Company Details
godaddy
8,635
154,386
513
godaddy.com
0
GOD_3070288
In-progress

GoDaddy Company CyberSecurity Posture
godaddy.comAt GoDaddy, you’re the star when it comes to your craft—you’re the real deal. But being an entrepreneur means juggling it all: online marketing, digital ads, website building—pretty much everything! That’s why we created GoDaddy Airo for small business owners—designed to help you conquer it all while growing your online business at AI speed. Business dreamers can go from “no clue” to “wow, I did it!” in minutes with Airo—the intelligent experience that can whip up social posts, a classy logo, or a full-blown website out of thin air—powered by AI. 20+ million customers around the globe are convincing the world (and themselves) that they’re top dog entrepreneurs with GoDaddy, and they’re crushing it. With GoDaddy Airo and your vision – It’s like you know what you’re doing 😎
Company Details
godaddy
8,635
154,386
513
godaddy.com
0
GOD_3070288
In-progress
Between 700 and 749

GoDaddy Global Score (TPRM)XXXX

Description: The California Office of the Attorney General reported on May 17, 2023, that GoDaddy.com LLC experienced a data breach that occurred on October 16, 2019. The breach involved unauthorized remote access to a virtual private server (VPS) due to malware that captured Secure Shell (SSH) passwords.
Description: GoDaddy, a provider of web hosting services, reported that malware and source code had been stolen from its servers. Threat actors have infiltrated the organization's cPanel shared hosting environment. Although the company is unable to pinpoint the exact moment of the initial penetration, it is currently looking into the breach to ascertain the incident's underlying cause. Random client websites might occasionally be redirected to dangerous websites by the malware that had been installed on the company's computer systems. The organization claimed that the attacks haven't affected their operations or business, but that it believes it was the target of a sophisticated threat actor's strike.
Description: GoDaddy reported the compromising of 28,000 of its customers' web hosting accounts. One of its primary domain names is hosted by "GoDaddy," who inadvertently gave a malicious actor control of the account and site. As a result, the actor was able to manipulate several internal email accounts by altering DNS data. After some time had passed, the hostile actor was able to access document storage and compromise some of their infrastructure. Unauthorized changes were made to certain of the domain registration records' settings at GoDaddy, temporarily rerouting the site's email and web traffic. Although it appears that no emails, passwords, or other sensitive information was obtained, the business advised changing the password and turning on 2FA security.
Description: The California Attorney General reported a data breach involving GoDaddy on November 17, 2021. The breach occurred on or about September 6, 2021, when an unauthorized third party accessed customer authentication information, including customer numbers, email addresses, and login credentials. The number of individuals affected is currently unknown.
Description: Hackers are exploiting a critical vulnerability in the Roundcube webmail application, which is widely used by hosting providers like GoDaddy. The vulnerability, CVE-2025-49113, allows remote code execution and has a severity score of 9.9 out of 10. This vulnerability has been present for over a decade and impacts versions 1.1.0 through 1.6.10. Despite a patch being released, attackers have reverse-engineered the fix and are selling exploits on hacker forums. The wide use of Roundcube, including by government and academic institutions, makes the attack surface significant. The vulnerability can lead to data breaches and significant impact on organizations using the application.


GoDaddy has 11.11% more incidents than the average of same-industry companies with at least one recorded incident.
GoDaddy has 28.21% more incidents than the average of all companies with at least one recorded incident.
GoDaddy reported 1 incidents this year: 0 cyber attacks, 0 ransomware, 1 vulnerabilities, 0 data breaches, compared to industry peers with at least 1 incident.
GoDaddy cyber incidents detection timeline including parent company and subsidiaries

At GoDaddy, you’re the star when it comes to your craft—you’re the real deal. But being an entrepreneur means juggling it all: online marketing, digital ads, website building—pretty much everything! That’s why we created GoDaddy Airo for small business owners—designed to help you conquer it all while growing your online business at AI speed. Business dreamers can go from “no clue” to “wow, I did it!” in minutes with Airo—the intelligent experience that can whip up social posts, a classy logo, or a full-blown website out of thin air—powered by AI. 20+ million customers around the globe are convincing the world (and themselves) that they’re top dog entrepreneurs with GoDaddy, and they’re crushing it. With GoDaddy Airo and your vision – It’s like you know what you’re doing 😎


