reserve your VPS now!
fyrastack.com
#tech #linux #fyralabs #fyrastack #vps #hosting #webhosting #cloud #servers #networking #server
ŠÆŠ½Š“ŠµŠŗŃ ŃŠµŠ³Š¾Š“Š½Ń ŃŠµŃŠøŠ» в ŃŠ²Š¾Ńм Cloud Š·Š°ŃŠµŠ¹Š»ŠøŃŃ ŠæŃŠøŠ½ŠøŠ¼Š°ŃŃ ŠæŠ»Š°ŃŠµŠ¶Šø.
ŠŠµ ŃŠ¼Š¾Š³ ŃŠæŠøŃŠ°ŃŃ Ń Š¼ŠµŠ½Ń 68 ŃŃŠ±Š»ŠµŠ¹, обиГелŃŃ Šø Š·Š°Š±Š»Š¾ŠŗŠøŃŠ¾Š²Š°Š» мне ŃŠµŃŃŃŃŃ.
ДпŃŃŃŃ ŠŗŠ°ŠŗŠ¾Šµ-ŃŠ¾ Š²ŃŠµŠ¼Ń Šø болŃŃŠ¾Šµ ŠŗŠ¾Š»ŠøŃŠµŃŃŠ²Š¾ попŃŃŠ¾Šŗ ŃŃŃŠ½Š¾Š³Š¾ запŃŃŠŗŠ° ŠæŠ»Š°ŃŠµŠ¶Š°, Š²ŠµŠ»ŠøŃŠ°Š¹ŃŠ°Ń Š·Š°Š“Š¾Š»Š¶ŠµŠ½Š½Š¾ŃŃŃ Š±ŃŠ»Š° ŠæŠ¾Š³Š°ŃŠµŠ½Š° Šø Š°ŠŗŠŗŠ°ŃŠ½Ń Š°ŠŗŃŠøŠ²ŠøŃовалŃŃ Š¾Š±ŃŠ°Ńно.
ŠŠ¾, как оказалоŃŃ, CDN Š¾Š±ŃŠ°Ńно не вклŃŃŠøŠ»ŃŃ. ŠŠ¾ŃŠ¾Š¼Ń ŃŃŠ¾ они его:
Š ŃŠ°ŠæŠæŠ¾ŃŃ Š¼Š½Šµ ŠæŠøŃŠµŃ не "Š¼Ń Š²ŃŃ ŠøŃŠæŃавили", а "Ń Š½Š°Ń ŠæŃŠ¾Š±Š»ŠµŠ¼Ń, Š²Ń ŃŠ°Š¼ ŃŃ Š¾Š“ŠøŃŠµ Šø ŠæŠ¾ŃŠøŠ½ŠøŃе Ń ŃŠµŠ±Ń CDN".
#Yandex #Cloud #hosting #Russia #support #WTF #FAIL #quality #pic #fun #sad #shit
Most "cloud hosting" isn't real cloud.
When traffic spikes -> sites crash.
Real cloud should scale instantly & stay online.
š Read more:
https://tdwebservices.com/td-web-services-makes-on-demand-cloud-configurations/
Building Better Web Security Through Layered Strategies and Collaboration
Open Channels FM Building Better Web Security Through Layered Strategies and Collaboration Play EpisodePause Episode Mute/Unmute EpisodeRewind 10 Seconds1xFast Forward 30 seconds 00:00/00:35:37 SubscribeShare Apple Podcasts CastBox Overcast PocketCasts RSS Spotify RSS Feed Share Link Embed https://openchannels.fm/building-better-web-security-through-layered-strategies-and-collaboration/embed/#?secret=H18tSCOWbg<script> /*! This file is auto-generated */ !function(d,l){"use strict";l.querySelector&&d.addEventListener&&"undefined"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i<o.length;i++)o[i].style.display="none";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute("style"),"height"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):"link"===t.message&&(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document); //# sourceURL=https://openchannels.fm/wp-includes/js/wp-embed.min.js </script> ' title="Embed Code" class="input-embed input-embed-2551715" readonly/>Download file | Play in new window | Duration: 00:35:37
In this episode join host Adam Weeks as he sits down under the big top at CloudFest with three industry leadersāAndrew Killen, CTO of Servebolt; Aaron Campbell, VP of Product at Monarx; and Mart Virkus, Head of Marketing at Patchstack. In this episode, they dive into how hosting and security companies are collaborating to tackle the ever-evolving landscape of cyber threats.
From the critical importance of layered security and the impact of AI-driven malware to real-world stories of vulnerabilities and practical strategies for keeping websites safe and high-performing, this conversation is packed with insights, anecdotes, and a touch of humor. Whether youāre setting up an e-commerce store or securing client sites, this episode has something for everyone looking to stay ahead in the cybersecurity arms race.
