Redirecting you to

Security Terminology

Easily understandable explanations of common industry terms.

  • Learn More

    RansomHub releases 487GB of Kawasaki Motors Europe data

    News Article from Sectigo

    News Article Sep 16, 2024

    RansomHub over the weekend reportedly released 487 gigabytes of Kawasaki Motors Europe (KME) data to the public internet in a case that has U.S. security pros concerned because of RansomHub’s prolific activity of late worldwide.

  • Learn More

    YubiKey vulnerability allows attackers to clone device

    News Article from Sectigo

    News Article Sep 16, 2024

    The vulnerability was found in the cryptographic library of Infineon Technologies, which was used in older versions of Yubico devices.

  • Listen Now
    Root Causes - A PKI & Security Podcast

    EPISODE 421

    Broadcast Date:
    September 16, 2024

    8 minutes

    Podcast Sep 16, 2024

    Root Causes 421: FIDO 2 Implementation Problems

    White hat researchers have raised concerns about FIDO 2 (AKA WebAuthn). We explain.

  • Learn More

    Progress Software patches 10.0 vulnerability in LoadMaster releases

    News Article from Sectigo

    News Article Sep 13, 2024

    Progress Software patched a critical 10.0 vulnerability that affects all LoadMaster releases, as well as the LoadMaster Multi-Tenant hypervisor.

  • Learn More

    Simplify CLM with Sectigo’s Maturity Model

    Blog Post from Sectigo

    Blog Post Sep 13, 2024

    Automated CLM simplifies SSL/TLS management. Sectigo's CLM maturity model helps businesses automate and secure digital certificates effectively.

  • Listen Now
    Root Causes - A PKI & Security Podcast

    EPISODE 420

    Broadcast Date:
    September 13, 2024

    13 minutes

    Podcast Sep 13, 2024

    Root Causes 420: New Side Channel Attack Against YubiKeys

    EUCLEAK, a newly revealed side-channel vulnerability, can clone the contents of a YubiKey. We talk about the attack and its significance.

  • Learn More

    Progress Software issues fix for maximum severity vulnerability

    News Article from Sectigo

    News Article Sep 12, 2024

    Progress Software issued an emergency fix to deal with a vulnerability impacting its its LoadMaster and LoadMaster Multi-Tenant (MT) Hypervisor products. This issue, called CVE-2024-7591, is considered a maximum severity vulnerability. The vulnerability is an improper input validation issue, which could allow unauthenticated, remote attackers to gain access to LoadMaster’s management interface.

  • Learn More

    Crime gangs can triumph with AI

    News Article from Sectigo

    News Article Sep 11, 2024

    Generative Artificial Intelligence and its blend with deepfake technology has affected voice, image and video. What protections can be put in place?

  • Learn More

    Sectigo launches pkimetal to simplify certificate linting for certificate authorities

    Press Release from Sectigo

    Press Release Sep 11, 2024

    SCOTTSDALE, Ariz., — September 11, 2024 — Sectigo, a global leader in Certificate Lifecycle Management (CLM) and WebPKI solutions, proudly announces the release of pkimetal, a groundbreaking project designed to revolutionize the deployment of certificate linting for Certificate Authorities (CAs).

  • Learn More

    AI-Powered Deepfake Scams Wreak Havoc on Businesses

    News Article from Sectigo

    News Article Sep 10, 2024

    More than half (53%) of businesses in the U.S. and UK have been targeted by financial scams using deepfake technology, with 43% of those companies falling victim, according to a Medius survey of 1,533 finance professionals.

  • Learn More

    Y2K Redux: Echoes of the past in today's cybersecurity era

    News Article from Sectigo

    News Article Sep 10, 2024

    As the clock struck midnight on December 31, 1999, the world held its breath fearing the Y2K crisis, also known as the millennium bug. This potential catastrophe threatened global chaos. Yet, as the new millennium dawned, disaster was averted not due to the non-existence of the threat, but because of meticulous planning and diligent preparation by forward-thinking business leaders who framed it as a risk issue rather than merely a technological glitch.

  • Learn More

    Crime gangs can triumph with AI

    News Article from Sectigo

    News Article Sep 10, 2024

    In the past few years, artificial intelligence technology has crossed a threshold with the capability to make people look and sound like other people. A 'deepfake' is fabricated hyper-realistic digital media, including video, image and audio content. Not only has this technology created confusion, scepticism and the spread of misinformation, deepfakes also pose a threat to privacy and security.