-
Listen Now
EPISODE 323
Broadcast Date:
August 3, 202312 minutes
Podcast Aug 03, 2023Root Causes 323: Update on Microsoft Key Compromise
In this follow up to our episode 320, we explain Microsoft's mitigation and new understanding that shows its impact to be broader than originally thought.
-
Listen Now
EPISODE 320
Broadcast Date:
July 24, 202311 minutes
Podcast Jul 24, 2023Root Causes 320: Microsoft-signed Root Kit Attack
A new root kit attack in the wild is code signed by a Microsoft certificate. We explain kernel-level attacks and how this attack occurred.
-
Listen Now
EPISODE 307
Broadcast Date:
May 31, 202314 minutes
Podcast May 31, 2023Root Causes 307: OT Red Teaming Leads to Malware Attack
In this episode we describe how tools from operational technology red team exercises are being repurposed for malware attacks.
-
Listen Now
EPISODE 285
Broadcast Date:
March 14, 202316 minutes
Podcast Mar 14, 2023Root Causes 285: Can ChatGPT Write Malware?
We examine the suitability of ChatGPT as a malware-writing tool and possible future directions for AI in software creation.
-
Learn More
5 Common Types of Website Attacks
A Blog Post from Sectigo
Blog Post Dec 08, 2021Every day, hackers around the world are scanning the Web for vulnerable websites to target - and yours could be next.
-
Learn More
How Sectigo Web Security Brings Unified Protection to Web-Facing SMBs
A News Article from Sectigo
News Article Nov 09, 2020eWEEK SECURITY PRODUCT ANALYSIS: As cybersecurity becomes an essential function for connected businesses, mSMBs (micro, small and medium businesses) are still struggling to protect their digital assets. Sectigo aims to lessen this burden with an integrated platform approach.
-
Learn More
What Happens When I Visit a Malicious Website?
A Blog Post from Sectigo
Blog Post Nov 05, 2020We spend every day online: conducting business, browsing Facebook, searching for new information. It’s become so commonplace that we often forget just how dangerous the internet can be for users.
-
Learn More
What Is the Difference Between a Threat, a Vulnerability, and a Risk?
A Blog Post from Sectigo
Blog Post Oct 26, 2020Those who don’t quite know the nuts and bolts of cybersecurity might use certain terms interchangeably. Logically, it makes sense in some cases. For example, a “vulnerability” sounds a lot like a “risk.” But in web security terms, they are not the same thing.
-
Learn More
What Are the Signs Your Website Has Malware?
A Blog Post from Sectigo
Blog Post Oct 22, 2020If your business depends on your online presence, then you are probably aware of the possibility of being hacked. Every day, tens of thousands of websites are hacked – malware is installed, sites are taken down, and businesses can be ruined. It’s the last thing you want to happen to your website because it can create an ongoing nightmare. For any online business, website security has to be a priority.
-
Learn More
4 Reasons Why Website Security Is Important
A Blog Post from Sectigo
Blog Post Oct 20, 2020 -
Learn More
How Can I Prevent Malware in My Website URLs?
A Blog Post from Sectigo
Blog Post Oct 12, 2020Cybercriminals continue to find new, sneaky ways of attacking users. Why? Because it’s lucrative. The more successful attacks they can execute, the more money they can make.
-
Learn More
Tips to Remember During Cybersecurity Awareness Month
A Blog Post from Sectigo
Blog Post Oct 07, 2020October is upon us, and that means the beginning of another Cybersecurity Awareness Month. To say that 2020 has been an interesting year would be a vast understatement, and cybersecurity professionals have had to face down new and unexpected challenges like the widespread shift to remote work amid the COVID-19 pandemic.