Tag: SSL/TLS
-
Endpoint malware attacks decline as campaigns spread wider
In Q2 2023, 95% of malware now arrives over encrypted connections, endpoint malware volumes are decreasing despite campaigns growing more …
-
The clock is ticking for businesses to prepare for mandated certificate automation
It’s clear that many challenges to certificate automation exist, whether you are an enterprise level organization or an SMB. There are a …
-
Vulnerabilities in cryptographic libraries found through modern fuzzing
Recently patched vulnerabilities in MatrixSSL and wolfSSL, two open-source TLS/SSL implementations / libraries for embedded environments, …
-
Evaluating the use of encryption across the world’s top one million sites
A new report from security researcher and TLS expert Scott Helme, evaluates the use of encryption across the world’s top one million …
-
What are the Most Common Types of SSL Errors and How to Fix Them?
What happens when warnings like ‘Your Connection is not Private,’ ‘The Site’s Security Certificate is Not Trusted,’ etc., appear …
-
Widely used UPS devices can be hijacked and destroyed remotely
Three vulnerabilities in ubiquitous APC Smart-UPS (uninterruptible power supply) devices could allow remote attackers to use them as an …
-
Implementing effective ways to exchange sensitive information using encryption
In this interview with Help Net Security, Chris Peel, VP Customer Engineering at Echoworx, who works with customers to define, develop and …
-
Key drivers for the shift to public DNS resolvers
The European Union Agency for Cybersecurity (ENISA) analyses the security pros and cons of using public DNS resolvers. A core part of the …
-
EV certificate usage declining: Is the internet becoming more secure?
Use of encryption is increasing and the adoption of newer TLS protocols is rising, a Venafi report reveals. However, despite the adoption …
-
Surge in cyber attacks confirms the need for zero trust security
Zscaler announced the release of a report that tracked and analyzed over 20 billion threats blocked over HTTPS, a protocol originally …
-
3 areas of implicitly trusted infrastructure that can lead to supply chain compromises
The SolarWinds compromise in December 2020 and the ensuing investigation into their build services put a spotlight on supply chain attacks. …
-
Organizations can no longer afford to overlook encrypted traffic
Whether you’re a small business operating out of a single office or a global enterprise with a huge and distributed corporate network, …
●●●