![]() ![]() Rest assured that credit card and other payment data are not stored on our servers at all and were not vulnerable in this incident.Īccording to the company, it has already begun an investigation into the unauthorized access and that the method used to gain entry to Plex’s servers has been “addressed,” though it’s not clear whether the method was due to unpatched software, a zero-day exploit, or something more fundamental, like an internal breach of security. Even though all account passwords that could have been accessed were hashed and secured in accordance with best practices, out of an abundance of caution we are requiring all Plex accounts to have their password reset. We immediately began an investigation and it does appear that a third-party was able to access a limited subset of data that includes emails, usernames, and encrypted passwords. Yesterday, we discovered suspicious activity on one of our databases. In the email that was sent out, Plex management wrote: This will be required on all Plex client software as well as any Plex servers that folks may be running to manage their media. The company believes that user emails, usernames, and encrypted passwords were accessed and so it’s now taking the precautionary step of requiring that all of its customers reset their passwords. ![]() On August 24, Plex sent an email to its users warning them that it had detected suspicious activity on its servers. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |