{"id":65726,"date":"2025-05-07T14:11:46","date_gmt":"2025-05-07T14:11:46","guid":{"rendered":"https:\/\/www.realvnc.com\/?post_type=blog&#038;p=65726"},"modified":"2026-04-13T10:44:58","modified_gmt":"2026-04-13T09:44:58","slug":"goto-security-breach","status":"publish","type":"blog","link":"https:\/\/www.realvnc.com\/en\/blog\/goto-security-breach\/","title":{"rendered":"Goto Security Breach: What the Recent Incident Says About the Remote Access Software Industry"},"content":{"rendered":"<h2 data-pm-slice=\"1 1 []\">The short story of the GoTo\/LastPass data breach<\/h2>\n<p>GoTo has recently announced that, according to their investigation, \u201ca threat actor exfiltrated encrypted backups from a third-party cloud storage service related to the following products: Central, Pro, join.me, Hamachi, and RemotelyAnywhere.\u201d GoTo CEO Paddy Srinivasan emphasized the company&#8217;s efforts to keep customers informed and secure following the incident.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/images.surferseo.art\/89cd393c-6f8c-47e5-bea9-b8e36c2381a2.jpeg\" \/><\/p>\n<p>A cyber threat actor has also extracted an encryption key for a segment of the encrypted backup data. Among the affected information could be \u201caccount usernames, salted and hashed passwords, a portion of multi-factor authentication (MFA) settings, as well as some product settings and licensing information.\u201d Following this GoTo security breach, their products have been thoroughly investigated to ensure their security and functionality during this period.<\/p>\n<p>GoTo&#8217;s production systems were not impacted beyond what was previously disclosed.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/images.surferseo.art\/24576493-ab98-462a-911d-32babadd011c.jpeg\" \/><\/p>\n<p>GoTo-owned company LastPass also recently announced that an incident in August 2022 was more serious than previously thought. The affected data included GoToMyPC encrypted databases. While initially saying no customer data was affected, <a class=\"css-1rn59kg\" href=\"https:\/\/blog.lastpass.com\/2022\/12\/notice-of-recent-security-incident\/\" target=\"_blank\" rel=\"noopener noreferrer\">LastPass admitted in December that customer data had been compromised<\/a>. The unauthorized party had accessed a third-party cloud storage service where LastPass was storing data, including account usernames, salted and hashed passwords. The affected customers&#8217; data may contain usernames and other sensitive information.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/cdn.pixabay.com\/photo\/2017\/02\/16\/08\/47\/castle-2070777_1280.jpg\" alt=\"\" \/><\/p>\n<p>The incident also impacted the multi-factor authentication (MFA) settings of a small subset of customers, particularly related to Rescue and GoToMyPC encrypted databases. Following this, GoTo has taken significant steps to safeguard account passwords and enhance its overall security measures. Part of this has been contacting affected customers directly to reassure them of encrypted backups and more robust authentication.<\/p>\n<p>Following several past security breaches, <a href=\"https:\/\/www.silicon.co.uk\/security\/cyberwar\/lastpass-separates-from-parent-after-security-incidents-561688\" target=\"_blank\" rel=\"noopener noreferrer\">LastPass officially separated from GoTo<\/a> in May 2024 to focus more on cybersecurity. This has ensured that it protects its clients&#8217; data with its enhanced identity management platform, ensuring that passwords will never be breached again.<\/p>\n<h2>What does the GoTo security breach tell you about data security?<\/h2>\n<p>There&#8217;s one essential takeaway from all the above: when security is not the priority, affected users are the ones who end up suffering. Digital trust and data security are essential to us here at RealVNC.\u00a0We believe any <a class=\"css-1rn59kg\" href=\"https:\/\/www.realvnc.com\/en\/discover\/remote-access\/\" target=\"_blank\" rel=\"noopener noreferrer\">remote access<\/a> provider, particularly a software provider, should take them very seriously. In reality, many companies don&#8217;t put their money where their mouth is regarding additional security. <a class=\"css-1rn59kg\" href=\"https:\/\/www.realvnc.com\/en\/blog\/importance-digital-trust-software-provider\/\" target=\"_blank\" rel=\"noopener noreferrer\">Digital trust<\/a> and data security are essential to us here at RealVNC.<\/p>\n<p>We build our product by putting <a class=\"css-1rn59kg\" href=\"https:\/\/www.realvnc.com\/en\/connect\/security\/\" target=\"_blank\" rel=\"noopener noreferrer\">security first<\/a>, adhering to our four security principles:<\/p>\n<ol>\n<li>You don&#8217;t have to trust RealVNC as a company to trust our software and services<\/li>\n<li>We do not record your sessions, and data cannot be decrypted now or in the future<\/li>\n<li>Every connection is treated as though it is made in a hostile environment<\/li>\n<li>The owner of the remote computer ultimately decides who can connect<\/li>\n<\/ol>\n<p>Every single connection is end-to-end encrypted at up to 256-bit AES. We also have <a class=\"css-1rn59kg\" href=\"https:\/\/help.realvnc.com\/hc\/en-us\/articles\/360002250077\" target=\"_blank\" rel=\"noopener noreferrer\">2FA (two-factor authentication<\/a>) available and strongly recommend its use.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.realvnc.com\/wp-content\/uploads\/2024\/03\/security-logos-circle.png\" alt=\"RealVNC security and compliance logos\" \/><\/p>\n<h2>RealVNC Connect can prove that it&#8217;s secure<\/h2>\n<p>We don&#8217;t just claim that we&#8217;re secure. Our <a href=\"https:\/\/www.realvnc.com\/en\/discover\/remote-desktop\/?lai_vid=OXgx5neBnClaw&amp;lai_sr=60-64&amp;lai_sl=h\" target=\"_blank\" rel=\"noopener noreferrer\">remote access solution<\/a> is the only one to have been audited by an independent security expert and given the all-clear. Namely, we&#8217;ve opened our doors to a comprehensive <a class=\"css-1rn59kg\" href=\"https:\/\/www.realvnc.com\/en\/blog\/cure53-security-audit-reaffirms-realvnc-strong-security-stance\/\" target=\"_blank\" rel=\"noopener noreferrer\">white-box security audit by Cure53<\/a>. This is a much more in-depth security review than the traditional annual penetration test, with the auditors getting full access to our source code, internal API documentation, and a direct communication line to the developers. We&#8217;re very proud of the results, with no critical issues found, which only reaffirms our strong security stance. We&#8217;ll continue to work hard to maintain the same high security standards.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/04\/unauthorized-access.jpg\" \/><\/p>\n<p>We&#8217;re also happy to announce that the Android version of RealVNC Server for Mobile is the <a class=\"css-1rn59kg\" href=\"https:\/\/www.realvnc.com\/en\/blog\/vnc-server-mobile-app-masa-validation\/\" target=\"_blank\" rel=\"noopener noreferrer\">first remote access app <\/a>to undertake the MASA process successfully. We undertook the process for our RealVNC Mobile Server app in November 2022, working together with NCC Group, an authorized MASA lab, and a key player in the security industry. Our application flew through this assessment and gained an outstanding result: a PASS in each area on the first run.<\/p>\n<p>RealVNC will continue to challenge the whole industry to take the same route of providing additional security for its products. We&#8217;ve done this at <a class=\"css-1rn59kg\" href=\"https:\/\/www.realvnc.com\/en\/blog\/came-for-ducks-stayed-for-talks-realvnc-infosecurity-europe-2022\/\" target=\"_blank\" rel=\"noopener noreferrer\">recent cybersecurity events<\/a> and will continue to do so in the future.<\/p>\n<blockquote><p><em>&#8220;At RealVNC, we operate from the standpoint that no company should ever take a vendor&#8217;s word for it when they claim their software is secure, which is why we chose to complete a white-box audit with a highly regarded security consultancy to prove it.&#8221;<\/em><\/p>\n<p>&#8211; Andrew Woodhouse, RealVNC Chief Information Officer<\/p><\/blockquote>\n<h2>What should you do next?<\/h2>\n<p>Check if your software (and especially remote access) provider can show you proof of its security. And don&#8217;t just take their word for it! Ask for proof in the form of a recent independent security audit. If they can&#8217;t do that, there are alternative options out there that comply with your security requirements.<\/p>\n<p>RealVNC Connect guarantees secure and reliable <a href=\"https:\/\/www.realvnc.com\/en\/connect\/\" target=\"_blank\" rel=\"noopener noreferrer\">remote access<\/a> for all. It integrates both RealVNC Viewer and Server into one unified desktop app. Its <a href=\"https:\/\/www.realvnc.com\/en\/blog\/realvnc-connect-v8-redesigned\/\" target=\"_blank\" rel=\"noopener noreferrer\">user-friendly interface<\/a> and features like file transfer, redesigned toolbar, chat, multi-monitor support, and session recording make it a valuable tool for all users within your organization.