#serversecurity

2026-02-25

Two weeks ago we published our analysis of TURN security threats. Today: how to fix them.

New guides covering implementation-agnostic best practices (IP range blocking, protocol hardening, rate limiting, deployment patterns) and coturn-specific configuration with copy-paste templates at three security levels.

Best practices: enablesecurity.com/blog/turn-s
coturn guide: enablesecurity.com/blog/coturn
Config templates on GitHub: github.com/EnableSecurity/cotu

coturn 4.9.0 dropped yesterday with fixes for CVE-2026-27624 (IPv4-mapped IPv6 bypass of deny rules) and an inverted web admin password check that had been broken since ~2019. The guides cover workarounds for older versions.

#infosec #webrtc #security #TURN #coturn #penetrationtesting #voip #serversecurity

smey-IT e.K.smeyit
2026-02-01

🛡️ ESET schützt nicht nur PCs – sondern auch eure Server.
Ransomware greift immer die wichtigsten Systeme zuerst an.

ESET bietet:
• Schutz für Clients
• Schutz für Windows- & Linux-Server
• geringe Systemlast
• europäische Lösung

👉 Mehr Infos: smey-it.de/managed-antivirus


Endgerate & Server
schiitzen. Betrieb
sichern.

ESET Endpoint & Server Protection
smey-IT
2026-01-30

Chia sẻ bảo mật máy chủ: Sử dụng Ubuntu 24, các biện pháp gồm SSH chỉ bằng key, tắt root login, user riêng, fail2ban & ufw, cập nhật tự động, Plesk + gói bảo mật. Hỏi: Thiết lập này có đủ an toàn để host website không? #BảoMậtWebServer #ServerSecurity #UbuntuTips

reddit.com/r/selfhosted/commen

Cybersecurity cert prep: Lab 10 (Path Traversal) — retrieve the list of users from the server

peertube.eqver.se/w/aGi7ffemEK

2025-12-16

Securing servers/services without VPN cần giải pháp nào? Dùng Cloudflare Tunnels + Traefik nhưng mTLS gặp vấn đề với app di động, đặc biệt là iOS. Cloudflare Zero Trust & NordVPN cũng bị xung đột. Tìm cách truy cập an toàn, dễ dùng cho client không dùng web browser. #securingServers #mTLS #Cloudflare #ServerSecurity #Android #iOS #Tailscale #NetworkSecurity

reddit.com/r/selfhosted/commen

2025-11-28

Server Security Checklist — Essential Hardening Guide

Securing your servers isn’t optional — it’s your first line of defense against data breaches, ransomware, insider threats, and lateral movement. Use this checklist as a baseline for Linux, Windows, cloud, hybrid, or on-prem servers.

🔧 1. System & OS Hardening
• Keep OS & packages updated (apply security patches frequently).
• Remove / disable unused services & software.
• Enforce secure boot + BIOS/UEFI passwords.
• Disable auto-login and guest accounts.
• Use minimal OS images only (reduce attack surface).

🔐 2. Access Control
• Enforce strong passwords & MFA everywhere.
• Use RBAC & least privilege access.
• Disable root/Administrator login over SSH/RDP.
• Rotate credentials & keys regularly.
• Implement just-in-time access for privileged users.

🌐 3. Network Security
• Restrict inbound/outbound traffic via firewalls.
• Segment critical servers from general LANs/VLANs.
• Disable unused ports & protocols.
• Enable DoS/DDoS protection.
• Apply zero-trust network principles.

🔑 4. Secure Remote Access
• Use SSH key-based authentication (disable password login).
• Enforce VPN for admin access.
• Log & monitor all remote access sessions.
• Disable legacy protocols (Telnet, FTP, SMBv1).
• Require bastion/jump host for critical access.

📊 5. Logging & Monitoring
• Enable centralized logging (syslog / SIEM).
• Track failed login attempts & anomalies.
• Configure alerts for privilege escalation or config changes.
• Monitor log tampering.
• Retain logs securely for audits & forensics.

