommend everybody.

Adam Weeks:
So some good nighttime reading before I try to fall asleep and just.

Mart Virkus:
Yeah, lights off. Campfire style. Yeah. Yeah.

Adam Weeks:
All right. Thank you, Mark.

Aaron Campbell:
And I’ll go ahead and throw out one of those scary details since he just brought up that white paper that we did together. The average time that we’re seeing from when a exploit exists to when it’s actually being. I guess from when the vulnerability is. Is found to when it’s actually being exploited on sites looking across a whole year’s average five hours is the new time. It used to be days or even weeks. Five hours. And it is definitely actively shrinking.

Adam Weeks:
And AI is just going to make it faster.

Aaron Campbell:
Exactly, exactly. Which is why we have to be able to look ahead instead of behind. So I think that as far as you asking about how we work together and how this all kind of sits from the Monarch’s point of view, I love this setup with Servebolt because I think that they’re doing it right. And it’s one of those great chances to see kind of the perfect setup in action. The network layer being protected and then monarchs coming in and keeping the servers clean and protected and sitting in the runtime to be watching requests as they’re coming through. And then patch like it gives. It gives that sort of layered approach that we have said literally for decades in our space that the right approach to security is a layered approach. But it used to be that that was the best approach and now it is the only approach that still works because the level of attacks has changed such that if you don’t stop some of them at every layer, you will not be successful. And so I love working with these companies that are taking best in breed at every layer and really doing that. And so that’s it’s. Been great to see it really working. And you can find me at Monarchs M O N A R X dot com.

Adam Weeks:
Okay.

Mart Virkus:
All right.

Adam Weeks:
Thank you so much, Aaron. Andrew.

Mart Virkus:
Wow.

Andrew Killen:
After these two guys. No, yeah, yeah. I mean, what we’ve done is exactly what you’re saying. We created a shield of products which it with Patchstack and Monarchs doing their bits and then the IP blocking and then the geosecurity and then we’ve got a bunch of other things going on in the background, which we do through cloudflare to protect them, you know, xml, RPC to protect the login page, protect this. It’s a layered approach. It absolutely has to be. And we realize it’s a moving target where we’re constantly looking to make it better and better. Will we get there? Well, apparently not. That’s the thing.

Aaron Campbell:
Constant race.

Adam Weeks:
Yeah, constant race.

Andrew Killen:
Yeah. And we just got to try our hardest. And I like the challenge of it, to be honest with you. It’s kind of fun. And we’ve seen a dramatic improvement from having Monarchs and patchstack on board.

Adam Weeks:
Yeah.

Andrew Killen:
It gives security. Like, I’m going to talk about WordFence again, because people were installing that all over the place and they were complaining, hey, my website’s slow. My website’s slow. And that’s just a nightmare.

Andrew Killen:
Because they’re just using the wrong tool and being a performant website host and then going, oh, let’s straightjacket it, let’s make it slower, let’s do. Goes against the grain. And so choosing for products that can really make it sing at the same time, that’s the way to go. Well, certainly, from my point of view, very cool.

Adam Weeks:
So if you’re looking for a host that is implementing both Patch Deck and Monarchs, head on to servboat.com.

Andrew Killen:
that’s correct. Yeah.

Adam Weeks:
All right. Very, very cool, gentlemen. Well, thank you so much. After this conversation, I’m gonna go change my password@2exclamation marks. I think ought to do it. Hope you guys have a wonderful last day here at Cloud Fest. It’s been great talking with you under the big top and this carousel thing, I don’t even know where we’re at. I’ll give you guys some time to hopefully go ride some roller coasters or get another tattoo or whatever it is, but thank you so much. This is Adam Weeks for Open Channels FM.

Patterns for running Ollama on a home lab or office box and reaching it safely from remote devices. Covers OLLAMA_HOST binding, Tailscale or WireGuard, firewall pinning, and a tight security checklist.

#Hosting #Self-Hosting #LLM #Ollama #DevOps #Security

https://www.glukhov.org/llm-hosting/ollama/ollama-remote-access/

Remote Ollama access via Tailscale or WireGuard, no public ports

Patterns for running Ollama on a home lab or office box and reaching it safely from remote devices. Covers OLLAMA_HOST binding, Tailscale or WireGuard, firewall pinning, and a tight security checklist.

Rost Glukhov | Personal site and technical blog

Free Website Migration – Hassle-Free & Zero Downtime!
šŸš€ Free Website Migration – Hassle-Free & Zero Downtime!
Thinking of switching web hosts but worried about the hassle? Rad Web #Hosting has you covered!

Our Free Website Migration Service makes it easy to move your site to our fast, secure, and reliable servers – at no extra cost!

What We Handle for You:
āœ” Full Website Transfer – Files, databases, ...
Continued šŸ‘‰ https://blog.radwebhosting.com/free-website-migration-hassle-free-and-zero-downtime/?utm_source=mastodon&utm_medium=social&utm_campaign=mastodon.social #servermigration #webhosting

Free Website Migration – Hassle-Free & Zero Downtime!
šŸš€ Free Website Migration – Hassle-Free & Zero Downtime!
Thinking of switching web hosts but worried about the hassle? Rad Web #Hosting has you covered!

Our Free Website Migration Service makes it easy to move your site to our fast, secure, and reliable servers – at no extra cost!

What We Handle for You:
āœ” Full Website Transfer – Files, databases, ...
Continued šŸ‘‰ https://blog.radwebhosting.com/free-website-migration-hassle-free-and-zero-downtime/?utm_source=mastodon&utm_medium=social&utm_campaign=mastodon.social #webhosting #servermigration

Euro-Office - Wikipedia