Redirecting you to

Resource Library

Looking for something? Search or browse our extensive library of resources.

Start typing to search tags.

Advanced Filters

Filter by Tag

Clear Selection

Filter by Date Range

  • Learn More

    Microsoft: Russian Hackers Gained Access to Source Code Repositories During January Attack

    A News Article from Sectigo

    News Article Mar 12, 2024

    An update from Microsoft on the January attack by Russian hackers indicates that it was more damaging than originally reported, with the Midnight Blizzard group accessing “some” of the company’s internal systems and source code.

  • Learn More

    The Gately Report: AI Provides Massive Opportunity for Check Point Partners

    A News Article from Sectigo

    News Article Mar 11, 2024

    In January, we reported that Nobelium aka Midnight Blizzard, the Russian nation-state hacking group behind the massive SolarWinds attack, targeted Microsoft, compromising a small number of email accounts, including those belonging to senior staff.

  • Learn More

    Russian Hackers Gained Access to Microsoft Source Code, Customer Secrets

    A News Article from Sectigo

    News Article Mar 11, 2024

    In a sobering update released March 8th, Microsoft has revealed that the Russian state-sponsored hacking group Midnight Blizzard, also tracked as Nobelium, has gained unauthorized access to some of the company's source code repositories and internal systems. This follows an initial breach of Microsoft's corporate email systems detected in January 2024.

  • Learn More

    Russian Hackers Access Source Code in Ongoing Attack on Microsoft

    A News Article from Sectigo

    News Article Mar 11, 2024

    The Russian state-sponsored bad actors who hacked into the corporate email accounts of executives at Microsoft are taking another run at the IT giant, this time using information stolen then to access the company’s source code repositories and other internal systems now.

  • Learn More

    What is a Private CA? How to manage internal certificates

    A Blog Post from Sectigo

    Blog Post Mar 11, 2024

    Secure internal communications with Sectigo private CA solution. Cost-effective, flexible and robust. Explore benefits, setup and solution selection.

  • Learn More

    Sectigo Sponsors CloudFest 2024

    A Press Release from Sectigo

    Press Release Mar 07, 2024

    SCOTTSDALE, Ariz., — March 7, 2024 — Sectigo®, the industry’s most innovative provider of comprehensive certificate lifecycle management (CLM), and website cybersecurity announced today its sponsorship of CloudFest 2024, March 18-21 in Europa-Park, Germany.

  • Listen Now
    Root Causes - A PKI & Security Podcast

    EPISODE 367

    Broadcast Date:
    March 7, 2024

    8 minutes

    Podcast Mar 07, 2024

    Root Causes 367: Did an IoT Toothbrush Botnet Perform DDoS Attacks?

    A story circulated earlier this year about a botnet composed of millions of IoT toothbrushes, which later was debunked. We tell you the whole tale.

  • Learn More

    CryptoChameleon Phishing Scam Targets Crypto Users and FCC Employees

    A News Article from Sectigo

    News Article Mar 06, 2024

    So far, the CryptoChameleon phishing scam has successfully phished over 100 victims, with many still active.

    Lookout has discovered a multi-pronged phishing campaign, dubbed “CryptoChameleon,” that mimics legitimate login pages for cryptocurrency platforms and the Federal Communications Commission (FCC) via mobile devices.

  • Learn More

    NIST Unveils Cybersecurity Framework 2.0 with Key Upgrades

    A News Article from Sectigo

    News Article Mar 06, 2024

    The U.S. National Institute of Standards and Technology (NIST) has released version 2.0 of its landmark Cybersecurity Framework (CSF), a comprehensive update aimed at helping organizations better manage and reduce cybersecurity risks across all sectors and sizes.

  • Learn More

    SMB cybersecurity best practices for 2024

    A Blog Post from Sectigo

    Blog Post Mar 05, 2024

    Small businesses face constant cyber threats. To safeguard, adopt a layered, automated cybersecurity approach. Explore resources & best practices in 2024.

  • Learn More

    CryptoChameleon Attackers Target Apple, Okta Users With Tech Support Gambit

    A News Article from Sectigo

    News Article Mar 05, 2024

    A phishing kit dubbed CryptoChameleon has been discovered targeting cryptocurrency platforms, including employees of Binance and Coinbase — as well as the Federal Communications Commission (FCC).

  • Listen Now
    Root Causes - A PKI & Security Podcast

    EPISODE 366

    Broadcast Date:
    March 4, 2024

    27 minutes

    Podcast Mar 04, 2024

    Root Causes 366: What Is eIDAS?

    eIDAS 2.0 has been making headlines recently with its proposed expansion to the European digital identity ecosystem. What is eIDAS, and why does it exist?