Redirecting you to

Resource Library

Looking for something? Search or browse our extensive library of resources

Start typing to search tags.

Advanced Filters

Filter by Tag

Clear Selection

Filter by Date Range

  • Learn More

    AI deepfakes are more dangerous than you think

    News Article from Sectigo

    News Article Aug 27, 2024

    With elections taking place around the world, most notably in the US in November, concerns grow around how AI deepfakes are becoming ubiquitous online.

  • Learn More

    ‘ASCII Smuggling’ attack exposes sensitive Microsoft Copilot data

    News Article from Sectigo

    News Article Aug 27, 2024

    A patched vulnerability in Microsoft 365 Copilot could expose sensitive data by running a novel AI-enabled technique known as "ASCII Smuggling" that uses special Unicode characters that mirror ASCII text, but are actually not visible to the user interface.

  • Listen Now
    Root Causes - A PKI & Security Podcast

    EPISODE 415

    Broadcast Date:
    August 27, 2024

    20 minutes

    Podcast Aug 27, 2024

    Root Causes 415: What Can I Do with These New FIPS PQC Standards?

    NIST recently released PQC algorithmic standards in FIPS-203, 204, and 205. We describe what is necessary for enterprises to begin using these algorithms.

  • Learn More

    Port of Seattle, Including Sea-Tac Airport, Disrupted by Cyber Attack

    News Article from Sectigo

    News Article Aug 26, 2024

    The Port of Seattle, which oversees the Seattle-Tacoma International Airport (Sea-Tac), recently confirmed that a possible cyberattack disrupted several critical systems, including websites and phone services, beginning on August 24, 2024. Initially, the incident was reported as system outages, but it was later acknowledged that a cyberattack could be the cause.

  • Learn More

    NIST Hands Off Post-Quantum Cryptography Work to Cyber Teams

    News Article from Sectigo

    News Article Aug 23, 2024

    No longer relegated to post-doctorate physics academia and sad Schrödinger's cat thought experiments, post-quantum computing remediation has arrived in the real world.

  • Listen Now
    Root Causes - A PKI & Security Podcast

    EPISODE 414

    Broadcast Date:
    August 23, 2024

    12 minutes

    Podcast Aug 23, 2024

    Root Causes 414: What Are the Revocation Periods for Public Certs?

    We detail mandatory revocation periods for leaf certificates and intermediates and explain when a 24-hour versus a 120-hour revocation deadline applies.

  • Learn More

    ‘ALBeast’ load balancer flaw may affect 15,000 Amazon Web Services apps

    News Article from Sectigo

    News Article Aug 21, 2024

    A critical configuration bug was observed that affects applications using the AWS Application Load Balancer (ALB) for authentication, a flaw dubbed "ALBeast" that could lead to unauthorized access to business resources, data breaches, and data exfiltration.

  • Learn More

    Unpacking The ALBeast Flaw

    News Article from Sectigo

    News Article Aug 21, 2024

    In the rapidly evolving landscape of cloud computing, security remains a top concern—one that continues to challenge both providers and users. The recent discovery of the ALBeast vulnerability, a critical flaw in AWS’s Application Load Balancer (ALB) authentication, serves as a stark reminder that even the most trusted cloud services are not immune to serious security risks.

  • Learn More

    Backdoor in RFID Cards for Offices, Hotels Can Lead to Instant Cloning

    News Article from Sectigo

    News Article Aug 21, 2024

    A hardware backdoor in millions of RFID smart cards used to open hotel rooms and offices doors and made by a Chinese company that enables bad actors to instantly clone the cards.

  • Learn More

    Think Log4j is a wrap? Think again.

    News Article from Sectigo

    News Article Aug 21, 2024

    Here's what you need to know about why the Log4j flaw, Log4Shell, remains a threat — and how to protect your organization with a modern software security approach.

  • Learn More

    Think Log4j is a wrap? Think again.

    News Article from Sectigo

    News Article Aug 21, 2024

    Three years after its discovery, Log4Shell remains one of the software flaws that are most used by threat actors, a new report released by Cato Networks has found. Thereport exposed a 61% quarter one to quarter two increase in the attempted use of the vulnerability in inbound network traffic and a 79% increase in use in WAN-bound traffic during the same period.

  • Learn More

    Backdoor in Mifare Smart Cards Could Open Doors Around the World

    News Article from Sectigo

    News Article Aug 21, 2024

    Security researchers have discovered a backdoor in a popular make of contactless key card, that could be exploited at scale to open hotel room and office doors across the globe.