websites

',''); } } ?>

As a result of a vulnerability in the open-source development tool Git, about 332,000 websites were exposed to bad actors putting various organizations at risk of online attacks and unauthorized use of data. Out of these, 2,500 websites were linked to .gov domains in different countries.

The Git project leaders published an update in April to address a number of security flaws including a vulnerability that affected users on multi-user machines and another one affecting the Git uninstaller. However, it was found that the real issue lies with how the tools are being used. The vulnerability is caused by users not protecting their files with proper antivirus protocols, for example, leaving hidden .git files exposed to search engines. As open-source tools are the most basic of any program’s code, it is easy to tamper with them, if not secure. They can be easily hacked into and accessed by hackers, who can then download data from government agencies.

If hackers are able to gain access to the .git directory and the files contained within, they can download complete codebase history, including past code changes, comments, security keys, as well as sensitive remote paths containing confidential files and plain-text passwords. Some folders contain information like login credentials and API keys which can give bad actors access to even more sensitive information. Even gaining access to the source code of a website will enable hackers to spoof or find more vulnerabilities to execute an even more severe attack.

Some organizations tend to leave certain folders open for their specific purposes. However, there are still many other organizations that could be at the risk of an unintentional data breach.

It was previously found that another popular open-source application, Log4j, used by developers to record user activity and the behavior of applications, allows attackers to execute code remotely on a target computer, leading the attacker to steal data, install malware or take control. The Cyber Safety Review Board (CSRB) has labeled Log4j as an ‘endemic’ that will continue for another decade.

Git is a popular open-source application used for version control and website development. It has over 80 million active users. This reminder can be for organizations to update their antivirus protocols, especially when it comes to open-source programs. Organizations that are not following cybersecurity best practices are risking their safety and privacy.

Read next: Cybersecurity breaches continue to affect 32% of organizations in APAC, says Thales Data Threat Report

The post Government websites among those leaving Git files vulnerable to attack appeared first on Web Hosting | Cloud Computing | Datacenter | Domain News.

Read more

Filed under Web Hosting News by on #

As of January 2021, there were 4.66 billion active internet users (1) around the world – 59.5 per cent of the global population. This means, more than half of the world’s population is online. From buying products and services online to enrolling in online education courses, the internet has become an indispensable part of our lives. It is a boon for eCommerce sellers and other businesses who can contact their customers easily anytime and promote their products seamlessly by creating an online presence. One of the many reasons why there are over 1.5 billion websites (2) on the world wide web today. The growing importance of online presence drives the demand for web hosting services. This is a golden opportunity for web hosting providers. But to make full use of this opportunity, it is important to stay on top of web hosting trends. To help you with that, we came up with the top 7 web hosting trends in 2021 that you must bookmark now. Top 7 web hosting trends in 2021 1. The future is…
Read more

Filed under Web Hosting News by on #

The Dynamic Malware Analysis System by BitNinja The COVID-19 outbreak has speeded up the growth of Internet traffic. The number of websites is rising rapidly, and there are more eCommerce businesses than ever. Therefore, the shared web hosting companies are doing a roaring trade. But unfortunately, these are not the only numbers that are growing. Cyberattacks are also on the rise, and no business is safe nowadays. By now, cybercrime is one of the most frequently reported economic crimes in the organizations, making cybersecurity a C-suite and board-level concern. Today we will talk about how to detect and remove obfuscated malware from shared web hosting servers. What is Obfuscated Malware? The obfuscation technique is for hiding the real purpose of a program. The hacker creates a code that is not readable by humans, but the functionality behind it remains the same. So, when you run the program, it will behave like the encapsulated program it was designed for. How to analyze different…
Read more

Filed under Web Hosting News by on #

Plesk, the leading WebOps platform to build, secure and run applications, websites and hosting businesses that scale in the Cloud, has announced that it has appointed ZNet Technologies, the leading cloud services provider, as a global distributor of Plesk solutions. As part of the distributor agreement, ZNet Technologies will market and distribute a full range of solutions across the globe, via partners and support them to meet the growing demand for Plesk. Plesk offers an intuitive interface with key automation features for management of servers, web applications, databases and infrastructure tasks to provide a ready-to-code environment and strong security across all layers and operating systems. ZNet was already a Plesk distributor for India, but has customer presence and partner network comprising hosters, developers, system administrators, and service providers across the globe. ZNet has also developed a service delivery platform to deliver Plesk licenses with complete billing and…
Read more

Filed under Web Hosting News by on #

There are several factors to consider when choosing the perfect web hosting provider for your website. If you want users to visit your website, it will need to be securely hosted on the web. The best hosting providers offer a combination of speed, security, and functionality. Unfortunately, choosing the best hosting service can be challenging, especially if you are building a website for the very first time. To help you make the best choices, we have outlined the key steps to choose a hosting provider for your website. Decide the type of hosting you require First, take a moment to consider what you are looking to receive from your web hosting provider. Often, shared hosting is an excellent tool for small to medium sites. These solutions host several clients and websites onto the same server. On the other hand, virtual private servers, or VPS hosting delivers higher standards of flexibility to rapidly-growing sites. If your business website requires maximum security and server…
Read more

Filed under Web Hosting News by on #

As new ecommerce businesses are started daily and more and more existing companies adopt ecommerce to extend their customer base beyond just the people living close by, the question of which ecommerce platform to select becomes very important. Different platforms have different functionalities and integrate with different external services. Some must be self-hosted, while others offer integrated cloud hosting. Some do a better job of scaling to large businesses than others. Choosing the right platform can make a huge difference in the success of any business that sells over the Internet. No matter which ecommerce platform a company chooses, they all offer far more customization options and lower costs than selling on a marketplace like Amazon, although businesses with their own ecommerce storefronts must market their websites to attract customers. A variety of suggestions for how to start an ecommerce business are discussed in another one of our guides. In this article, you’ll learn…
Read more

Filed under Web Hosting News by on #