Monday, February 17, 2025
HomeCyber Security NewsNamecheap To Offer Free Anonymous hosting, Domains for any anti-War Sites

Namecheap To Offer Free Anonymous hosting, Domains for any anti-War Sites

Published on

SIEM as a Service

Follow Us on Google News

Namecheap recently made a statement that they are restricting their services to Russian entities and asked them to migrate to another provider. In addition to that, Russian domains will become 403 forbidden domains starting from March 6th.

Namecheap posted a tweet that, “Effective immediately, we will begin offering free anonymous hosting and domain name registration to any anti-Putin anti-regime and protest websites for anyone located within Russia and Belarus. Please contact our support for details.”

The domain registrar has made a decision to give free hostings to anti-regime organizations. Entities that want to use its services are requested to contact them for support. Currently, the assistance is provided via an online ticketing system. They are working on providing Live support.

In the events of the invasion that Russia took against Ukraine, there have been several alterations beginning to happen all over the world.

The CEO of Namecheap is also aware of Russian’s anger at their decisions and said that they (Russians) have a lot of providers that can provide them with the same services.

Many of the top-level domains have started to reflect 403 forbidden errors. The company also said that they will provide necessary assistance on the migration.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Ransomware Gangs Encrypt Systems 17 Hours After Initial Infection

Ransomware gangs are accelerating their operations, with the average time-to-ransom (TTR), the period between...

Stealthy Malware in WordPress Sites Enables Remote Code Execution by Hackers

Security researchers have uncovered sophisticated malware targeting WordPress websites, leveraging hidden backdoors to enable...

Xerox Printer Vulnerability Exposes Authentication Data Via LDAP and SMB

A critical security vulnerability in Xerox’s Versalink C7025 Multifunction Printer (MFP) has been uncovered,...

New XCSSET Malware Targets macOS Users Through Infected Xcode Projects

Microsoft Threat Intelligence has identified a new variant of the XCSSET macOS malware, marking...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Ransomware Gangs Encrypt Systems 17 Hours After Initial Infection

Ransomware gangs are accelerating their operations, with the average time-to-ransom (TTR), the period between...

Stealthy Malware in WordPress Sites Enables Remote Code Execution by Hackers

Security researchers have uncovered sophisticated malware targeting WordPress websites, leveraging hidden backdoors to enable...

Xerox Printer Vulnerability Exposes Authentication Data Via LDAP and SMB

A critical security vulnerability in Xerox’s Versalink C7025 Multifunction Printer (MFP) has been uncovered,...