Hi all,

As self-hosting is not just “home-hosting” I guess this post should also be on-topic here.

Beginning of the year, bleeping-computers published an interesting post on the biggest cybersecurity stories of 2023.

Item 13 is an interesing one. (see URL of this post). Summary in short A Danish cloud-provider gets hit by a ransomware attack, encrypting not only the clients data, but also the backups.

For a user, this means that a senario where, not only your VM becomes unusable (virtual disk-storage is encrypted), but also the daily backups you made to the cloud-provider S3-storage is useless, might be not as far-fetches then what your think.

So … conclussion ??? If you have VMs at a cloud-provider and do daily backups, it might be usefull to actually get your storage for these backups from a different provider then the one where your house your VMs.

Anybody any ideas or remarks on this?

(*) https://www.bleepingcomputer.com/news/security/the-biggest-cybersecurity-and-cyberattack-stories-of-2023/

  • Z3k3@lemmy.world
    link
    fedilink
    English
    arrow-up
    13
    ·
    10 months ago

    Indeed. The reaction from our customers was hilarious after our development team released a public statement stating we weren’t vulnerable to the big log4j exploit because the version they used was so old that feature didn’t exist yet

    • seang96@spgrn.com
      link
      fedilink
      English
      arrow-up
      0
      ·
      10 months ago

      “We are not vulnerable to this exploit, but we are vulnerable to these ~300 other exploits because we don’t update our crap!”

      Impressive!