Threat actors using Abused Code-signing certificate from reputable companies as a layer of obfuscation in distributing malicious payloads. Abused Codesigning certificates would...
Security researchers from Fidelis identified a new method to establish a covert channel communication by abusing widely implemented X.509 public key certificates....
A group of researchers demonstrated that malware signed with stolen Digital code-signing certificates continues to bypass security software. A recent study conducted...
Google has made a conclusive decision on the different dates they want to execute as part of the accord plan in distrusting...
[jpshare]The move from having SSL Certificates marked with the SHA-1 hashing algorithm to certificate signed with the SHA-256 set to start in...
SHA-1 SSL certificates which are more popular and an sucessor of MD5 algorithm are now in the final days of what was once...
Legitimate code-signing certificates provide secret cover for attack groups. There are lots of ways to ensure the success of an advanced hacking operation....
A China-based APT group has an insatiable appetite for stolen code-signing certificates. Many security-minded organizations utilize code signing to provide an additional layer...
Researchers have found that thousands of Internet gateways, routers, modems and other embedded devices share cryptographic keys and certificates, exposing millions of...
Root certificate debacle that hit Lenovo now visits the House of Dell. In a move eerily similar to the Superfish debacle that...
New stolen digital certificates are used by the multi-purpose backdoor Qbot. The criminals behind the Qbot trojan are certainly not inactive. As...