Scroll Top

Blog

Web Hosting Security News, Data Breach Incidents and breaking stories

Perl logo
30 Dec: Perl Function Integer / Heap Overflows

Perl is a high-level programming language with roots in C, sed, awk and shell scripting. Perl is good at handling processes and files, and is especially good at handling text. Perl’s hallmarks are practicality and efficiency. While it is used to do a lot of different things, Perl’s most…

Sectigo logo
30 Dec: Comodo rebrands to Sectigo

Comodo CA, the world’s largest commercial Certificate Authority and a leader in web security solutions, announced today that the company is rebranding to Sectigo. This was a decision that has been in the works for a while now and stems from the acquisition of the Comodo Certificate Authority by…

woktron-blog-icon
28 Mar: Woktron invites visitors to explore new website

Woktron Web Hosting is inviting visitors to explore its new website and hosting products. The new website has been redesigned to provide a clean and uncluttered appearance with improved functionality and enhanced rich content focused on our Company’s mission to provide the world’s finest web hosting, dedicated hosting and…

blog_exim
25 Nov: Critical Exim Security Vulnerability

A remote code execution vulnerability has been reported in Exim, with immediate public disclosure (we were given no private notice). A tentative patch exists but has not yet been confirmed. Exim is a widely used mail transfer agent used on Unix-like operating systems.

blog_mongodb
08 Sep: MongoDB ransomware attacks

Ransom attacks on MongoDB databases reemerged last week when three new groups of hackers hijacked around 26,000 servers containing MongoDB databases and demanded victims to pay 0.2 BTC (currently around $650) to have the databases restored.

blog_gnupg
07 Jul: libgcrypt vulnerability patched

Researchers from universities in Adelaide, Eindhoven, Chicago, Maryland and Pennsylvania have published a paper describing how they used a local side-channel attack to break the Libgcrypt encryption library. The exploit could be used to recover a RSA-1024 key.

Subscribe to our hosting and security newsletter

Please take a few seconds and enter your e-mail address below in order to subscribe to our newsletter. You will receive an email to confirm your subscription.

Server Management

By finding a trusted server management provider you get to focus on what you do best, running and growing your business. You don’t have to worry about staying current with the latest trends in technology, you don’t need to keep up with the latest security issues, you get the luxury of time.

 

Our duties include server maintenance, optimization, security, monitoring and initial server setup tasks.

 

only €34.95 / month

Privacy Preferences
When you visit our website, it may store information through your browser from specific services, usually in form of cookies. Here you can change your privacy preferences. Please note that blocking some types of cookies may impact your experience on our website and the services we offer.