🔒 6. Data Protection
• Encrypt data at rest (LUKS, BitLocker, etc.).
• Encrypt data in transit (TLS 1.2+).
• Strict database access policies.
• Regular, offline, immutable backups.
• Test restore procedures (don’t assume backups work).

🔁 7. Application & Patch Management
• Keep middleware, frameworks, and apps patched.
• Delete default credentials & sample files.
• Enable code signing for software packages.
• Use secure coding practices (OWASP Top 10).
• Implement dependency scanning (Snyk, Trivy, etc.).

🛡️ 8. Malware & Intrusion Defense
• Deploy EDR/AV on endpoints.
• Enable IDS/IPS at network edge.
• Automatic vulnerability scans (schedule weekly/monthly).
• Monitor persistence techniques (cron, startup scripts).
• Block known malicious IP ranges & TLDs.

🏢 9. Physical & Cloud Security
• Restrict physical access to server racks/rooms.
• Enable provider security tools (AWS Security Groups, Azure NSG, IAM).
• Harden cloud images (CIS benchmarks).
• Review cloud logging & audit trails regularly.
• Disable unused cloud API keys / roles.

📜 10. Policy & Compliance
• Use CIS / NIST / ISO-27001 benchmarks.
• Track & document every access change.
• Force annual access reviews & key rotation.
• Perform regular security training for admins.
• Maintain disaster recovery & incident plans.

➕ Additional 5 Critical Controls (Advanced Hardening)

🧠 11. Privileged Access Management (PAM)
• Use jump hosts & session recording.
• Just-In-Time access for admins.
• Store keys in secure vaults (HashiCorp Vault, CyberArk).

🚨 12. Real-Time Threat Detection
• Use behavioral analytics → UEBA/XDR.
• AI-based anomaly detection recommended.
• Block suspicious IPs automatically.

🧪 13. Red Team & Pentesting
• Run regular internal pentests.
• Validate configuration weaknesses.
• Simulate phishing + lateral movement scenarios.

🧱 14. Container / VM Isolation
• Use AppArmor, SELinux, Seccomp profiles.
• Limit Docker socket access & root containers.
• Scan images before deployment.

📦 15. Automated Configuration Management
• Use IaC (Terraform, Ansible, Puppet) for repeatable and secure builds.
• Detect drift using compliance scanning.
• Version control all infrastructure.

🧠 Core Reminder

A server is only as secure as the team who maintains it.
Hardening isn’t one task — it’s an ongoing

#ServerSecurity #SystemHardening #InfoSec #CyberSecurity #BlueTeam
#DevSecOps #SysAdmin #ThreatDetection #AccessControl #NetworkSecurity
#LinuxSecurity #SecureArchitecture #RiskMitigation #SecurityChecklist
#CloudSecurity #InfrastructureSecurity #ZeroTrust #SecurityMonitoring

