Redirecting you to

Resource Library

Looking for something? Search or browse our extensive library of resources

Start typing to search tags.

Advanced Filters

Filter by Tag

Clear Selection

Filter by Date Range

  • Learn More

    Snowflake Data Breach Rocks Ticketmaster, Live Nation, and Others

    News Article from Sectigo

    News Article Jun 04, 2024

    Cloud data warehousing giant Snowflake has disclosed a major security breach affecting an unknown number of its corporate customers, including entertainment titans Ticketmaster and Live Nation.

  • Learn More

    The importance of crypto agility in preventing certificate-related outages

    Blog Post from Sectigo

    Blog Post Jun 04, 2024

    Digital certificates play a vital role in driving today's powerful system of identity-based security — from securing online communications and transactions to encrypting software developer code and much more.

  • Listen Now
    Root Causes - A PKI & Security Podcast

    EPISODE 391

    Broadcast Date:
    June 4, 2024

    22 minutes

    Podcast Jun 04, 2024

    Root Causes 391: 20 Percent of Web Visits Are PQC Enabled Today

    Cloudflare engineer Bas Westerbaan shares insights on post-quantum cryptography, its real-world uses, and timelines for PQC certificate availability.

  • Learn More

    Okta alerts customers against new credential-stuffing attacks

    News Article from Sectigo

    News Article May 31, 2024

    A cross-origin authentication feature in Okta’s customer identity cloud (CIC) is open to credential-stuffing attacks, the identity and access management company said in a security advisory.

  • Learn More

    Okta says Customer Identity Cloud prone to credential-stuffing attacks

    News Article from Sectigo

    News Article May 31, 2024

    Okta notified its customers that the cross-origin authentication feature in its Customer Identity Cloud is now prone to being targeted by threat actors conducting credential stuffing attacks.

  • Listen Now
    Root Causes - A PKI & Security Podcast

    EPISODE 390

    Broadcast Date:
    May 31, 2024

    22 minutes

    Podcast May 31, 2024

    Root Causes 390: Chrome Boosts Its Root Distrust Agility

    A root trust deprecation highlights new Chrome functionality that enables more agile and less disruptive distrust events.

  • Learn More

    Navigating The ‘90-Day Apocalypse’ For Digital Certificates

    News Article from Sectigo

    News Article May 29, 2024

    In the late 1990s, the world held its breath as the infamous Y2K bug loomed over the horizon, threatening to disrupt every facet of modern life. Businesses across the globe scrambled to prepare, often spending exorbitant amounts to safeguard against potential fallout.

  • Learn More

    Attackers target old VPN accounts that relied on passwords

    News Article from Sectigo

    News Article May 29, 2024

    Attackers were observed targeting remote-access VPNs from “various cybersecurity vendors” as a way to gain entry and exploit vulnerabilities in enterprise networks, according to Check Point Software.

  • Learn More

    Malicious Hackers Target Check Point VPNs to Breach Enterprise Networks

    News Article from Sectigo

    News Article May 29, 2024

    Threat actors are targeting Check Point Software Technologies’ remote-access VPN devices in an ongoing campaign to breach enterprise networks.

  • Learn More

    Check Point Warns of Hackers Targeting Its Remote Access VPN

    News Article from Sectigo

    News Article May 29, 2024

    Threat actors are targeting Check Point Remote Access VPN devices in an ongoing campaign to breach enterprise networks, the company has warned in a new advisory.

  • Learn More

    Attackers Target Check Point VPNs to Access Corporate Networks

    News Article from Sectigo

    News Article May 29, 2024

    In recent months, researchers have observed an increase in attackers using remote access virtual private networks (VPNs) as a golden ticket for initial network access. Multiple cybersecurity vendors' solutions have been compromised, according to a recent Check Point blog post, prompting them to look into their own gear and whether it's being targeted.

  • Learn More

    Check Point warns of increase in enterprise attacks targeting vulnerable VPNs

    News Article from Sectigo

    News Article May 29, 2024

    Cybersecurity company Check Point Software Technologies Ltd. is warning that it’s seeing a rise in threat actors exploiting remote-access virtual private network environments to gain authorized access to enterprises.