18 nodes compromised, ~370 customers affected — Copy Fail / Dirty Frag [UPDATE 2: 10/05/2026 10:42]

A second Linux kernel local-privilege-escalation flaw — published 2026-05-07 by Hyunwoo Kim under the name Dirty Frag (CVE-2026-43284 and CVE-2026-43500) — landed eight days after the previous one (Copy Fail, CVE-2026-31431, disclosed 2026-04-29 by Theori). Both belong to the same kernel bug class as 2022's Dirty Pipe: a write into the Linux ... Read More »

10th May 2026
Bonus Storage: Day-One Delivery, Migration-Safe

Your earned bonus storage now lands at provisioning. Day one, full quota, no waiting. The bonus your account history has earned is computed from your tenure and payment record, then added to your base the moment your service is created. Stay with us a few years and your earned bonus can exceed your paid plan — the cap is 300%, so a 1 TB plan ... Read More »

8th May 2026
Traffic Limits: Fixed, Enhanced, Granularity [UPDATE 10/05/2026 09:39]

UPDATE 10/05/2026: We removed the scaling and linear decrease to 5Mbps for now as some of our services do promise 100Mbps Unlimited after traffic cap. First principles, if you are not deleting enough to add back at least 10%, you are not deleting enough. Full fleet update in progress to enforce all current limits and resource controls once ... Read More »

8th May 2026
Linux kernel security update — your service is protected, no action needed

A serious Linux kernel vulnerability ("copy fail") was publicly disclosed on April 29 by the security research team at Theori. The flaw lets any user with shell access escalate to root on a vulnerable system — exactly the kind of threat that matters most in shared-hosting environments like ours, where many customers run on the same kernel. We ... Read More »

1st May 2026
1 2 3