Do the can't be done. At Peraton, we're at the forefront of delivering the next big thing every day. We're the partner of choice to help solve some of the world's most daunting challenges, delivering bold, new solutions to keep people around the world safer and more secure. How do we do it? By thi
Thirteen-time Webby award-winning Freelancer is the world’s largest freelancing and crowdsourcing marketplace by total number of users and projects posted. More than 80 million registered users have posted over 25 million projects and contests to date in over 3,000 areas as diverse as website develo

At Times Internet, we create premium digital products that simplify and enhance the lives of millions. As India’s largest digital products company, we have a significant presence across a wide range of categories, including News, Sports, Fintech, and Enterprise solutions. Our portfolio features mar
Launched in May 2003, Taobao Marketplace (www.taobao.com) is the online shopping destination of choice for Chinese consumers looking for wide selection, value and convenience. Shoppers choose from a wide range of products and services on Taobao Marketplace, which features hundreds of millions of pro
Sohu.com Inc. (NASDAQ: SOHU) is China's premier online brand and indispensable to the daily life of millions of Chinese, providing a network of web properties and community based/web 2.0 products which offer the vast Sohu user community a broad array of choices regarding information, entertainment a
Jumia (NYSE :JMIA) is a leading e-commerce platform in Africa. It is built around a marketplace, Jumia Logistics, and JumiaPay. The marketplace helps millions of consumers and sellers to connect and transact. Jumia Logistics enables the delivery of millions of packages through our network of local p

We are a technology company that unlocks access to energy for the benefit of all. As innovators, that’s been our mission for nearly a century. Today, we face a global imperative to create a future with more energy, but less carbon. Our diverse, innovative change makers are focused on going further i
Meesho is India’s fastest growing internet commerce company. We want to make eCommerce accessible to all. Our vision is to enable 100 million small businesses in India, including individual entrepreneurs, to succeed online. Our mission is to democratise internet commerce by bringing a range of produ

