Redirecting you to

Resource Library

Looking for something? Search or browse our extensive library of resources

Start typing to search tags.

Advanced Filters

Filter by Tag

Clear Selection

Filter by Date Range

  • Learn More

    Think Log4j is a wrap? Think again.

    News Article from Sectigo

    News Article Aug 21, 2024

    Three years after its discovery, Log4Shell remains one of the software flaws that are most used by threat actors, a new report released by Cato Networks has found. Thereport exposed a 61% quarter one to quarter two increase in the attempted use of the vulnerability in inbound network traffic and a 79% increase in use in WAN-bound traffic during the same period.

  • Learn More

    Backdoor in Mifare Smart Cards Could Open Doors Around the World

    News Article from Sectigo

    News Article Aug 21, 2024

    Security researchers have discovered a backdoor in a popular make of contactless key card, that could be exploited at scale to open hotel room and office doors across the globe.

  • Learn More

    Multi-Domain vs Wildcard SSL - Differences and Use Cases

    Blog Post from Sectigo

    Blog Post Aug 20, 2024

    Digital certificates take many forms but they share the same primary goal: to authenticate a website or server's identity.

  • Learn More

    Flaws in Microsoft Apps for MacOS Threaten App Permission Bypass

    News Article from Sectigo

    News Article Aug 20, 2024

    SC Media reports that Microsoft Outlook, Teams, Word, Excel, PowerPoint, and OneNote for macOS were impacted by eight security flaws, which could be utilized to evade available app permissions in the operating system even without further user verification.

  • Learn More

    NIST Releases First Set of Finalized Post-Quantum Encryption Algorithms

    News Article from Sectigo

    News Article Aug 19, 2024

    The U.S. Department of Commerce’s National Institute of Standards and Technology (NIST) has finalized its principal set of defensive post-quantum encryption algorithms, bringing some clarity to the process of preparing for the near future’s likely greatest cyber threat.

  • Learn More

    Bugs in Microsoft apps for macOS could give privileges to attackers

    News Article from Sectigo

    News Article Aug 19, 2024

    Eight vulnerabilities in six leading Microsoft applications for macOS — including Outlook, Teams, PowerPoint, OneNote, Excel and Word — can let attackers bypass the operating system’s existing app permissions without prompting a user for any additional verification.

  • Learn More

    Multiple Microsoft Apps for macOS Vulnerable to Library Injection Attacks

    News Article from Sectigo

    News Article Aug 19, 2024

    Widely used Microsoft apps for macOS are vulnerable to library injection attacks that let adversaries use the applications' entitlements to bypass macOS's strict permission-based security model and controls.

  • Learn More

    As Malware Embraces Rust, a New Effort Emerges to Fight Back

    News Article from Sectigo

    News Article Aug 16, 2024

    In line with the cat-and-mouse nature of cybersecurity, threat groups over the past several years have taken to writing their malware in modern programming languages to leverage their cross-platform capabilities and to better evade antivirus and other security tools.

  • Learn More

    How to prepare for NIST’s new post-quantum cryptography guidelines

    News Article from Sectigo

    News Article Aug 16, 2024

    Now that the National Institute of Standards and Technology (NIST) released its three new standards that include algorithms for signatures and encryption for post-quantum cryptography (PQC), why do these standards matter and what should security teams do to prepare for the transition to PQC?

  • Listen Now
    Root Causes - A PKI & Security Podcast

    EPISODE 413

    Broadcast Date:
    August 16, 2024

    7 minutes

    Podcast Aug 16, 2024

    Root Causes 413: NIST Releases Standards for Three PQC Algorithms

    On August 13, 2024, NIST released its first three standards for PQC algorithms, ML-KEM, ML-DSA, and SLH-DSA.

  • Learn More

    Microsoft and CrowdStrike Outage Fail: Lesson for Tech Pros

    News Article from Sectigo

    News Article Aug 15, 2024

    Nearly a month after a faulty CrowdStrike software update crashed 8.5 million Microsoft Windows machines worldwide, leaving businesses and individual users paralyzed, the fallout continues to reverberate with threatened lawsuits, insurance payout concerns and handwringing about an overreliance on a few large vendors for major IT services.

  • Learn More

    NIST unveils its quantum-resistant encryption standards

    News Article from Sectigo

    News Article Aug 15, 2024

    NIST has shared standards for general encryption and digital signatures and has called on organisations to transition as soon as possible.