Thanks to our sponsorsā¦
The best time to migrate is before youāre under pressure. Omnisend moves everything essential for you now, so youāre fully ready when you plan for that large campaign. Use the code OpenChannels and get 30% off your first 3 months of any paid plan.
If you build stores for clients, WooCommerce gives you the flexibility to create exactly what merchants need. Customize workflows, extend with thousands of integrations, and scale without switching platforms. Check it out at WooCommerce.com.
Takeaways
Layered Security Is Essential: Security cannot be handled by a single tool; a layered approach with specialized solutions targeting different attack vectors is now mandatory due to the complexity and frequency of modern threats, especially as hackers can quickly adapt and bypass generic protections 04:25.
AI Accelerates Both Attacks and Defenses: The rise of AI has dramatically increased the volume, uniqueness, and sophistication of malware, making traditional defense methods like signature-based detection insufficient. Attackers can now generate millions of modified malware files quickly, requiring defenders to shift toward behavior-based detection 07:24.
Monetary Motivation Drives Attackers: The majority of cyberattacks are financially motivated, resulting in activities like ad fraud, redirection, crypto mining, and credential theft. Once inside, attackers are creative in monetizing compromised assets, often hiding their activity from site owners using advanced cloaking techniques 20:07.
Performance Cannot Be Overlooked in Security: Security tools canāt come at the expense of site performance; users and hosts expect robust protection that doesnāt introduce significant delays or resource drain. Choosing performant, specialized security solutions is key for customer satisfaction and effective protection 12:30.
Compromises Are Often Undetected Until Monitored: Many sites operate with dormant backdoors or hidden malware that neither hosts nor users notice until advanced security monitoring is deployed. Approximately one in three existing sites typically have a latent issue uncovered at initial scanning 28:22.
Reactive Security Is Too Slow: The window between a vulnerability disclosure and widespread exploitation has shrunk to about five hours, mainly due to AI. Prevention and real-time defense are imperativeāwaiting for post-incident reaction is not viable anymore 31:22.
The Human Factor Remains a Weak Link: Security solutions can be undermined by weak passwords or lack of user security awareness, highlighting the need for not just technical but also user-based security layers 04:15.
Specialization and Collaboration Win: Security is most effective when companies focus on what they do best, collaborating to cover vulnerabilities, malware, and operational layers in concert, rather than trying to be all-in-one solutions 29:24.
Supply Chain Risks Are Real: Vulnerabilities can originate from trusted partners or agencies, such as when third parties inadvertently or maliciously deliver sites already compromised, necessitating security checks even for newly delivered websites 25:44.
Education, Transparency, and Continuous Improvement Are Crucial: Hosts and agencies must stay vigilant, continuously evaluate their stack and practices, and communicate the dynamic nature of risk to users and clients to maintain trust and protection 33:58.
Mentioned Links and Resources
Timestamped Overview
Adam Weeks:
This is Adam Weeks from Open Channels FM and Iām here at CloudFest and sitting in a carousel tent type of situation at CloudFest. You never know who youāre going to run into. And I have run into three incredible gentlemen who are going to share how a host and security companies come together to work together for the end user. And so Iām just going to let them introduce themselves. Weāre going to start off with Andrew. Andrew, would you mind introducing who are you and what do you do?
Andrew Killen:
Hi, Iām Andrew Killen. I am the CTO for Servebolt. We are performance host. Focus on that the most. Basically we build everything from the ground up which gives us about 40% more performance on the same hardware as other people. Iāve been doing the web now since 1994 when I was Intelās Internet engineer.
Aaron Campbell:
And Iām Aaron Campbell. I am VP of Product at Monarx. We help hosts address malware and security issues. We take a very unique behavior based approach to identifying and finding malware. That is a much more effective approach, especially in the modern world of AI created malware.
Mart Virkus:
Yeah, good. And Iām Mart Virkus, Iām the head of marketing at Patchstack and I think we can be best described as a good hacker army that specializes in finding vulnerabilities in the WordPress ecosystem of which there are many and a growing number. And yeah, we basically help web hosts and agencies mitigate those vulnerabilities sort of faster than hackers can find out about these new threats.
Adam Weeks:
Thatās fantastic. Mar. I was excited to walk by your booth and I think you have the most creative booth at CloudFest. People getting permanent tattoos. A reminder of CloudFest 2026. Thatās pretty special booth you guys have over there.
Mart Virkus:
Yeah, thanks. Thatās. It is. So the booth is an excuse for me to actually get a free tattoo.
Adam Weeks:
There you go.
Mart Virkus:
And expense it to the company. And then you know, just like, you know, I just, you know, masqueraded as like a marketing stunt. So thatās awesome. You know, itās, thatās. I mean I have a budget and a free will basically, so I love it.
Adam Weeks:
So youāre sitting next to Aaron who is also from a security company and talking to Andrew from Servebolt, a hosting company. Iād love to a little bit know like how does it work that you. Thereās two security companies that are happily working together to serve. Serveboltās customers. How does that work?