Essential Hardening Guide 8
System & OS Hardening Network Security
+ Keep 0S & packages undated « Restrict inboune/outbound traffic
(apply patches regularly) with firemalls
* Remove or disable unused servces » Segment critical servers from general
& software networks
« Configure secure boot « Disable unused ports & protocols
&BIOS/UEFI passwords
Access Control Secure Remote Access
+ Use SSH with key-based auth (disable
« Enforce strong passwords + MFA password logins)
forjallaccounts « Enforce VPVS for admin access
° Us jolegbaced access « Monitor and log remote seasions
(least privilege)
« Disable root/administrator login i
_ over SSH/RDP Data Protection
« Enable centralized logging (salog/SIEM)
Network Security « Monitor failed login attempts
«+ Restrict-inbound/outbound traffic Bue) ey e
a « Configure alerts for critical events
with firewalls
+ Segment critical servers from
general networks Application & Patch Management
Disable unused ports & protocols Keep middleware, frameworks, and
: apps patched
Data Protection + Remove detault credentials and
+ Enervot sensitive data at rest & sample configs
in franstt (TLS, disk encryption) « Use secure coding practices
+ Regularly bock up data to secure,
offline storage Physical & Cloud Security
+ Scan regularty for vunervies oolicies
= Apply CIS/NIST banch narks
= Decument access, configs, and changes
« Train admins in seourity best practicesBasic Server Iy pes
Origin y Proxy Mail _,
5 ) 5
* Listens for incoming * os EEL * Controls the Sending _SNf—d5
inbernet requests ond cecewing of email («8
gos ht © Tntermediole Servers between cient and ongn | ® Receives mail From fay 7
Clients
Act as oddihonal Securiky, caching senices,
Delivers web content Fo Clients ® by, Caching El
© | pass requests on bo other servers odministrahve control, and more * Delors mal Jo Hoe
1 does nek have he capacity to respond Computers
we Web DNS Got gr
nl ® Transhbes domain names ink
E==g==VeaN ® oa bid pss lic IP addresses v
g espe ses
a ®fcks like an IP address book.
[BN] © Communicates with web browsers For the mlernel
—
I Can Store and prokeck web ® Includes server Sub-Fypes such as Rook servers,
dic = 4 Hea Authoribakive Nome Servers, and Resolver serversConventional Milesight loT camera
E le N\ W \
ws Network Server 4 2 | f= 1 a -
Endnode | oni Ll. ji 14 1 wigs Ao cand | E
bo = El a ES MEET
2025-10-28

20,000 failed SSH logins in 2 days.
On a server hosting only a static webpage.

Recently, I was checking logs on a VM that I own. It has no backend, no database.
Just a static webpage served by NGINX.

Yet, I found 20k failed SSH login attempts.

A VM becomes a target the moment it’s online.

Fortunately, password logins were disabled. Here is my new server security routine (non-root user, SSH auth, fail2ban etc.):

nerdsid.com/posts/cyber-securi

#CyberSecurity #InfoSec #Linux #ServerSecurity

CLI showing failed ssh login attempts.
Negative PID Inc.negativepid
2025-10-28

The Sony PlayStation hack of 2011 is considered the worst breach in gaming history. With 77 million users affected, this episode is often used as an example of the importance of timely patching of servers and firewall security.
Here's what happened and the lessons learnt.

negativepid.blog/the-sony-play
negativepid.blog/the-sony-play

2025-10-18

"Bạn đang dùng Cloudflare Tunnel để mở Jellyfin trên internet? Thiết lập Cloudflare Access với mã 1 lần gửi email. Không an toàn hay? #Cloudflare #Jellyfin #ServerSecurity #TruyCelInternet #MãMạo #AnT oneserver #MãMail"

reddit.com/r/selfhosted/commen

N-gated Hacker Newsngate
2025-10-13

🐦🥱 Ah yes, because nothing says cutting-edge anthropology like a 400 Bad Request error. Clearly, ancient Patagonian server security was way ahead of its time, blocking all access to any meaningful information. If only their hunter-gatherers had a helpline for their own glitches. 🙄
phys.org/news/2025-10-ancient-

2025-10-07

🚨 Threat Alert: WireTap Attack on Intel SGX Servers

Physical attacks can now compromise SGX enclaves using a low-cost DIY setup (<$1,000). Attackers can extract cryptographic keys, forge enclaves, and threaten blockchain/Web3 networks and confidential computation.

Mitigation considerations:
🛡 Restrict physical server access
🔑 Review SGX-dependent systems in blockchain & Web3
💡 Monitor for suspicious DRAM bus activity

#WireTap #IntelSGX #HardwareSecurity #CyberSecurity #SideChannelAttack #BlockchainSecurity #Web3 #ServerSecurity #Infosec

New malware leverages WhatsApp to target Brazilian government and businesses
2025-10-06

🚨 Threat Alert: WireTap Attack on Intel SGX Servers

Physical attacks can now compromise SGX enclaves using a low-cost DIY setup (<$1,000). Attackers can extract cryptographic keys, forge enclaves, and threaten blockchain/Web3 networks and confidential computation.