At Myntra, we don’t just follow fashion - we define it. As India's leading fashion, lifestyle, and beauty destination, we bring together the best of style, technology, and innovation to create a seamless shopping experience for our customers. With a commitment to empowering self-expression, we cura
.png)
For Adama Fall (https://apo-opa.co/4oNInCB), football is more than a sport — it's a platform. With roots in Senegal and a master's degree in...
For Adama Fall, football is more than a sport - it's a platform. With roots in Senegal and a master's degree in Cybersecurity underway at...
Adama Builds With GoDaddy Airo. SINGAPORE, Nov 11, 2025 - (ACN Newswire) - For Adama Fall, football is more than a sport — it's a platform.
IAPP Cybersecurity Law Center Managing Director Jim Dempsey analyzes several cybersecurity-related enforcement actions taken by the U.S....
The Audit and Finance Committee receives regular reports from GoDaddy's Chief Information Security Officer (CISO) regarding the state of the...
Threat Intel exposes a hidden alliance between major cybercrime groups like VexTrio and seemingly legitimate AdTech firms such as Los Pollos, Partners House,...
Popular domain registrar and web hosting company GoDaddy was slapped with an FTC order mandating a robust information security program for...
COMMENTARY: The FTC's finalized order against GoDaddy last week marks a strategic breakpoint in cybersecurity oversight.
The US Federal and Trade Commission (FTC) has outlined almost a dozen requirements which hosting provider GoDaddy must fulfill in order to settle the charges...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of GoDaddy is http://www.godaddy.com.
According to Rankiteo, GoDaddy’s AI-generated cybersecurity score is 725, reflecting their Moderate security posture.
According to Rankiteo, GoDaddy currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, GoDaddy is not certified under SOC 2 Type 1.
According to Rankiteo, GoDaddy does not hold a SOC 2 Type 2 certification.
According to Rankiteo, GoDaddy is not listed as GDPR compliant.
According to Rankiteo, GoDaddy does not currently maintain PCI DSS compliance.
According to Rankiteo, GoDaddy is not compliant with HIPAA regulations.
According to Rankiteo,GoDaddy is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
GoDaddy operates primarily in the Technology, Information and Internet industry.
GoDaddy employs approximately 8,635 people worldwide.
GoDaddy presently has no subsidiaries across any sectors.
GoDaddy’s official LinkedIn profile has approximately 154,386 followers.
GoDaddy is classified under the NAICS code 513, which corresponds to Others.
Yes, GoDaddy has an official profile on Crunchbase, which can be accessed here: https://www.crunchbase.com/organization/godaddy.
Yes, GoDaddy maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/godaddy.
As of December 23, 2025, Rankiteo reports that GoDaddy has experienced 5 cybersecurity incidents.
GoDaddy has an estimated 13,279 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Vulnerability and Breach.
Detection and Response: The company detects and responds to cybersecurity incidents through an remediation measures with password change, enable 2fa security..
Title: GoDaddy Malware and Source Code Theft
Description: GoDaddy, a provider of web hosting services, reported that malware and source code had been stolen from its servers. Threat actors have infiltrated the organization's cPanel shared hosting environment. Although the company is unable to pinpoint the exact moment of the initial penetration, it is currently looking into the breach to ascertain the incident's underlying cause. Random client websites might occasionally be redirected to dangerous websites by the malware that had been installed on the company's computer systems. The organization claimed that the attacks haven't affected their operations or business, but that it believes it was the target of a sophisticated threat actor's strike.
Type: Malware and Source Code Theft
Attack Vector: Malware installed on the company's computer systems
Threat Actor: Sophisticated threat actor
Title: Exploitation of CVE-2025-49113 in Roundcube Webmail
Description: Hackers are likely starting to exploit CVE-2025-49113, a critical vulnerability in the widely used Roundcube open-source webmail application that allows remote execution. The security issue has been present in Roundcube for over a decade and impacts versions of Roundcube webmail 1.1.0 through 1.6.10. It received a patch on June 1st. It took attackers just a couple of days to reverse engineer the fix, weaponize the vulnerability, and start selling a working exploit on at least one hacker forum.
Date Detected: 2025-06-01
Type: Remote Code Execution (RCE)
Attack Vector: Exploiting CVE-2025-49113
Vulnerability Exploited: CVE-2025-49113
Motivation: Financial gain through selling exploits
Title: GoDaddy Data Breach
Description: The California Attorney General reported a data breach involving GoDaddy on November 17, 2021. The breach occurred on or about September 6, 2021, when an unauthorized third party accessed customer authentication information, including customer numbers, email addresses, and login credentials. The number of individuals affected is currently unknown.
Date Detected: 2021-11-17
Date Publicly Disclosed: 2021-11-17
Type: Data Breach
Attack Vector: Unauthorized Access
Threat Actor: Unauthorized Third Party
Title: GoDaddy Data Breach
Description: Unauthorized remote access to a virtual private server (VPS) due to malware that captured Secure Shell (SSH) passwords.
Date Detected: 2023-05-17
Date Publicly Disclosed: 2023-05-17
Type: Data Breach
Attack Vector: Malware
Vulnerability Exploited: SSH password capture
Common Attack Types: The most common types of attacks the company has faced is Breach.
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Compromised Account Credentials, Lack of sanitization of the $_GET['_from'] parameter and VPS.

Data Compromised: Malware, Source code
Systems Affected: cPanel shared hosting environment

Systems Affected: Roundcube webmail versions 1.1.0 through 1.6.10

Data Compromised: Customer numbers, Email addresses, Login credentials

Systems Affected: VPS
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Document Storage, DNS Data, Malware, Source Code, , Customer Numbers, Email Addresses, Login Credentials and .

Entity Name: GoDaddy
Entity Type: Web Hosting Service Provider
Industry: Technology

Entity Name: Roundcube
Entity Type: Software
Industry: Webmail
Location: Global

Entity Name: GoDaddy.com LLC
Entity Type: Company
Industry: Web Hosting

Type of Data Compromised: Malware, Source code

Type of Data Compromised: Customer numbers, Email addresses, Login credentials
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Password Change, Enable 2FA Security, .

