Search Results for: certificates Blog Post Types of SSL Certificates – Why Should You Care? November 20, 2020 Are you in a process of creating your own webpage or do you already have one or two? Then, you... Blog Post CISA Urged Admins To Apply The Security Update To Patch Vulnerability In OpenSSL December 29, 2020 On December 8, 2020, OpenSSL issued a security update for a high severity DoS vulnerability that affects the open-source project.... Blog Post Thousands of U.S. Birth Certificates and Death Certificate Applications Revealed! December 13, 2019 An online company used a cloud services platform to store more than 752,000 U.S. birth certificate applications, and the... Blog Post University Breach: Wi-Fi Networks Log-In Credentials, Thousands are Exposed October 28, 2021 Multiple certificate misconfiguration flaws in a free Wi-Fi network used by students and faculty from various universities can lead to... Blog Post New Code Signing Service sigstore April 13, 2021 Determining the origin and authenticity of open-source code is one of its disadvantages. This is also the reason why it... Blog Post Digital Signatures – What Are They and How Do They Work? June 22, 2020 A Digital Signature is a type of signature that guarantees that the contents of a message have not been altered... Blog Post Root CA Security Best Practices for Ensuring Trusted and Compliant Interactions April 19, 2021 Your certification authority (CA) is a key component in securing your network. It is the entity that issues, manages, and... Blog Post PowerShell Remoting and WMI risks July 13, 2021 What is PowerShell Remoting? PowerShell Remoting uses Windows Remote Management (WinRM), which is the Microsoft implementation of the Web Services... Blog Post Only 54% of Cybersecurity Pros Set Rules for Key Creation January 11, 2020 When you arrive at the office in the morning, you have to input your usernames and passwords in order to... Blog Post A Closer Look at the Russian Actors Targeting Organizations in Ukraine March 3, 2022 In the context of the ongoing war between Russia and Ukraine, we have reviewed the cyberattacks against the Ukrainian organizations... Blog Post E-Land Retail Ransomware Attack December 30, 2020 E-Land Retail, a subsidiary of the E-Land Group conglomerate announced on 23 November of 2020 that it suffered a massive... Blog Post Microsoft Aims to Train Over 250k Cybersecurity Workers Amid U.S. Skill Crisis December 30, 2021 Across all sectors, industries, and verticals, the cybersecurity industry is experiencing a crisis. The statistics are pretty damning. Currently, there... Blog Post Malware for macOS managed to infect 40,000 of computers March 8, 2021 Cybersecurity research uncovered a new malware for macOS, which managed to infect almost 40,000 computers over the past couple of... Blog Post Security Events During Summer August 16, 2021 Cybersecurity and related events continue into the summer period. Organizations working in this field are also now offering several events,... Blog Post Latest Siemens PLC Vulnerability Could Let Hackers Execute Malicious Code Remotely June 23, 2021 Siemens ProductCERT recently released a Security Advisory warning of a memory protection bypass vulnerability present in its SIMATIC S7-1200 and...
Blog Post Types of SSL Certificates – Why Should You Care? November 20, 2020 Are you in a process of creating your own webpage or do you already have one or two? Then, you...
Blog Post CISA Urged Admins To Apply The Security Update To Patch Vulnerability In OpenSSL December 29, 2020 On December 8, 2020, OpenSSL issued a security update for a high severity DoS vulnerability that affects the open-source project....
Blog Post Thousands of U.S. Birth Certificates and Death Certificate Applications Revealed! December 13, 2019 An online company used a cloud services platform to store more than 752,000 U.S. birth certificate applications, and the...
Blog Post University Breach: Wi-Fi Networks Log-In Credentials, Thousands are Exposed October 28, 2021 Multiple certificate misconfiguration flaws in a free Wi-Fi network used by students and faculty from various universities can lead to...
Blog Post New Code Signing Service sigstore April 13, 2021 Determining the origin and authenticity of open-source code is one of its disadvantages. This is also the reason why it...
Blog Post Digital Signatures – What Are They and How Do They Work? June 22, 2020 A Digital Signature is a type of signature that guarantees that the contents of a message have not been altered...
Blog Post Root CA Security Best Practices for Ensuring Trusted and Compliant Interactions April 19, 2021 Your certification authority (CA) is a key component in securing your network. It is the entity that issues, manages, and...
Blog Post PowerShell Remoting and WMI risks July 13, 2021 What is PowerShell Remoting? PowerShell Remoting uses Windows Remote Management (WinRM), which is the Microsoft implementation of the Web Services...
Blog Post Only 54% of Cybersecurity Pros Set Rules for Key Creation January 11, 2020 When you arrive at the office in the morning, you have to input your usernames and passwords in order to...
Blog Post A Closer Look at the Russian Actors Targeting Organizations in Ukraine March 3, 2022 In the context of the ongoing war between Russia and Ukraine, we have reviewed the cyberattacks against the Ukrainian organizations...
Blog Post E-Land Retail Ransomware Attack December 30, 2020 E-Land Retail, a subsidiary of the E-Land Group conglomerate announced on 23 November of 2020 that it suffered a massive...
Blog Post Microsoft Aims to Train Over 250k Cybersecurity Workers Amid U.S. Skill Crisis December 30, 2021 Across all sectors, industries, and verticals, the cybersecurity industry is experiencing a crisis. The statistics are pretty damning. Currently, there...
Blog Post Malware for macOS managed to infect 40,000 of computers March 8, 2021 Cybersecurity research uncovered a new malware for macOS, which managed to infect almost 40,000 computers over the past couple of...
Blog Post Security Events During Summer August 16, 2021 Cybersecurity and related events continue into the summer period. Organizations working in this field are also now offering several events,...
Blog Post Latest Siemens PLC Vulnerability Could Let Hackers Execute Malicious Code Remotely June 23, 2021 Siemens ProductCERT recently released a Security Advisory warning of a memory protection bypass vulnerability present in its SIMATIC S7-1200 and...