Identified - The linked repo is the public PoC and disclosure for Dirty Frag (a universal Linux local privilege escalation via page-cache corruption in xfrm-ESP and RxRPC paths). It affects most major distros with no upstream patches yet (as of May 2026), but has a simple module-blacklist mitigation.

https://github.com/V4bel/dirtyfrag/tree/master

*Quick Mitigation Reminder*

Run this on each affected system:

sh -c "printf 'install esp4 /bin/false\ninstall esp6 /bin/false\ninstall rxrpc /bin/false\n' > /etc/modprobe.d/dirtyfrag.conf; rmmod esp4 esp6 rxrpc 2>/dev/null; true"

Then reboot or drop caches. This breaks IPsec and RxRPC/AFS usage if you rely on them.

Watch for kernel updates from your distro.

May 08, 2026 - 08:22 SAST
Identified - We have been made aware of a phishing scam currently circulating, which falsely claims to be from our company. The fraudulent message asks users to update their card details.

Do not click on any links or provide any personal information in response to such messages.

Our company will never ask you to update your card details through unsolicited emails or messages.
We will only ever provide a link that takes you to your account login to update these details.

For any questions or concerns, please contact our billing or support team.

Apr 09, 2025 - 11:21 SAST
Network Infrastructure Operational
Web Hosting Operational
WordPress Hosting Operational
Email Only Hosting Operational
Email Filtering Services Operational
Site Builder Services Operational
Cloud Infrastructure Operational
Hosted PBX Operational
VPS Hosting Degraded Performance
Reseller Hosting Operational
Domains API & Reseller Panel Operational
Domains Website Operational
Website Operational
Payment Gateways Operational
External Applications Operational
Operational
Degraded Performance
Partial Outage
Major Outage
Maintenance
May 8, 2026

Unresolved incident: Dirty Frag Vulnerability – Secure Your VPS.

May 7, 2026

No incidents reported.

May 6, 2026

No incidents reported.

May 5, 2026

No incidents reported.

May 4, 2026

No incidents reported.

May 3, 2026

No incidents reported.

May 2, 2026

No incidents reported.

May 1, 2026

No incidents reported.

Apr 30, 2026

No incidents reported.

Apr 29, 2026
Resolved - This incident has been resolved.
Apr 29, 14:22 SAST
Monitoring - cPanel has released a patch for the recently identified authentication vulnerability, and we have applied it to all shared hosting servers and managed VPS environments. WHM, cPanel, and Webmail ports are now fully accessible on these systems.

Please note that these ports remain temporarily restricted on unmanaged Linux VPS servers. If your VPS is affected, a manual update may be required. You can follow the official cPanel guide here:

https://support.cpanel.net/hc/en-us/articles/40073787579671-Critical-Vulnerability-with-cPanel-WHM-Login-Authentication

We apologize for any inconvenience caused and thank you for your patience.

Apr 29, 00:34 SAST
Update - We are continuing to work on a fix for this issue.
Apr 28, 22:24 SAST
Update - We are continuing to work on a fix for this issue.
Apr 28, 22:07 SAST
Update - We are continuing to work on a fix for this issue.
Apr 28, 21:20 SAST
Identified - We are aware of a critical security vulnerability affecting cPanel/WHM login authentication method, as outlined in the official cPanel link below:

https://support.cpanel.net/hc/en-us/articles/40073787579671-Critical-Vulnerability-with-cPanel-WHM-Login-Authentication

Direct access to cPanel (port 2083), WHM (port 2087) and webmail (port 2096) will be unavailable from public networks until the exploit has been patched.

Services and websites remain fully operational.

We will continue to monitor the situation closely and will provide updates as necessary.

We apologize for any inconvenience caused and thank you for your patience and understanding.

Apr 28, 21:15 SAST
Resolved - This incident has been resolved.
Apr 29, 14:21 SAST
Investigating - We are currently aware of the mail related issues on cp60.domains.co.za and cp61.domains.co.za

The issue has appeared after the recent update from cPanel. They are currently logged into the server and investigating the issue.

We will post updates as soon as possible.

We apologize for any inconvenience caused and thank you for your patience and understanding.

Apr 29, 08:24 SAST
Apr 28, 2026
Apr 27, 2026

No incidents reported.

Apr 26, 2026

No incidents reported.

Apr 25, 2026

No incidents reported.

Apr 24, 2026

No incidents reported.