SecureLunaSecureLuna
Launch · 90% off

Quiet checks.Daily reports.Always on.

Daily automated baseline checks (KISA · CIS · NIST · GB/T) — plus custom commands on a schedule (coming soon) so you can run and collect any check you need. Five-minute setup with one SSH key.

No credit card required · 1 server free forever

How it works

Five minutes to your first report.

Self-service. No agent installed on your servers — just a public SSH key you place yourself.

1. Register your server

Add a Linux host you operate (label, host, SSH user, port).

2. Install our public key

Append the key we generate to your server's ~/.ssh/authorized_keys.

3. Daily checks run quietly

Each night, SecureLuna runs read-only configuration checks against KISA, CIS, NIST, and GB/T checklists.

4. Report by morning

Pass/fail per item, prioritized findings, and a PDF in your inbox before 7 AM.

What you'll see

Your morning report, at a glance.

Pass / fail per check, prioritized findings, and a single compliance score — all delivered before 7 AM.

ActiveDaily 03:00 KST

web-prod-01

10.0.x.x · Ubuntu 24.04

Compliance score

92

Pass 122Fail 10
  • SSH & Access14/16
  • Kernel & sysctl22/24
  • Filesystem11/12
  • Logging & audit9/10

Daily report

May 14 · 132 checks across 4 standards

🌐 CIS🇰🇷 KISA🇺🇸 NIST
  • High

    SSH root login enabled

    Set PermitRootLogin no in /etc/ssh/sshd_config and reload sshd.

  • Med

    Kernel parameter net.ipv4.ip_forward = 1

    Disable if this host is not routing traffic intentionally.

  • Pass

    120 / 132 — 91%

Preview · sample dataTry with 1 free server →

Roadmap

Your AI Security Analyst.

SecureLuna evolves from a daily report into an AI analyst that watches over your infrastructure while you sleep.

SoonAI configuration analysis

Large-language-model summaries of your daily report — what changed, what matters, what to do first.

SoonRisk prioritization

Findings ranked by exploitability and asset criticality so you fix the right things first.

SoonSuggested fix guides

Step-by-step remediation written for your specific OS, package versions, and configuration.

SoonOperational best-practice tips

Curated guidance on hardening posture, drift control, and audit-readiness.

SoonCompliance score

A single moving score across KISA / CIS / NIST / GB/T so progress is visible to non-technical stakeholders.

SoonTrend tracking

30-day and 12-month trend lines per asset and per check item.

Our security promise

Four commitments before you trust us with SSH.

Adding a server to SecureLuna means giving us a key to your home. Here is exactly what we do — and don't — with that key.

Private keys are sealed

Each asset's private key is encrypted at rest with AES-256-GCM using a server-side key. Decryption only happens in memory during a scheduled run.

Read-only checks

Baseline scans only run cat/grep/ss-style commands against config files, sysctl, and service states. Nothing is written, installed, or modified.

Data stays where you'd expect

Reports and findings live on our own infrastructure (no third-party data warehouse). You can hard-delete your tenant and everything in it at any time.

Revoke anytime

Remove the SecureLuna line from your server's ~/.ssh/authorized_keys and access is cut off immediately. No support ticket required.

FAQ

Questions we hear most often.

Quick answers about SSH safety, billing, and how SecureLuna handles your data.

How is my SSH access protected?
We generate a dedicated public key for each asset and you paste it into your server's ~/.ssh/authorized_keys yourself. The matching private key is encrypted at rest with AES-256-GCM using a server-side key, and never leaves our infrastructure. You can revoke access at any time by removing the line from authorized_keys.
What commands run on my server? Is it read-only?
Yes. Baseline checks are read-only — they inspect configuration files, sysctl values, and service states via cat/grep/ss-style commands. Nothing is written, installed, or modified. Custom scheduled commands (coming soon) will require explicit per-command approval.
Where are my reports and findings stored?
PostgreSQL hosted on our own infrastructure. Daily reports are emailed via Resend (with verified DKIM/SPF). You can delete your tenant and all associated data at any time from the account settings — this is a hard delete, not a soft delete.
How does pricing and refund work?
1 server is free forever — no credit card. Beyond that, USD $2.99/server/month (90% launch discount). Payments go through Polar. Refunds within 7 days of the most recent charge, no questions asked.
Is the free tier really permanent?
Yes. 1 asset, daily checks, and PDF report — free forever. We use the free tier to demonstrate the product; we'd rather you trust us than chase a 7-day trial.
Which standards are mapped?
KISA U-series (Korean baseline · ISMS-P), CIS Controls L1 (global), NIST SP 800-53 (US federal), and GB/T 22239 (China level protection 2.0). Each finding shows badges for the standards it maps to.

Security news

Today's signal in cybersecurity.

Curated daily by an AI analyst at 1 AM KST — only the items that actually matter.