Source: California Office of the Attorney General
Date Accessed: 2023-05-17
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Kirill FirsovDate Accessed: 2025-06-01, and Source: California Attorney GeneralDate Accessed: 2021-11-17, and Source: California Office of the Attorney GeneralDate Accessed: 2023-05-17.

Investigation Status: Investigating

Entry Point: Lack of sanitization of the $_GET['_from'] parameter

Entry Point: VPS

Root Causes: Lack of sanitization of the $_GET['_from'] parameter leading to PHP Object deserialization

Root Causes: Malware capturing SSH passwords
Last Attacking Group: The attacking group in the last incident were an Unknown Malicious Actor, Sophisticated threat actor and Unauthorized Third Party.
Most Recent Incident Detected: The most recent incident detected was on 2025-06-01.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2023-05-17.
Most Significant Data Compromised: The most significant data compromised in an incident were Document Storage, DNS Data, Malware, Source Code, , Customer Numbers, Email Addresses, Login Credentials and .
Most Significant System Affected: The most significant system affected in an incident was cPanel shared hosting environment and Roundcube webmail versions 1.1.0 through 1.6.10 and VPS.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Malware, Document Storage, DNS Data, Email Addresses, Login Credentials, Customer Numbers and Source Code.
Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Change Passwords and Enable 2FA Security.
Most Recent Source: The most recent source of information about an incident are Kirill Firsov, California Office of the Attorney General and California Attorney General.
Current Status of Most Recent Investigation: The current status of the most recent investigation is Investigating.
Most Recent Entry Point: The most recent entry point used by an initial access broker were an Compromised Account Credentials, Lack of sanitization of the $_GET['_from'] parameter and VPS.
Most Significant Root Cause: The most significant root cause identified in post-incident analysis was Lack of sanitization of the $_GET['_from'] parameter leading to PHP Object deserialization, Malware capturing SSH passwords.
.png)
Marshmallow is a lightweight library for converting complex objects to and from simple Python datatypes. In versions from 3.0.0rc1 to before 3.26.2 and from 4.0.0 to before 4.1.2, Schema.load(data, many=True) is vulnerable to denial of service attacks. A moderately sized request can consume a disproportionate amount of CPU time. This issue has been patched in version 3.26.2 and 4.1.2.
KEDA is a Kubernetes-based Event Driven Autoscaling component. Prior to versions 2.17.3 and 2.18.3, an Arbitrary File Read vulnerability has been identified in KEDA, potentially affecting any KEDA resource that uses TriggerAuthentication to configure HashiCorp Vault authentication. The vulnerability stems from an incorrect or insufficient path validation when loading the Service Account Token specified in spec.hashiCorpVault.credential.serviceAccount. An attacker with permissions to create or modify a TriggerAuthentication resource can exfiltrate the content of any file from the node's filesystem (where the KEDA pod resides) by directing the file's content to a server under their control, as part of the Vault authentication request. The potential impact includes the exfiltration of sensitive system information, such as secrets, keys, or the content of files like /etc/passwd. This issue has been patched in versions 2.17.3 and 2.18.3.
Fedify is a TypeScript library for building federated server apps powered by ActivityPub. Prior to versions 1.6.13, 1.7.14, 1.8.15, and 1.9.2, a Regular Expression Denial of Service (ReDoS) vulnerability exists in Fedify's document loader. The HTML parsing regex at packages/fedify/src/runtime/docloader.ts:259 contains nested quantifiers that cause catastrophic backtracking when processing maliciously crafted HTML responses. This issue has been patched in versions 1.6.13, 1.7.14, 1.8.15, and 1.9.2.
Authenticated Remote Code Execution (RCE) in PluXml CMS 5.8.22 allows an attacker with administrator panel access to inject a malicious PHP webshell into a theme file (e.g., home.php).
An issue was discovered in Xiongmai XM530 IP cameras on firmware V5.00.R02.000807D8.10010.346624.S.ONVIF 21.06. The GetStreamUri exposes RTSP URIs containing hardcoded credentials enabling direct unauthorized video stream access.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.