-
Listen Now
EPISODE 268
Broadcast Date:
January 12, 20239 minutes
Podcast Jan 12, 2023Root Causes 268: WAFs Subverted by JSON Bypass
Rising attacks can overcome the protections of Web Application Firewalls (WAF). We explain these attacks and what you should do to ensure you're safe.
-
Listen Now
EPISODE 200
Broadcast Date:
January 19, 20227 minutes
Podcast Jan 19, 2022Root Causes 200: Why Not to Copy and Paste Commands from Web Pages
This episode describes newly revealed vulnerabilities where copying and pasting text from a web page can open the site visitor up to attack.
-
Listen Now
EPISODE 185
Broadcast Date:
November 2, 202117 minutes
Podcast Nov 02, 2021Root Causes 185: EU Covid Passport Root Key Stolen
The root certificates of the EU's Covid Passport program have suffered a private key compromise and counterfeit passports are for sale on the black market.
-
Listen Now
EPISODE 184
Broadcast Date:
October 27, 202112 minutes
Podcast Oct 27, 2021Root Causes 184: Popular College WiFi Vulnerability Revealed
Certificate misconfiguration in commonly used college WiFi can expose logins. We discuss WiFi authentication, EAP, and how this vulnerability occurs.
-
Listen Now
EPISODE 183
Broadcast Date:
October 21, 202114 minutes
Podcast Oct 21, 2021Root Causes 183: New MSCA Attack Toolkits
A new white paper and set of toolkits illuminate MSCA root key attacks. We provide a clear action list for IT professionals in charge of Microsoft CA.
-
Listen Now
EPISODE 135
Broadcast Date:
December 14, 202025 minutes
Podcast Dec 14, 2020Root Causes 135: The Heartbleed Vulnerability
2014's Heartbleed vulnerability made it possible to steal private keys directly from web servers, requiring certificate replacement by the millions.
-
Learn More
What Is the Difference Between a Threat, a Vulnerability, and a Risk?
A Blog Post from Sectigo
Blog Post Oct 26, 2020Those who don’t quite know the nuts and bolts of cybersecurity might use certain terms interchangeably. Logically, it makes sense in some cases. For example, a “vulnerability” sounds a lot like a “risk.” But in web security terms, they are not the same thing.
-
Learn More
Why Would My CMS Be Outdated?
A Blog Post from Sectigo
Blog Post Oct 16, 2020But while the benefits of using a CMS for your website are very obvious, the drawbacks should come as a warning for anyone.
-
Learn More
How Can I Prevent Malware in My Website URLs?
A Blog Post from Sectigo
Blog Post Oct 12, 2020Cybercriminals continue to find new, sneaky ways of attacking users. Why? Because it’s lucrative. The more successful attacks they can execute, the more money they can make.
-
Learn More
Can You Get a Virus from Visiting a Website?
A Blog Post from Sectigo
Blog Post Oct 08, 2020Yes, you can get a virus just from visiting a website.
These days, it’s very easy to be overconfident in our abilities to avoid computer viruses. After all, many of us were told that we simply had to avoid files and programs we didn’t recognize. If an email came through that looked fishy, we didn’t open them.
-
Learn More
How to Get Rid of Malware
A Blog Post from Sectigo
Blog Post Oct 01, 2020Malware left unaddressed for too long can cause customers to distrust you, kill your revenues, and damage your reputation in the industry.
If you see the signs of malware on your site, then you need to act fast to get rid of it before its impact is magnified.
-
Watch Now
20 minutes
Webinar Sep 18, 2020Threat Visibility Is Vital to Website Health
Learn why threat visibility is a leading reason for targeted attacks, the 5 most common types of attacks and more with Michael Fowler and the Sectigo team.