BleepingComputer

Windows BitLocker zero‑day gives access to protected drives, PoC released

A researcher published PoCs for two unpatched Windows zero‑days dubbed YellowKey (BitLocker bypass) and GreenPlasma (privilege escalation). Affected systems should apply mitigation measures and monitor Microsoft’s patch status closely.

Read more →

BleepingComputer

New Linux 'Dirty Frag' Zero-Day Privilege Escalation Vulnerability Discovered

Named 'Dirty Frag', this new Linux zero-day vulnerability allows users to gain root privileges with a single command across major distributions such as Ubuntu, RHEL, CentOS Stream, AlmaLinux, openSUSE Tumbleweed, and Fedora. It is recommended to temporarily disable the related kernel modules (esp4, esp6, rxrpc) if using IPsec VPN and AFS file systems, as they may be affected.

Read more →

TechCrunch

New Linux Vulnerability 'Copy Fail' Disclosed

'Copy Fail' (CVE-2026-31431), a local privilege escalation vulnerability in the Linux kernel, affects most Linux distributions released since 2017 and has a PoC (proof of concept) available, posing an immediate threat. CISA has added it to the 'Known Exploited Vulnerability' list and warned federal agencies to apply patches by May 15. Users are advised to update their kernel or apply mitigations (e.g., disabling vulnerable modules) as soon as possible.

Read more →

BleepingComputer

JDownloader site hacked to replace installers with Python RAT malware

The official JDownloader site was compromised between May 6–7, 2026, replacing Windows and Linux installers with Python‑based RAT malware. Users who downloaded during that period should audit systems, restore from clean backups, and run malware scans immediately.

Read more →

Tom’s Hardware

‘Dirty Frag’ Zero-Day Vulnerability Revealed – Most Linux Systems Have Root Access Since 2017, No Patch Yet

A new kernel logical flaw vulnerability named 'Dirty Frag' has been revealed, allowing local users to gain root privileges immediately on most servers that have not disabled the esp4, esp6, and rxrpc modules. No patch has been released yet, and all major Linux distributions (including Ubuntu, RHEL, Arch, etc.) are affected. It's crucial to disable these kernel modules as soon as possible and to update immediately once an official patch is made available.

Read more →

BleepingComputer

PAN-OS Firewall Zero-Day Vulnerability Exploited for Almost a Month

The CVE-2026-0300 remote code execution (RCE) zero-day vulnerability in Palo Alto Networks' PAN-OS User-ID authentication portal (Captive Portal) has been exploited by nation-state hackers since April 9 for approximately a month. Until a patch is available, access to the authentication portal should be restricted to internal trusted networks or disabled.

Read more →

Tom’s Hardware

Linux 'Copy Fail' Vulnerability Added to CISA KEV List

CISA has included CVE-2026-31431 ('Copy Fail') in its catalog of actively exploited vulnerabilities (Known Exploited Vulnerability). This vulnerability enables restricted local users to gain root access, posing a significant threat in container and cloud environments. Immediate kernel patching and prioritizing reinforcement of vulnerable systems is essential.

Read more →

BleepingComputer

West Pharmaceutical says hackers stole data, encrypted systems

West Pharmaceutical Services disclosed in a May 13 SEC filing that following a breach detected on May 4, attackers exfiltrated data and encrypted systems by May 7, 2026. The company initiated incident response protocols including system shutdowns and external forensic support.

Read more →

PC Gamer

'Copy Fail' PoC Released - Immediate Root Access with 732-byte Python Script

A 732-byte Python PoC script released by Theori allows root access on almost all Linux distributions released since 2017. CISA has confirmed that this vulnerability is being actively exploited in real attacks. Users are urged to update their kernels immediately.

Read more →

BleepingComputer

Large-Scale 'Sorry' Ransomware Attack Exploiting cPanel Authentication Bypass Vulnerability

The cPanel/WHM authentication bypass vulnerability tracked as CVE-2026-41940 is being exploited on a large scale in 'Sorry' ransomware attacks, with over 44,000 compromised servers reported across more than 44,000 IP addresses. Emergency security updates for WHM and cPanel must be applied immediately.

Read more →

BleepingComputer

QLNX Linux Backdoor/Credential Theft Malware Targeting Developer Environments Emerges

A new Linux malware named Quasar Linux (QLNX) has emerged, targeting developer and DevOps environments such as npm, PyPI, GitHub, AWS, Docker, and Kubernetes, combining rootkit, credential theft, and backdoor functionalities. Sophisticated concealment techniques have been detected in affected systems, including dynamic compilation via GCC, log deletion, process masquerading, and forensics environmental variable initialization.

Read more →

BleepingComputer

Fortinet warns of critical RCE flaws in FortiSandbox and FortiAuthenticator

Fortinet patched two critical RCE vulnerabilities—CVE‑2026‑26083 in FortiSandbox and CVE‑2026‑44277 in FortiAuthenticator. Any affected systems should apply updates immediately.

Read more →

Contact

Need help? Get in touch.

Tell us about your environment and what you'd like to know — we'll reply within 1 business day. Inquiries in any language are auto-translated to Korean for our team.