Mitigation considerations:
🛡 Restrict physical server access
🔑 Review SGX-dependent systems in blockchain & Web3
💡 Monitor for suspicious DRAM bus activity

#WireTap #IntelSGX #HardwareSecurity #CyberSecurity #SideChannelAttack #BlockchainSecurity #Web3 #ServerSecurity

New
2025-09-25

📋 Server Security Checklist — Essential Hardening Guide 🛡️

Securing servers is critical to protect sensitive data, applications, and networks. Here’s a quick checklist every sysadmin and security engineer should follow to reduce risk and strengthen resilience. ⚡🔐

1️⃣ System & OS Hardening
🔹 Keep OS and packages updated (apply patches regularly).
🔹 Remove or disable unused services & software.
🔹 Configure secure boot and BIOS/UEFI passwords.

2️⃣ Access Control
🔹 Enforce strong passwords + MFA for all accounts.
🔹 Use role-based access (least privilege).
🔹 Disable root/administrator login over SSH/RDP.

3️⃣ Network Security
🔹 Restrict inbound/outbound traffic with firewalls.
🔹 Segment critical servers from general networks.
🔹 Disable unused ports & protocols.

4️⃣ Secure Remote Access
🔹 Use SSH with key-based auth (disable password logins).
🔹 Enforce VPNs for admin access.
🔹 Monitor and log remote sessions.

5️⃣ Logging & Monitoring
🔹 Enable centralized logging (syslog/SIEM).
🔹 Monitor failed login attempts & unusual activity.
🔹 Configure alerts for critical events.

6️⃣ Data Protection
🔹 Encrypt sensitive data at rest & in transit (TLS, disk encryption).
🔹 Regularly back up data to secure, offline storage.
🔹 Apply strict database access policies.

7️⃣ Application & Patch Management
🔹 Keep middleware, frameworks, and apps patched.
🔹 Remove default credentials and sample configs.
🔹 Use secure coding practices.

8️⃣ Malware & Intrusion Defense
🔹 Deploy antivirus/EDR for endpoints.
🔹 Enable IDS/IPS at the network edge.
🔹 Scan regularly for vulnerabilities.

9️⃣ Physical & Cloud Security
🔹 Restrict physical access to server rooms.
🔹 Harden cloud instances with provider tools (security groups, IAM).
🔹 Regularly review cloud audit logs.

🔟 Policy & Compliance
🔹 Apply CIS/NIST benchmarks.
🔹 Document access, configs, and changes.
🔹 Train admins in security best practices.

#ServerSecurity #CyberSecurity #InfoSec #BlueTeam #SysAdmin #ITSecurity #SecurityChecklist #DefensiveSecurity

CAD-Viewer.comcad_viewer
2025-08-20

🔧 You may not notice, but to improve server security, we’ve decided to disable IPv6. Since our provider, OVHCloud, doesn’t offer DDoS protection or edge firewall for IPv6, we made this decision to ensure a better and more stable service.

ECS Biztech Ltd.ecsbiztech
2025-08-20

🔐 Running a VPS? Don’t leave it unprotected!

