-
Webinar May 22, 2024
Bugzilla – the real issue of missed revocations
March and April 2024 have seen more than 25 new Bugzilla bugs being written up – more than 10 times the typical pace.
-
Podcast May 22, 2024
Root Causes 388: What Is the WebPKI?
These days we frequently discuss "the WebPKI." But what does that really mean? In this episode we define WebPKI and how it has evolved over time.
-
Podcast May 16, 2024
Root Causes 387: What Is the Post-quantum Readiness of HSMs?
We take a deep dive with return guest Bruno Coulliard on HSMs and the role they play in post-quantum cryptography (PQC).
-
News Article May 15, 2024
Many organizations that have implemented passwordless authentication via the FIDO2 standard may be undermining some of the security benefits of the approach by not properly securing the sessions that take place after authentication happens.
-
Press Release May 14, 2024
SCOTTSDALE, Ariz., — May 14, 2024 — Sectigo®, the industry’s most innovative provider of comprehensive certificate lifecycle management (CLM), today announced it has been honored with three awards from three leading cybersecurity publications. The recognition comes as the company prosecutes a new strategy to democratize the management of digital certificates critical for all.
-
News Article May 14, 2024
With the rise of powerful chatbots and deceptive deepfake content, experts believe AI could be used to influence elections and it is unclear if governments or tech giants can deal with the threat.
-
News Article May 14, 2024
The Investigatory Powers Act (IPA) of 2016 was tasked with combining various existing powers used by law enforcement and security agencies for communication data collection and interception.
-
News Article May 13, 2024
Kaspersky researchers have identified multiple security vulnerabilities in Cinterion cellular modems, which could potentially be exploited by threat actors to access sensitive information and execute arbitrary code.
-
News Article May 13, 2024
Serious security flaws were discovered in Cinterion cellular modems, including critical flaws that permit remote code execution and unauthorized privilege escalation, posing great risks to Internet of Things (IoT) devices widely found in the industrial, healthcare, automotive, financial and telecom sectors.
-
News Article May 13, 2024
Failure to properly configure authentication led to malicious actors exploiting the database backups of Airsoftc3.com, a popular Airsoft enthusiast community site, according to Cybernews researchers, who discovered the breach in December.
-
Podcast May 13, 2024
Root Causes 386: Meta Commits MITM Attack On Its Users
In 2016 Meta (then Facebook) set up a system to get around encryption and spy on traffic between its users and competing social media platforms.
-
News Article May 10, 2024
Thanks to several recent high-profile incidents and reported vulnerabilities, application security remains a major concern for businesses and government agencies alike. A report released by Gartner in October found that software development lifecycle attacks (SDLC) affected about 61 percent of U.S. businesses between April 2022 and 2023.