Identified - We are currently experiencing an Extremely Massive DDoS attack (over 100Gbps) which is impacting all services on our platforms.
Our technicians are actively working on measures to try and mitigate the massive DDoS attack.

We will provide updates as soon as possible. We appreciate your patience with this matter.

May 15, 2026 - 20:56 SAST
Identified - We have been made aware of a phishing scam currently circulating, which falsely claims to be from our company. The fraudulent message asks users to update their card details.

Do not click on any links or provide any personal information in response to such messages.

Our company will never ask you to update your card details through unsolicited emails or messages.
We will only ever provide a link that takes you to your account login to update these details.

For any questions or concerns, please contact our billing or support team.

Apr 09, 2025 - 11:21 SAST
Network Infrastructure Major Outage
Web Hosting Major Outage
WordPress Hosting Major Outage
Email Only Hosting Major Outage
Email Filtering Services Major Outage
Site Builder Services Major Outage
Cloud Infrastructure Major Outage
Hosted PBX Operational
VPS Hosting Operational
Reseller Hosting Major Outage
Domains API & Reseller Panel Operational
Domains Website Operational
Website Operational
Payment Gateways Operational
External Applications Operational
Operational
Degraded Performance
Partial Outage
Major Outage
Maintenance
May 15, 2026
Resolved - This incident has been resolved.
May 15, 21:32 SAST
Identified - The linked repo is the public PoC and disclosure for Dirty Frag (a universal Linux local privilege escalation via page-cache corruption in xfrm-ESP and RxRPC paths). It affects most major distros with no upstream patches yet (as of May 2026), but has a simple module-blacklist mitigation.

https://github.com/V4bel/dirtyfrag/tree/master

*Quick Mitigation Reminder*

Run this on each affected system:

sh -c "printf 'install esp4 /bin/false\ninstall esp6 /bin/false\ninstall rxrpc /bin/false\n' > /etc/modprobe.d/dirtyfrag.conf; rmmod esp4 esp6 rxrpc 2>/dev/null; true"

Then reboot or drop caches. This breaks IPsec and RxRPC/AFS usage if you rely on them.

Watch for kernel updates from your distro.

May 8, 08:22 SAST
May 14, 2026

No incidents reported.

May 13, 2026

No incidents reported.

May 12, 2026

No incidents reported.

May 11, 2026

No incidents reported.

May 10, 2026

No incidents reported.

May 9, 2026

No incidents reported.

May 8, 2026
May 7, 2026

No incidents reported.

May 6, 2026

No incidents reported.

May 5, 2026

No incidents reported.

May 4, 2026

No incidents reported.

May 3, 2026

No incidents reported.

May 2, 2026

No incidents reported.

May 1, 2026

No incidents reported.