<\/p>\n<p>Our latest version also includes advanced features that your <a href=\"https:\/\/www.realvnc.com\/en\/blog\/helpdesk-in-realvnc-connect-v8\" target=\"_blank\" rel=\"noopener noreferrer\">help desk and IT teams<\/a> are sure to love. RealVNC Connect Version 8 features self-expiring session codes that expire and get replaced within two minutes, ensuring no persistent codes can be used for unauthorized access.\u00a0 In addition, with the tool, you will know who is connecting in, have invite-only access, and share your device with <a href=\"https:\/\/www.realvnc.com\/en\/blog\/code-connect-realvnc-connect-v8-share-access-retain-control\/\" target=\"_blank\" rel=\"noopener noreferrer\">Code Connect<\/a>. Ready to experience the new era of remote access? <a href=\"https:\/\/www.realvnc.com\/en\/connect\/download\" target=\"_blank\" rel=\"noopener noreferrer\">Try the latest version<\/a> of RealVNC Connect today!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The short story of the GoTo\/LastPass data breach GoTo has recently announced that, according to their investigation, \u201ca threat actor exfiltrated encrypted backups from a third-party cloud storage service related to the following products: Central, Pro, join.me, Hamachi, and RemotelyAnywhere.\u201d GoTo CEO Paddy Srinivasan emphasized the company&#8217;s efforts to keep customers informed and secure following &#8230; <a title=\"Goto Security Breach: What the Recent Incident Says About the Remote Access Software Industry\" class=\"read-more\" href=\"https:\/\/www.realvnc.com\/en\/blog\/goto-security-breach\/\" aria-label=\"Read more about Goto Security Breach: What the Recent Incident Says About the Remote Access Software Industry\">Read more<\/a><\/p>\n","protected":false},"author":16,"featured_media":0,"template":"","blog_category":[],"class_list":["post-65726","blog","type-blog","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Goto Security Breach: What the Recent Incident Says About the Remote Access Software Industry<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.realvnc.com\/en\/blog\/goto-security-breach\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Goto Security Breach: What the Recent Incident Says About the Remote Access Software Industry\" \/>\n<meta property=\"og:description\" content=\"The short story of the GoTo\/LastPass data breach GoTo has recently announced that, according to their investigation, \u201ca threat actor exfiltrated encrypted backups from a third-party cloud storage service related to the following products: Central, Pro, join.me, Hamachi, and RemotelyAnywhere.\u201d GoTo CEO Paddy Srinivasan emphasized the company&#8217;s efforts to keep customers informed and secure following ... Read more\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.realvnc.com\/en\/blog\/goto-security-breach\/\" \/>\n<meta property=\"og:site_name\" content=\"RealVNC\u00ae\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/realvnc\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-13T09:44:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/images.surferseo.art\/89cd393c-6f8c-47e5-bea9-b8e36c2381a2.jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@realvnc\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/goto-security-breach\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/goto-security-breach\\\/\"},\"author\":{\"name\":\"Bogdan Bele\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#\\\/schema\\\/person\\\/6fa9f449ba19409f0cd7235931f51987\"},\"headline\":\"Goto Security Breach: What the Recent Incident Says About the Remote Access Software Industry\",\"datePublished\":\"2025-05-07T14:11:46+00:00\",\"dateModified\":\"2026-04-13T09:44:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/goto-security-breach\\\/\"},\"wordCount\":984,\"publisher\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/goto-security-breach\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/images.surferseo.art\\\/89cd393c-6f8c-47e5-bea9-b8e36c2381a2.jpeg\",\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/goto-security-breach\\\/\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/goto-security-breach\\\/\",\"name\":\"Goto Security Breach: What the Recent Incident Says About the Remote Access Software