Check out our step-by-step guide to securing your VPS and keeping your data safe. 🚀

👉 Read more: ecsbiztech.com/how-to-secure-y

How to Secure Your VPS: A Step-by-Step Guide
2025-07-31

Heads up for any server admins (especially cPanel ones):

Way To The Web Ltd (aka ConfigServer) who provide the very useful and handy ConfigServer Firewall (csf) and many other products are closing down at the end of August - no updates/downloads will be available from that date.

configserver.com/announcement/

#serveradmin #cpanel #serversecurity #csf #linux

N-gated Hacker Newsngate
2025-07-10

🌴🔍 "Groundbreaking" findings about Nui's "isolation" were so earth-shattering that even the internet refused to serve them. 🤦‍♂️ Who knew radiocarbon dating had such hard limits... like server security policies? 🚫💻
phys.org/news/2025-06-radiocar

N-gated Hacker Newsngate
2025-04-16

👨‍🔬🔍 Apparently, the secret to protein folding was hiding in the 400 Bad Request error all along! Who knew server security policies were the key to solving scientific mysteries? 🧪🔒
phys.org/news/2025-03-protein-

✙ Alterego (Midshipman) ✙tomberuk@qoto.org
2025-03-18

Недавно была обнаружена критическая уязвимость в программном обеспечении MegaRAC Baseboard Management Controller (BMC) от American Megatrends International (AMI), используемом в серверах таких производителей, как HPE, Asus и ASRock.
**Описание уязвимости:**
Уязвимость, получившая идентификатор CVE-2024-54085, позволяет удалённым неаутентифицированным злоумышленникам получить полный контроль над уязвимыми серверами. Атака может быть осуществлена через интерфейсы удалённого управления, такие как Redfish, и не требует сложных технических навыков или взаимодействия с пользователем.
**Возможные последствия эксплуатации:**
- Удалённое управление сервером, включая развёртывание вредоносного ПО или программ-вымогателей.
- Модификация прошивки, что может привести к повреждению компонентов материнской платы, таких как BMC или BIOS/UEFI.
- Физическое повреждение сервера, например, через создание условий перенапряжения или постоянные циклы перезагрузки, которые невозможно остановить без физического вмешательства.
**Рекомендации:**
Администраторам и владельцам серверов рекомендуется:
- Ограничить доступ к интерфейсам удалённого управления (например, Redfish) только доверенным сетям.
- Регулярно обновлять прошивки BMC до последних версий, содержащих исправления безопасности.
- Мониторить сетевой трафик на предмет подозрительной активности, связанной с BMC.
Для получения дополнительной информации и технических деталей рекомендуется ознакомиться с полным отчётом компании Eclypsium.

**Bleeping Computer** – *Critical AMI MegaRAC bug can let attackers hijack, brick servers*
Источник
**Eclypsium** – Исследование уязвимости в MegaRAC BMC (официальный отчёт)
Источник
**NIST National Vulnerability Database (NVD)** – Запись о CVE-2024-54085
Источник
**Hewlett Packard Enterprise (HPE) Security Advisories** – Сообщения о безопасности серверных продуктов
Источник
**Asus и ASRock Security Bulletins** – Информация об уязвимости в серверных материнских платах
Источник (Asus)
Источник (ASRock)

**Рекомендации по защите от уязвимости AMI MegaRAC (CVE-2024-54085)**
**Обновление прошивки** – Немедленно проверить и обновить BMC-прошивку до последней версии, содержащей исправления.
**Ограничение доступа** – Отключить удалённые интерфейсы управления (Redfish, IPMI) от внешних сетей и ограничить доступ только доверенным IP-адресам.
**Мониторинг активности** – Настроить логирование и мониторинг попыток несанкционированного доступа к BMC.
**Сегментирование сети** – Разместить BMC в отдельной изолированной сети, недоступной из интернета.
**Использование VPN** – Если удалённый доступ к BMC необходим, использовать безопасное подключение через VPN.
**Жёсткая аутентификация** – Включить двухфакторную аутентификацию (2FA) и сменить стандартные пароли.
**Аудит уязвимых устройств** – Проверить список серверов в инфраструктуре, использующих MegaRAC BMC, и оценить их уязвимость.
**Хэштеги**
#CyberSecurity #Infosec #CVE202454085 #MegaRAC #BMC #ServerSecurity #Vulnerability #DataProtection #Redfish #ITSecurity #PatchNOW

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst