Security News

GoDaddy breach: SSL keys, sFTP, database passwords of WordPress customers exposedGoDaddy, the popular internet domain registrar and web hosting company, has suffered a data breach that affected over a million of their Managed WordPress customers. Malicious Python packages employ advanced detection evasion techniquesJFrog researchers have discovered 11 malicious Python packages on PyPI, the official third-party package repository for Python, which have been collectively downloaded over 41,000 times.
![S3 Ep60: Exchange exploit, GoDaddy breach and cookies made public [Podcast]](/static/build/img/news/s3-ep60-exchange-exploit-godaddy-breach-and-cookies-made-public-podcast-small.jpg)
" Cybersecurity tips for the holiday season and beyond. Tech history: What do you mean, "It uses a mouse?" Don't make your cookies public! Oh! No! DDoS attack in progress - unfurl the umbrellas!

Report results show that mid-size companies are largely unprotected due to the fact that they lack the immense team resources, expensive products and expertise needed to protect against these increasing attacks, as the cybersecurity market has evolved mainly to serve large enterprises - and yet, the mid-market sector is getting hit by cyber attacks with a frequency and sophistication on par with large enterprises. Email malware attacks have increased 154% between 2020 and 2021, but only 1% of mid-size companies have email malware protection in place in 2021 - with 88% of that number having misconfigured the protection settings.

Web hosting giant GoDaddy on Monday disclosed a data breach that resulted in the unauthorized access of data belonging to a total of 1.2 million active and inactive customers, making it the third security incident to come to light since 2018. In a filing with the U.S. Securities and Exchange Commission, the world's largest domain registrar said that a malicious third-party managed to gain access to its Managed WordPress hosting environment on September 6 with the help of a compromised password, using it to obtain sensitive information pertaining to its customers.

Customers of several brands that resell GoDaddy Managed WordPress have also been caught up in the big breach, in which millions of emails, passwords and more were stolen. The GoDaddy breach affecting 1.2 million customers has widened - it turns out that various subsidiaries that resell GoDaddy Managed WordPress were also affected.

GoDaddy says the recently disclosed data breach affecting roughly 1.2 million customers has also hit multiple Managed WordPress services resellers. GoDaddy acquired these brands after buying web hosting and cloud services companies Host Europe Group in 2017 and Media Temple in 2013.

GoDaddy stated that default WordPress admin passwords, created when each account was opened, were accessed, too, though we're hoping that few, if any, active users of the system had left this password unchanged after setting up their WordPress presence. We're assuming, if the passwords had been salted-hashed-and-stretched, as you might expect, that GoDaddy would have reported the breach by saying so, given that properly-hashed passwords, once stolen, still need to be cracked by the attackers, and with well-chosen passwords and a decent hashing process, that process can take weeks, months or years.

GoDaddy, the popular internet domain registrar and web hosting company, has suffered a data breach that affected over a million of their Managed WordPress customers. For active customers: sFTP and database usernames and passwords.

Web-hosting giant GoDaddy has confirmed another data breach, this time affecting at least 1.2 million of its customers. On Monday, the world's largest domain registrar said in a public filing to the SEC that an "Unauthorized third party" managed to infiltrate its systems on Sept. 6 - and that the person(s) had continued access for almost two and a half months before GoDaddy noticed the breach on Nov. 17.

GoDaddy has been on the receiving end of a security breach that has affected the accounts of more than 1 million of its WordPress customers. After contacting law enforcement officials and investigating the incident with an IT forensics firm, GoDaddy found that the third party used a compromised password to access the provisioning system in its legacy code base for Managed WordPress.