Industry\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/goto-security-breach\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/goto-security-breach\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/images.surferseo.art\\\/89cd393c-6f8c-47e5-bea9-b8e36c2381a2.jpeg\",\"datePublished\":\"2025-05-07T14:11:46+00:00\",\"dateModified\":\"2026-04-13T09:44:58+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/goto-security-breach\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/goto-security-breach\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/goto-security-breach\\\/#primaryimage\",\"url\":\"https:\\\/\\\/images.surferseo.art\\\/89cd393c-6f8c-47e5-bea9-b8e36c2381a2.jpeg\",\"contentUrl\":\"https:\\\/\\\/images.surferseo.art\\\/89cd393c-6f8c-47e5-bea9-b8e36c2381a2.jpeg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/goto-security-breach\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blogs\",\"item\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Goto Security Breach: What the Recent Incident Says About the Remote Access Software Industry\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/\",\"name\":\"RealVNC\u00ae\",\"description\":\"The world&#039;s safest remote access software\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#organization\",\"name\":\"RealVNC\u00ae\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/realvnc-logo-blue.png\",\"contentUrl\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/realvnc-logo-blue.png\",\"width\":300,\"height\":41,\"caption\":\"RealVNC\u00ae\"},\"image\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/realvnc\",\"https:\\\/\\\/x.com\\\/realvnc\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/realvnc\\\/\",\"https:\\\/\\\/www.youtube.com\\\/RealVNCLtd\",\"https:\\\/\\\/en.wikipedia.org\\\/wiki\\\/RealVNC\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#\\\/schema\\\/person\\\/6fa9f449ba19409f0cd7235931f51987\",\"name\":\"Bogdan Bele\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/db953d23953822fd0e4cf9ec4b44b151a5712b3d00982d581e2c162042f75c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/db953d23953822fd0e4cf9ec4b44b151a5712b3d00982d581e2c162042f75c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/db953d23953822fd0e4cf9ec4b44b151a5712b3d00982d581e2c162042f75c3d?s=96&d=mm&r=g\",\"caption\":\"Bogdan Bele\"},\"description\":\"A journalist by formation and experience, and a content writer by trade. I\u2019ve been writing content, both online and offline, for more than 15 years. My focus has always been technology, but I\u2019ve also ventured into fields as diverse as music, football or news. I am RealVNC\u2019s in-house Digital Content Editor, so a lot of what you\u2019re reading on this blog is written by me. I also edit a lot of our content output. When I\u2019m not writing, editing or reading, you\u2019ll probably find me at a concert or watching a Chelsea FC game.\",\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/in\\\/bogdanbele\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Goto Security Breach: What the Recent Incident Says About the Remote Access Software Industry","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.realvnc.com\/en\/blog\/goto-security-breach\/","og_locale":"en_US","og_type":"article","og_title":"Goto Security Breach: What the Recent Incident Says About the Remote Access Software Industry","og_description":"The short story of the GoTo\/LastPass data breach GoTo has recently announced that, according to their investigation, \u201ca threat actor exfiltrated encrypted backups from a third-party cloud storage service related to the following products: Central, Pro, join.me, Hamachi, and RemotelyAnywhere.\u201d GoTo CEO Paddy Srinivasan emphasized the company&#8217;s efforts to keep customers informed and secure following ... Read more","og_url":"https:\/\/www.realvnc.com\/en\/blog\/goto-security-breach\/","og_site_name":"RealVNC\u00ae","article_publisher":"https:\/\/www.facebook.com\/realvnc","article_modified_time":"2026-04-13T09:44:58+00:00","og_image":[{"url":"https:\/\/images.surferseo.art\/89cd393c-6f8c-47e5-bea9-b8e36c2381a2.jpeg","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_site":"@realvnc","twitter_misc":{"Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.realvnc.com\/en\/blog\/goto-security-breach\/#article","isPartOf":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/goto-security-breach\/"},"author":{"name":"Bogdan Bele","@id":"https:\/\/www.realvnc.com\/en\/#\/schema\/person\/6fa9f449ba19409f0cd7235931f51987"},"headline":"Goto Security Breach: What the Recent Incident Says About the Remote Access Software Industry","datePublished":"2025-05-07T14:11:46+00:00","dateModified":"2026-04-13T09:44:58+00:00","mainEntityOfPage":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/goto-security-breach\/"},"wordCount":984,"publisher":{"@id":"https:\/\/www.realvnc.com\/en\/#organization"},"image":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/goto-security-breach\/#primaryimage"},"thumbnailUrl":"https:\/\/images.surferseo.art\/89cd393c-6f8c-47e5-bea9-b8e36c2381a2.jpeg","inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.realvnc.com\/en\/blog\/goto-security-breach\/","url":"https:\/\/www.realvnc.com\/en\/blog\/goto-security-breach\/","name":"Goto Security Breach: What the Recent Incident Says About the Remote Access Software Industry","isPartOf":{"@id":"https:\/\/www.realvnc.