Mart Virkus:
Yeah, I mean, thatās, thatās how it actually always should have worked. So I feel like, you know, in the past, maybe especially in enterprise with hosting companies, itās security has always been something like a cost center. You want to consolidate, so you buy like a massive suit. It promises to do everything, like DDoS protection, you know, bots vulnerabilities. It has WAFs. You roll everything into one product. But the problem with that is that hackers are pretty smart. And thereās like, attack vectors are very different. So really you canāt. I donāt think thereās any one tool that solves everything all at once. So with security, you have to approach every attack vector with a slightly different solution because these attack methods are very specific. So we look at vulnerability exploits in WordPress. They are very, very context sensitive. And itās not something that regular firewalls can flag plugin vulnerabilities, such as they are. If a plugin tells the actor that, yes, itās okay to do this weird thing to this website, a regular firewall will go like, oh, yeah, that sounds good. Sounds good to me. Go right in. But again, but we only do vulnerabilities, right? So we donāt want to do malware scanning, we donāt want to do other stuff. We want to laser focus on one thing. And I think thatās how you gotta approach security. You gotta have something at the server layer. You know, we operate on the application layer. You want something on a network, you want something for bots. At the end of the day also, user is a security layer. So, you know, everything we do wouldnāt work if like your user has like no2fa and pizza123 as a password. So itās like a complex system. Security is a system, right?
Adam Weeks:
How did you guess my password?
Mart Virkus:
I got to go do a thing right now.
Adam Weeks:
Oh, man. So thatās great, your patchwork. Patchstack is doing the good work. Sitting next to Aaron. Aaron, as we were talking, you know, about AI and you know, Iām really excited about AI. You know, people have told me that AI is going to solve all of my problems. I donāt have to worry about it. Itās going to do it for me. You know, life is good. Can you, can you. Are you going to pop my bubble that maybe I should have some concern about AI whatās happening these days?
Aaron Campbell:
I mean, AI is great. Itās such a cool, fun, interesting time to be doing stuff in our tech space because it is really changing the way everything works. It is changing it for us and for the malicious actors. And so there is a downside to it. Weāve seen. Thinking back on some of the numbers that I pulled kind of working into coming into this event, I looked back to when AI really launched in a popular way in like 2022.
Adam Weeks:
Sure.
Aaron Campbell:
And year over year, unique malware files that we have found and processed, it doubled from 2022 to 2023. It was like 2.2. X for the next year, 2.8. X for the next year. And, you know, last year we saw 8.6 trillion unique malware files.
Adam Weeks:
Thatās a lot.
Aaron Campbell:
Yes.
Adam Weeks:
That feels like a big number.
Aaron Campbell:
Itās a lot. And when you start seeing that numbers like that, you start realizing why maybe you need multiple companies. Because someone needs to focus very heavily on the malware space. Just like a patch stack needs to focus very heavily on that application layer and that WordPress specialty. Because the volume and the uniqueness of attacks now is so, so different that that layered approach of blocking at the network, then blocking at the server, then blocking in the runtime. You really need quality protection at each of those layers. And so we own one of those layers and we think that we own it the absolute best of everyone. And weāre focused at it and becoming experts. And thatās just. We canāt do that at every, like, we canāt give that quality at every single layer. And I donāt think anyone can.
Mart Virkus:
Wow.
Adam Weeks:
So what weāre seeing with AIs and what youāre doing is kind of this arms race that everybody has more tools and more tools. Is that what youāre seeing?
Aaron Campbell:
Yes. I mean, so I think that in the past, thereās always been malware since the beginning of computers. Right. And some of it was better than others.
Adam Weeks:
Malware was like the second program written probably.
Aaron Campbell:
Probably. And the thing is, there used to be some malware that was difficult to get. Some people could write some really good comments. Complex, like polymorphic malware that self modified and was very hard to track down and chase, but that was the exception, not the rule. And now people are just telling AI, take this one bad thing, this one piece of malware thatās relatively simple, but that I use as a backdoor and make it modify itself, make it hide better, make it. And the AI is capable of doing that. So suddenly everyone has these really intense capabilities of making very Difficult to track down malware. And so it is an arms race, because now we can no longer do what you used to do for malware, which was youād look at a file, youād say, thatās bad. Youād make a unique identifier, probably a hash of that file that says, weāve seen this. We know it. Itās bad. Every time you see this hashtag, thatās a bad file. You canāt do that anymore because theyāll take that same file and say, okay, make me a million different versions of this that all look a little different.
Adam Weeks:
Thatās terrifying.
Aaron Campbell:
And so now you have to look at, like, behaviors. What does that file do? And do these million different files do the same thing? Then theyāre all the same thing, and theyāre all bad. And so you have to take a whole different approach to it. Itās absolutely an arms race.
Adam Weeks:
Wow. Yeah. No, thatās. Thatās. Thatās getting scary. So, Andrew, youāre. Youāre on the front line working with clients. Youāre. Youāre serving their needs, youāre serving their files. And what. Everything was. Everything was going fine. Hunky Dory Servebolt was humming along. What was the impetus to say, hey, we need. We need some partners to help us make sure that we are serving our customers well. What. What have you been seeing?
Andrew Killen:
We saw quite a few sites getting hacked. Simple as that.
Adam Weeks:
Okay.
Andrew Killen:
It became really apparent that it was a massive problem.
Mart Virkus:
Okay.
Andrew Killen:
When I. It wasnāt that we were getting hundreds or whatever, but when you get over double figures, thatās when you think, hey, hang on. This really needs some attention.
Mart Virkus:
Okay.
Andrew Killen:
And so Iāve known Oliver from Patch Tac for years. Used to run a Facebook group, and had him come in and do an AMA. So it was an obvious choice to go and speak to him.
Mart Virkus:
Okay.
Andrew Killen:
It was just. Yeah. Okay. So I reached out to him, and our former CEO met up with monarchs. Okay. I canāt remember what event it was, but we started looking at it. Can we make something that covers that and a little bit more? So we have Patch Stack, obviously, for all the configurabilities in the software. We had all the malware checking for monarchs. We set up an IP blocking situation where customers themselves can type in blocks, block IP addresses or ranges. And also we set up geo security where you can choose which countries are even whitelisted or blacklisted. So you can go, okay, Iām just not. Iām. For example, Iām in America. Iāve only got American clients.
Adam Weeks:
Sure.
Andrew Killen:
Iām only going to whitelist that. And that just cuts down on the amount of traffic that comes to us.
Adam Weeks:
Yeah.
Andrew Killen:
We have everything going through Cloudflare, so we only allow their IP addresses to get to our servers.
Adam Weeks:
Yeah.
Andrew Killen:
And that creates quite a good security. Is it perfect? No, weāre still looking to expand and do something thatās like a software firewall kind of thing. Weāre looking at Blackwall at the moment, but itās, itās disappointing for us. It doesnāt offer the flexibility that we need.
Adam Weeks:
Okay.
Andrew Killen:
To keep performance, theyāre adding like 50 to 100 milliseconds, which to us is too much.
Mart Virkus:
Yeah.
Andrew Killen:
Itās crazy. So we donāt want to go down that path if we can help it, but we need to find something for fraud protection and theyāre looking like a really good solution where we end up. Iām not quite sure yet, but Iām really hoping to find something much better.
Adam Weeks:
Youāre optimistic?
Andrew Killen:
Yeah.
Adam Weeks:
Okay.
Aaron Campbell:
Aaron, I just, I love the bringing performance into the security talk here because that is, thereās always trade offs between security and other things. Right. I mean, your site could be completely secure if you just throw it on a thumb drive and lock it in a safe and donāt put it on the web. Right. And so thereās some balance between ease of use, access and performance that weāre always trying to balance out with the security side. And like, thatās one of our big focuses at monarchs. And probably why we play so well with Servebolt is not just do we need to be able to win this arms race and be able to block all this unique new malware, but we need to do it in a performance way that doesnāt slow down any of the servers, the sites on the servers. Because really in the end, the whole reason for doing this is for the end user so that they have a better site. And a better site is both clean and performant. And it adds a whole new layer of challenge to it, but itās an important one to address.
Adam Weeks:
Awesome. Aaron, what you reminded me there of in a former time, I was a school principal and we had to deal with school security and it was my responsibility to put a gate in. And so like, all right, weāre going to put a gate up there. Well, the. And it had like an access pad. The problem with a gate is that it slows you down. I didnāt have to stop here before I could just walk right into the school. And itās like, all right, well what happens when someone just like props the gate open? All right, well now youāve lost all of your security because if you make the gate too difficult to go through and itās not like I buzz in and thereās no one there to help and if itās too much, then we lose all security because too much security isnāt any security because itās not usable. So finding that balance.
Aaron Campbell:
Yeah, if someoneās site slowed down and they would immediately get upset at Servebolt,
Adam Weeks:
but itās super secure, they would complain
Aaron Campbell:
to Servebolt and if Servebolt then went, oh, thatās because of Monarxās malware protection on your site, they would be like, well how do I turn that off? And thatās terrible. That would be propping the gate open. So yeah, we absolutely, we have to do better. Can we. In your gate scenario, can peopleās badges be RFID so it recognizes them as theyāre getting there, unlocks the gate so they can just push through it right in. Thatās the level of like thought and effort that has to be put into all of this. Love that.
Adam Weeks:
Yeah, yeah, very cool. Martin I would love to hear some of the stories that you have because Iām sure you have stories of some of those vulnerabilities. What are you seeing that is new that you guys havenāt necessarily seen a lot of before? Where are some of the trends in security that we should be paying attention to?
