Redirecting you to

Resource Library

Looking for something? Search or browse our extensive library of resources

Start typing to search tags.

Advanced Filters

Filter by Tag

Clear Selection

Filter by Date Range

  • Listen Now
    Root Causes - A PKI & Security Podcast

    EPISODE 417

    Broadcast Date:
    September 3, 2024

    9 minutes

    Podcast Sep 03, 2024

    Root Causes 417: Introducing pkimetal, the PKI Meta-linter

    We introduce pkimetal, an open source project from Rob Stradling that allows CA to write to many popular linters with a single integration.

  • Learn More

    LummaC2 infostealer uses obfuscated scripts via PowerShell to target endpoints

    News Article from Sectigo

    News Article Sep 02, 2024

    A new sample of the LummaC2 infostealer was observed using a series of PowerShell commands that downloaded and executed a payload on a targeted endpoint.

  • Learn More

    Do cybersecurity certifications still deliver? Experts share 6 key insights

    News Article from Sectigo

    News Article Sep 02, 2024

    Cybersecurity certifications continue to open doors and shape careers in security operations (SecOps). However, the mileage that individuals and organizations get out of certs can vary by industry, the specific demands of the job, and the practical experience needed to tackle real-world challenges.

  • Learn More

    Do cybersecurity certifications still deliver? Experts share 6 key insights

    News Article from Sectigo

    News Article Sep 02, 2024

    Cybersecurity certifications continue to open doors and shape careers in security operations (SecOps). However, the mileage that individuals and organizations get out of certs can vary by industry, the specific demands of the job, and the practical experience needed to tackle real-world challenges.

  • Learn More

    How SSL Certificates Can Help Prevent Man-in-the-Middle Attacks

    Blog Post from Sectigo

    Blog Post Sep 02, 2024

    Sophisticated attackers will stop at nothing to steal sensitive data, personal information, and business secrets. Unfortunately, as technology evolves, so do the methods used by hacking groups and individuals looking to prey on vulnerable online entities.

  • Listen Now
    Root Causes - A PKI & Security Podcast

    EPISODE 416

    Broadcast Date:
    August 30, 2024

    23 minutes

    Podcast Aug 30, 2024

    Root Causes 416: Subscriber Restraining Order Prevents Revocation

    An enterprise SSL subscriber recently used a Temporary Restraining Order to prevent the proper revocation of misissued certificates. We explain.

  • Learn More

    AI deepfakes are more dangerous than you think

    News Article from Sectigo

    News Article Aug 27, 2024

    With elections taking place around the world, most notably in the US in November, concerns grow around how AI deepfakes are becoming ubiquitous online.

  • Learn More

    ‘ASCII Smuggling’ attack exposes sensitive Microsoft Copilot data

    News Article from Sectigo

    News Article Aug 27, 2024

    A patched vulnerability in Microsoft 365 Copilot could expose sensitive data by running a novel AI-enabled technique known as "ASCII Smuggling" that uses special Unicode characters that mirror ASCII text, but are actually not visible to the user interface.

  • Listen Now
    Root Causes - A PKI & Security Podcast

    EPISODE 415

    Broadcast Date:
    August 27, 2024

    20 minutes

    Podcast Aug 27, 2024

    Root Causes 415: What Can I Do with These New FIPS PQC Standards?

    NIST recently released PQC algorithmic standards in FIPS-203, 204, and 205. We describe what is necessary for enterprises to begin using these algorithms.

  • Learn More

    Port of Seattle, Including Sea-Tac Airport, Disrupted by Cyber Attack

    News Article from Sectigo

    News Article Aug 26, 2024

    The Port of Seattle, which oversees the Seattle-Tacoma International Airport (Sea-Tac), recently confirmed that a possible cyberattack disrupted several critical systems, including websites and phone services, beginning on August 24, 2024. Initially, the incident was reported as system outages, but it was later acknowledged that a cyberattack could be the cause.

  • Learn More

    NIST Hands Off Post-Quantum Cryptography Work to Cyber Teams

    News Article from Sectigo

    News Article Aug 23, 2024

    No longer relegated to post-doctorate physics academia and sad Schrödinger's cat thought experiments, post-quantum computing remediation has arrived in the real world.

  • Listen Now
    Root Causes - A PKI & Security Podcast

    EPISODE 414

    Broadcast Date:
    August 23, 2024

    12 minutes

    Podcast Aug 23, 2024

    Root Causes 414: What Are the Revocation Periods for Public Certs?

    We detail mandatory revocation periods for leaf certificates and intermediates and explain when a 24-hour versus a 120-hour revocation deadline applies.