Let's Encrypt replaces its root certificate hierarchy on May 13, closes client authentication support permanently on July 8, and hosting operators have less than four weeks to verify their renewal automation handles the transition.
Category: Security
The 3-2-1 backup rule was designed for hardware failure and accidental deletion, not for an attacker who has your credentials and can authenticate to your backup console before triggering ransomware.
The European Commission confirmed attackers accessed its AWS-hosted Europa.eu infrastructure and took data. AWS says its platform was not the issue, the customer account configuration was.
As AI crawler traffic surges, hosting providers that give customers control are turning bot management into a competitive advantage.
China's amended Cybersecurity Law, Hong Kong's first critical infrastructure statute, and Singapore's expanded compliance framework have all taken effect. For hosting businesses operating in the region, the compliance cost of inaction is now measured in millions.
High-profile breaches in South Korea, a near-universal shift toward outsourced security operations in Vietnam, and an evolving ransomware threat profile are defining the security reality for Asian hosting providers this quarter.
Security doesn’t stand still, and neither should the hosting industry. Welcome to the February 2026 WebHosting.Today Monthly Security Update, created in partnership with our trusted...
A community-led forensic investigation links the attacks to a reported breach of 21 million records from PrestaShop’s own Addons Marketplace. PrestaShop has not confirmed or...