Mart Virkus:
Oh, big question, I think. So coming just from the vulnerability perspective. So I was talking to a few months ago with our principal research guy, the head of our ethical hacker army.
Adam Weeks:
Basically like heās like the overlord ethical hacker army. I just want to stop right there and just. Thatās a great phrase.
Mart Virkus:
I love that. Itās, itās like, you know, the forces of good and evil. Right? So thereās a lot of good hackers out there. So thatās, thatās, you know, thereās good guys fighting the fight as well. But he. So, you know, heās. So we classify little backstory, so we classify vulnerabilities by, like, you know, low, medium, and, you know, high priority. And we donāt actually do anything for, like, low priority, you know, vulnerabilities, because these are something that you really can exploit under real life circumstances. So, you know, it just basically fatigues people to send them news about, like, vulnerabilities that arenāt really dangerous. So we just basically donāt have to address those. But we had a conversation and he said that what we are starting to see is that previously vulnerabilities that werenāt dangerous, theyāre out there. Theyāve been out there for a while. Theyāre not that easy to exploit. But suddenly attackers have access to AI tools. So suddenly an attack campaign that took, like, a long time and a lot of complexity and skill to put together. Yeah, same thing you were mentioning. Right. Itās. Now theyāre doing that in seconds. They go like, okay, can we chain like, these together, use this vulnerability to achieve this automatically, and then automatically achieve this, and finally you get access to, like, something that wasnāt a risk but now is. Because itās so easy to do those things. And thatās a scary pace. But the attackers are very, very good at basically monetizing AI. Okay, actually, itās. Itās an interesting thing because itās like defenders are always like, oh, do we want to. Do we have to pay for security? Itās like, that seems like a drag. But attackers are always motivated financially. They have very strong incentives to learn and craft better strategies. So theyāre a few steps ahead and just the AI speeding stuff up.
Adam Weeks:
Okay, I want to stop on this for a second because motivations are very important to me. Like security. Yeah, we should definitely have security. You know, just kind of like a list of things that we need to have. But letās just sit a little bit in this. Security. What are the bad actors? Like, what is motivating? And specifically, how do they benefit from unsecured websites?
Mart Virkus:
Oh, I mean, thatās pretty creative. Most common, I would actually say monarchs has a lot more insight here into, like, what we did because we just, you know, published a white paper and we collaborated on the white paper. So we looked at, like, you know, main vulnerability statistics from 2025, and we asked monarchs for some input into, like, what are hackers actually doing once they get access? So we know how they get access, but monarchs can see, like, what theyāre actually doing. So I think Iāll probably give that to you to answer, but let me think. Iāll probably have some anecdotal. So, okay, one example, actually, this is a real life story. This was, I think last year there was an agency that came to us after theyāve had an incident, because after youāve had an incident, suddenly security becomes very sure. So they were like, so they got compromised. Their clientās website got compromised. And so what the attackers did was they redirected all of the Facebook ad traffic to some malicious other pages because
Adam Weeks:
everybody on Facebook is super savvy and theyāre not going to get tricked.
Mart Virkus:
Absolutely not. But no, but on the Facebook, they will see a normal ad, but it would lead somewhere else. But obviously, these days, malware uses cloaking techniques a lot. So itās like if youāre like the site owner or agency owner and you check your landing pages, everything is good, itās fine. But, you know, they can really control, like, who goes where. And that agency didnāt realize the problem until they had lost like six figures in ad revenue, which they had to bankroll, basically. So they had to pay that because the customers werenāt like, Iām not paying. Like, you wasted like 200,000 or something dollars of ad revenue. Like, weāre not paying for that for, like, you know, the hack traffic. So they had to eat the cost. And compared to that, like, by the way, like, then security starts to look really cheap. So a few dollars here or there, itās like, thatās good. But, you know, Iāll give it to you, I think, to like, dig into the malware, because you guys have some pretty interesting cases, I think.
Adam Weeks:
All right, Aaron, scare me a little bit. There is a ride here at Cloud Fest where you can, like, go through. Itās like kind of like Disneyland has the Haunted Mansion. Itās a similar thing. But, like, here you actually go to hell. Yeah, itās intense. So, yeah, scare me a little bit.
Aaron Campbell:
I mean, first of all, he hit on probably one of the biggest ones, which is redirecting to malicious sites specifically to essentially steal money if you can, from. From ads and such. Right. Thatās one of the big ones. I mean, you see everything. It all comes back to money. But you see everything. You see everything from, from crypto miners, which may be a little easier to find actually because they tend to suck so many resources that even the hosts sees them right away. But ads on sites, redirecting paid ads to other places so that they can promote things, even selling products straight on sites or faking your login page or whatever to just steal your customers details so that they can then go get money from your customers in various ways. It really basically anything that you can imagine that you could make money on the web but doing that by stealing it from someone else along the way.
Mart Virkus:
Right.