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/goto-security-breach\/#primaryimage"},"image":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/goto-security-breach\/#primaryimage"},"thumbnailUrl":"https:\/\/images.surferseo.art\/89cd393c-6f8c-47e5-bea9-b8e36c2381a2.jpeg","datePublished":"2025-05-07T14:11:46+00:00","dateModified":"2026-04-13T09:44:58+00:00","breadcrumb":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/goto-security-breach\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.realvnc.com\/en\/blog\/goto-security-breach\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.realvnc.com\/en\/blog\/goto-security-breach\/#primaryimage","url":"https:\/\/images.surferseo.art\/89cd393c-6f8c-47e5-bea9-b8e36c2381a2.jpeg","contentUrl":"https:\/\/images.surferseo.art\/89cd393c-6f8c-47e5-bea9-b8e36c2381a2.jpeg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.realvnc.com\/en\/blog\/goto-security-breach\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.realvnc.com\/en\/"},{"@type":"ListItem","position":2,"name":"Blogs","item":"https:\/\/www.realvnc.com\/en\/blog\/"},{"@type":"ListItem","position":3,"name":"Goto Security Breach: What the Recent Incident Says About the Remote Access Software Industry"}]},{"@type":"WebSite","@id":"https:\/\/www.realvnc.com\/en\/#website","url":"https:\/\/www.realvnc.com\/en\/","name":"RealVNC\u00ae","description":"The world&#039;s safest remote access software","publisher":{"@id":"https:\/\/www.realvnc.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.realvnc.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.realvnc.com\/en\/#organization","name":"RealVNC\u00ae","url":"https:\/\/www.realvnc.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.realvnc.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/05\/realvnc-logo-blue.png","contentUrl":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/05\/realvnc-logo-blue.png","width":300,"height":41,"caption":"RealVNC\u00ae"},"image":{"@id":"https:\/\/www.realvnc.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/realvnc","https:\/\/x.com\/realvnc","https:\/\/www.linkedin.com\/company\/realvnc\/","https:\/\/www.youtube.com\/RealVNCLtd","https:\/\/en.wikipedia.org\/wiki\/RealVNC"]},{"@type":"Person","@id":"https:\/\/www.realvnc.com\/en\/#\/schema\/person\/6fa9f449ba19409f0cd7235931f51987","name":"Bogdan Bele","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/db953d23953822fd0e4cf9ec4b44b151a5712b3d00982d581e2c162042f75c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/db953d23953822fd0e4cf9ec4b44b151a5712b3d00982d581e2c162042f75c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/db953d23953822fd0e4cf9ec4b44b151a5712b3d00982d581e2c162042f75c3d?s=96&d=mm&r=g","caption":"Bogdan Bele"},"description":"A journalist by formation and experience, and a content writer by trade. I\u2019ve been writing content, both online and offline, for more than 15 years. My focus has always been technology, but I\u2019ve also ventured into fields as diverse as music, football or news. I am RealVNC\u2019s in-house Digital Content Editor, so a lot of what you\u2019re reading on this blog is written by me. I also edit a lot of our content output. When I\u2019m not writing, editing or reading, you\u2019ll probably find me at a concert or watching a Chelsea FC game.","sameAs":["https:\/\/www.linkedin.com\/in\/bogdanbele\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/blog\/65726","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/blog"}],"about":[{"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/types\/blog"}],"author":[{"embeddable":true,"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/users\/16"}],"version-history":[{"count":1,"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/blog\/65726\/revisions"}],"predecessor-version":[{"id":89981,"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/blog\/65726\/revisions\/89981"}],"wp:attachment":[{"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/media?parent=65726"}],"wp:term":[{"taxonomy":"blog_category","embeddable":true,"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/blog_category?post=65726"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}