-
Download Now
Certificate Lifecycle Management Maturity
A Whitepaper from Sectigo
Whitepaper Jul 15, 2024With rising certificate usage and shorter lifespans, security teams must manage CLM to meet regulations, tackle cyber threats, and prepare for quantum.
-
Learn More
AT&T Data Breach: Hackers Steal Call and Text Records for “Nearly All” Customers
A News Article from Sectigo
News Article Jul 14, 2024AT&T confirms a data breach exposing call and text records for “Nearly All” customers from May 2022 to October 2022. Investigations are underway and 1 arrest has already been made.
-
Learn More
AT&T Discloses 2022 Data Breach Affecting Nearly Every Customer
A News Article from Sectigo
News Article Jul 12, 2024On July 12, 2024, AT&T disclosed a data security incident that occurred in 2022. The company confirmed that unauthorized individuals accessed customer data stored on a third-party cloud platform.
-
Learn More
FishXProxy Phishing Kit Outfits Cybercriminals for Success
A News Article from Sectigo
News Article Jul 12, 2024A fresh end-to-end phishing toolkit is making the rounds that significantly lowers the barrier to entry for cybercriminals to successfully mount and manage malicious email attacks that evade typical security protections.
-
Learn More
Understanding The 5 Pillars of Certificate Lifecycle Management
A Blog Post from Sectigo
Blog Post Jul 12, 2024Certificate Lifecycle Management (CLM) involves discovering, issuing, renewing, and revoking digital certificates, crucial for enterprise cybersecurity. Key pillars: Discover, Deploy, Revoke and Replace, Renew, Integration.
-
Listen Now
EPISODE 403
Broadcast Date:
July 12, 202421 minutes
Podcast Jul 12, 2024Root Causes 403: NIST PQC Contest Round 4 and Onramp with Dustin Moody
We are joined again by Dustin Moody, who leads the NIST search for PQC algorithms. We cover going-forward efforts, including Round 4 and the Onramp.
-
Learn More
Eldorado Ransomware Strikes Windows and Linux Networks
A News Article from Sectigo
News Article Jul 10, 2024Security researchers have uncovered significant insights into the latest iteration of Ransomware-as-a-Service (RaaS) known as Eldorado.
The sophisticated malware, designed to target both Windows and Linux operating systems, utilizes the programming language Golang to facilitate its cross-platform attacks.
-
Learn More
Eldorado Ransomware Cruises Onto the Scene to Target VMware ESXi
A News Article from Sectigo
News Article Jul 09, 2024The ransomware-as-a-service platform just rolled off the assembly line, also targets Windows, and uses Golang for cross-platform capabilities.
-
Learn More
Eldorado Ransomware Targeting Windows and Linux with New Malware
A News Article from Sectigo
News Article Jul 09, 2024Group-IB researchers report a sharp rise in Eldorado – Golang-based ransomware with cross-platform encryption- operations, targeting various industries. Learn how Eldorado ransomware affiliates operate and how to protect your business from attacks.
-
Learn More
Essential Cyber Resilience Frameworks — Review & Guide
A News Article from Sectigo
News Article Jul 09, 2024Building and maintaining a cyber resilience framework is essential for defending against cyberattacks, involving continuous updates and new policies. Cyber resilience ensures that organizations can anticipate, withstand, recover from, and adapt to cyber threats. Jason Soroko from Sectigo underscores the need for thorough risk assessments, robust security architectures, and continuous monitoring. Overall, achieving cyber resilience involves proactive measures, regular system monitoring, employee training, and implementing advanced technologies for swift threat detection and response.
-
Learn More
New Ransomware Group Eldorado Targets Mainly US Organizations
A News Article from Sectigo
News Article Jul 09, 2024Eldorado, a new ransomware-as-a-service group, has targeted 16 organizations, mostly in the US, since its emergence in spring 2024. Focusing on sectors like real estate and healthcare, Eldorado uses Golang for cross-platform attacks and encrypts files with ChaCha20 and RSA-OAEP. Its ability to shut down and encrypt virtual machines severely disrupts business operations. Experts advise using multi-factor authentication, endpoint detection, regular backups, timely patching, and continuous employee training to defend against such threats.
-
Listen Now
EPISODE 402
Broadcast Date:
July 9, 202415 minutes
Podcast Jul 09, 2024Root Causes 402: New Social Engineering Powershell Attack
A new social engineering exploit instructs victims to enter command line prompts to hack themselves on behalf of the hacker.