Aaron Campbell:
And yeah, thatās the thing is you just see that and then you see them hiding it. The bit that he mentioned about how as a site owner you donāt see it, theyāve gotten more and more creative over the years. And so yeah, if you go straight to your site. When I go to my site I always just type it in the URL bar cause I know where my site is. But if my site is compromised, it probably looks fine when I do that. But if I do a Google search and follow a link to my site and Google was the referrer, then it might redirect to someone elseās site whoās claiming to be me and doing whatever. Or maybe if I had paid ads out there, maybe itās only when itās coming in from a Facebook click that it redirects. And so they do that in order to just stay on the site longer. The longer it takes the site owner to recognize it, the longer they can be siphoning off money from that company. Which is why companies like Servebolt have companies like us that catch that ideally without the site owner needing to notice.
Adam Weeks:
Yeah, the noticing part Iāve always, you know, Iām a tech savvy guy and like I go to a website and like oh, thatās fishy, they spelled that thing wrong. Or the logo doesnāt look quite right or somethingās different. AI is making me look dumb because I canāt tell anymore for sure.
Aaron Campbell:
All those little telltale signs where there were mistakes like that are almost completely gone with AI when theyāre faking a page, they just are telling AI go grab this page and change all the links to do this.
Adam Weeks:
All the links, everything is legit. Like it looks perfect.
Aaron Campbell:
Right. And, and, and, and, and thatās because like bit for bit. It basically is.
Adam Weeks:
Yeah.
Aaron Campbell:
And, and, and no mistakes made by the AI in that case.
Adam Weeks:
Yeah, yeah, no, AI is good at doing that. Much better than someone who English wasnāt there, you know, the second language and you know, different things like that.
Aaron Campbell:
And itās just a lot simpler than like we all see like AI images and weāre like, oh, we can see, you know, oh, that dudeās got six fingers. Like we, we noticed but many times
Adam Weeks:
not anymore, but like.
Aaron Campbell:
Right, but, but the images still often have some of those telltale signs. But something that AI is really good at is text based code. And, and, and that is, thatās what theyāre copying now. And itās just fantastically good at that.
Adam Weeks:
And itās going to get better and better.
Mart Virkus:
Iāll add to that. And hereās an irony, right? AI is really powerful, really good in the hands of capable attackers. But AI also sucks in the hands of a very incapable developer. So you have this compounding effect. You have really clever AI attack solutions. But now weāre wipe coding. So earlier you asked about what trends we see. So we see the wipe coding trend and you know, people are also wipe coding like plugins in the WordPress space. And you know, thereās also like the fully wipe coded apps, but we see vulnerabilities there as well. Like basic things that you know, the AI ignores to do that leads to like, yeah, basically like a little security bug in the code base. And if youāre not a developer, even good developers have security bugs. Like actually like even the really most reliable software gets security bugs, serious ones. It just happens, itās just like, you know, itās what you do about it. Yeah. But if you donāt know what youāre looking at, you look at this code go like this looks great, like, thank you, Claude. You know, letās push to production. And then you know, our researchers are just like going there, sitting like, aha, thatās interesting. Who made this? Yeah, we had. And this is, I donāt know if this was vibe coded, but Iāll give you like, we, I think this week found like a new vulnerability.
Adam Weeks:
Did you?
Mart Virkus:
Okay, there was a. Well we found thousands I think on a monthly basis. But so there was one that was like, itās a little side topic, but it was something like an AI endpoint issue where basically if you type in like you register a user for a website, you type in like an email of an existing user and hit enter. It just logs you in instead of oh my goodness. Which is like, how the hell, who made this?
Adam Weeks:
It was an AI bot. Andrew, Iām going to jump back to you real quick. Do you have any more Specifics about examples, use names or not. But from the clientās perspective, what are some of the things that youāre seeing? And again, kind of like the need for this layer of security and maybe some of the technical perspective that you have.
Andrew Killen:
I think the first thing is to echo what Aaronās been saying. It comes from stupidity quite a lot.
Adam Weeks:
What are you trying to say?
Andrew Killen:
Well, one customer, they had had a new website made by an agency. I donāt know the agencyās name, but inside the php, they had actually left a malware in there when they handed it over to the customer. And itās exactly like you say, people come to the site direct. It looked fine, but from ads, from this, from that, it was going all over the place and itās just ridiculous. They canāt trust their supply chain. And so we felt, yeah, got to step up there a bit more just to protect our customers. Thereās other problems as well. Technically speaking, our hacks, like, generally tends to take a lot more energy, tends to be a lot more noisy, and we just donāt want that on our servers.
Adam Weeks:
Sure.
Andrew Killen:
We have a quality.
Adam Weeks:
It costs you money.
Andrew Killen:
Yeah. Well, itās not just that. It really annoys the other people on
Adam Weeks:
the server, which will then cost you money eventually.
