Large-scale brute-force activity targeting VPNs, SSH services with commonly used login credentials (blog.talosintelligence.com)
from kid@sh.itjust.works to cybersecurity@sh.itjust.works on 25 Oct 11:04
https://sh.itjust.works/post/27131637

#cybersecurity

threaded - newest

PhilipTheBucket@ponder.cat on 25 Oct 12:35 next collapse

For as long as I can remember, open SSH endpoints have been subject to password scan attacks from random corners of the internet. It’s just how life is.

EisFrei@lemmy.world on 25 Oct 16:23 collapse

The moment I install ssh is the moment I install fail2ban.

pcouy@lemmy.pierre-couy.fr on 26 Oct 09:12 next collapse

I was exited to read about the recent surge of brute force attempts I received from IPs my fail2ban has not previously seen, but this is just a generic piece from 6 months ago :(

mitchty@lemmy.sdf.org on 26 Oct 16:42 collapse

I found just white listing cidrs from your country the most effective way to reduce this log spam. I only use keys anyway so the attempts are pointless.