Andrew Killen:
And excuse me, I mean, technically speaking, other things like word fence, they really slow the machine down or the website down to be able to add protection. And that to us is just not a good thing. We want to be able to maintain that performance, milliseconds count. And thatās why both these gents here, their companies work well for us, especially monarchs. Very low level on the operating system, really. We notice it as a blip rather than as a nightmare.
Adam Weeks:
Yeah.
Andrew Killen:
That for us is just really important. And I donāt know if Aaron mentioned how many websites tend to look like theyāve been hacked at some point, but when we turned it on for the first time. Oh, my God. Really? Oh, my God.
Adam Weeks:
Turn it back off. Turn it back off.
Mart Virkus:
Yeah.
Andrew Killen:
And every customer thinks that theyāre safe.
Adam Weeks:
Yeah.
Andrew Killen:
They donāt have a clue until it gets turned on and theyāre like, oh, God.
Adam Weeks:
Yeah.
Andrew Killen:
And okay, it might not have been active at that actual problem, that hack that time, but still it sat there waiting and.
Mart Virkus:
Yeah, yeah.
Andrew Killen:
Painful.
Aaron Campbell:
Thatās the real problem with, you know, a lot of malware is essentially backdoor. Right. The first thing they do is drop a piece of malware that lets them in to drop other stuff whenever they want, and that can sit dormant for quite a While, and you may not notice it on your servers, certainly the end user isnāt noticing it, but itās a constant risk sitting there because it could suddenly start sucking up resources and being that bad neighbor on the site. And so by coming in and we usually, I mean, you mentioned the numbers. We usually, on average when we launch on a new Host, see, about 30% of existing users have something like that. One in every three has something like that on their site. And by going through and taking care of that, what weāre doing ideally is making sure that you can offer all the resources of that server to your customers like you want to. You can use these resources for a performance performant sight. And we know that theyāre not going to be sucked up by something bad any moment. Right. And so thatās what we try to do. And we try to do that as efficiently as possible.
Adam Weeks:
Awesome. Love it. Well, as weāre starting to wrap up, Iām just going to give you guys each a chance to kind of summarize what are we doing here? What does this relationship mean to you? Iāll start with you. Yeah, summarize. What does this relationship mean to you? And then, yeah, also, how can someone find you online if they want to get a tattoo or, you know, learn more about Patchstack.
Mart Virkus:
Yeah, you know what I was thinking? And this is something our support engineer actually came up with. Like, we are really good with Patchstack at, you know, finding and, you know, blocking those vulnerabilities. So we do that really well. We donāt really want to do anything else. We want to specialize. But itās like, you know, Patchstack is like a very perfect fence around your website.
Adam Weeks:
Yeah.
Mart Virkus:
But I would encourage anyone before you put that fence up, maybe go to monarchs and like, maybe look at that, your house before you put the fence up. Because if you put a fence up after the robbers have been in the house, I got news for you. I think you should be focusing on. You got other problems. But thatās the thing. Itās like, you know, make sure site is clear first. We have sometimes customers coming in and they go like, you know, but can you also clean my site? And like, okay, hold on. You need to deal with this first. Yeah, like, we canāt. Yes, we will protect you from new stuff, but youāve got a problem now and thatās something else. Somebody else needs to deal with it. But thatās a relationship. And thereās other ways people can get into your site. Itās like, and for the Readers, listeners. One more time. Your password was pizza123. If they get in with that, you need something else. So itās the perfect example of the layer.
Adam Weeks:
Right, Got it. If I put an exclamation mark at the end, does that help?
Mart Virkus:
Well, thanks for telling me one, but yeah, I mean, yeah, thatās all I gotta say. Think about layers. You know, itās like different solutions for different problems and, you know, if theyāre good for performance as well, you know, extra, extra points. Right.
Adam Weeks:
Very cool.
Mart Virkus:
Yeah. Patchtack.com Patchstack.com Check out the site. We got some interesting research as well. I mentioned the white paper we did with monarchs. Read that. A lot of interesting, slightly scary data about, like, whatās going on in that attacker world. But I really recommend everybody.
Adam Weeks:
So some good nighttime reading before I try to fall asleep and just.
Mart Virkus:
Yeah, lights off. Campfire style. Yeah. Yeah.
Adam Weeks:
All right. Thank you, Mark.
Aaron Campbell:
And Iāll go ahead and throw out one of those scary details since he just brought up that white paper that we did together. The average time that weāre seeing from when a exploit exists to when itās actually being. I guess from when the vulnerability is. Is found to when itās actually being exploited on sites looking across a whole yearās average five hours is the new time. It used to be days or even weeks. Five hours. And it is definitely actively shrinking.
Adam Weeks:
And AI is just going to make it faster.
Aaron Campbell:
Exactly, exactly. Which is why we have to be able to look ahead instead of behind. So I think that as far as you asking about how we work together and how this all kind of sits from the Monarchās point of view, I love this setup with Servebolt because I think that theyāre doing it right. And itās one of those great chances to see kind of the perfect setup in action. The network layer being protected and then monarchs coming in and keeping the servers clean and protected and sitting in the runtime to be watching requests as theyāre coming through. And then patch like it gives. It gives that sort of layered approach that we have said literally for decades in our space that the right approach to security is a layered approach. But it used to be that that was the best approach and now it is the only approach that still works because the level of attacks has changed such that if you donāt stop some of them at every layer, you will not be successful. And so I love working with these companies that are taking best in breed at every layer and really doing that. And so thatās itās. Been great to see it really working. And you can find me at Monarchs M O N A R X dot com.
Adam Weeks:
Okay.
Mart Virkus:
All right.
Adam Weeks:
Thank you so much, Aaron. Andrew.
Mart Virkus:
Wow.
Andrew Killen:
After these two guys. No, yeah, yeah. I mean, what weāve done is exactly what youāre saying. We created a shield of products which it with Patchstack and Monarchs doing their bits and then the IP blocking and then the geosecurity and then weāve got a bunch of other things going on in the background, which we do through cloudflare to protect them, you know, xml, RPC to protect the login page, protect this. Itās a layered approach. It absolutely has to be. And we realize itās a moving target where weāre constantly looking to make it better and better. Will we get there? Well, apparently not. Thatās the thing.
Aaron Campbell:
Constant race.
Adam Weeks:
Yeah, constant race.
Andrew Killen:
Yeah. And we just got to try our hardest. And I like the challenge of it, to be honest with you. Itās kind of fun. And weāve seen a dramatic improvement from having Monarchs and patchstack on board.
Adam Weeks:
Yeah.
Andrew Killen:
It gives security. Like, Iām going to talk about WordFence again, because people were installing that all over the place and they were complaining, hey, my websiteās slow. My websiteās slow. And thatās just a nightmare.
Andrew Killen:
Because theyāre just using the wrong tool and being a performant website host and then going, oh, letās straightjacket it, letās make it slower, letās do. Goes against the grain. And so choosing for products that can really make it sing at the same time, thatās the way to go. Well, certainly, from my point of view, very cool.
Adam Weeks:
So if youāre looking for a host that is implementing both Patch Deck and Monarchs, head on to servboat.com.
Andrew Killen:
thatās correct. Yeah.
Adam Weeks:
All right. Very, very cool, gentlemen. Well, thank you so much. After this conversation, Iām gonna go change my password@2exclamation marks. I think ought to do it. Hope you guys have a wonderful last day here at Cloud Fest. Itās been great talking with you under the big top and this carousel thing, I donāt even know where weāre at. Iāll give you guys some time to hopefully go ride some roller coasters or get another tattoo or whatever it is, but thank you so much. This is Adam Weeks for Open Channels FM.
Patterns for running Ollama on a home lab or office box and reaching it safely from remote devices. Covers OLLAMA_HOST binding, Tailscale or WireGuard, firewall pinning, and a tight security checklist.
#Hosting #Self-Hosting #LLM #Ollama #DevOps #Security
https://www.glukhov.org/llm-hosting/ollama/ollama-remote-access/

Patterns for running Ollama on a home lab or office box and reaching it safely from remote devices. Covers OLLAMA_HOST binding, Tailscale or WireGuard, firewall pinning, and a tight security checklist.
Free Website Migration ā Hassle-Free & Zero Downtime!
š Free Website Migration ā Hassle-Free & Zero Downtime!
Thinking of switching web hosts but worried about the hassle? Rad Web #Hosting has you covered!
Our Free Website Migration Service makes it easy to move your site to our fast, secure, and reliable servers ā at no extra cost!
What We Handle for You:
ā Full Website Transfer ā Files, databases, ...
Continued š https://blog.radwebhosting.com/free-website-migration-hassle-free-and-zero-downtime/?utm_source=mastodon&utm_medium=social&utm_campaign=mastodon.social #servermigration #webhosting
Free Website Migration ā Hassle-Free & Zero Downtime!
š Free Website Migration ā Hassle-Free & Zero Downtime!
Thinking of switching web hosts but worried about the hassle? Rad Web #Hosting has you covered!
Our Free Website Migration Service makes it easy to move your site to our fast, secure, and reliable servers ā at no extra cost!
What We Handle for You:
ā Full Website Transfer ā Files, databases, ...
Continued š https://blog.radwebhosting.com/free-website-migration-hassle-free-and-zero-downtime/?utm_source=mastodon&utm_medium=social&utm_campaign=mastodon.social #webhosting #servermigration
Code hosting of #EuroOffice in #Europe as well, anyone? React to the #Github issue, where @Codeberg and @forgejo are suggested.
https://en.wikipedia.org/wiki/Euro-Office
https://github.com/Euro-Office/DocumentServer/issues/14
#Codeberg #Forgejo #DigitalAutonomy #EU #Hosting #Office #LibreOffice