662 Results for:ssl

  • Sort by: 

Coalition: Insurance claims for Cisco ASA users spiked in 2023

By Arielle Waldman 24 Apr 2024

Coalition urged enterprises to be cautious when using Cisco and Fortinet network boundary devices as attackers can leverage the attack vectors to gain initial access. Read More

RSA and other crypto systems vulnerable to side-channel attack

By Cliff Saran 03 Oct 2023

A researcher has found that a flaw in RSA is still vulnerable – a quarter of a century after it was first discovered Read More

Warning over ransomware attacks spreading via Fortinet kit

By Alex Scroxton 05 Jan 2023

Following the disclosure of a critical vulnerability in October 2022, Fortinet VPN devices were exploited in two known ransomware attacks, with access likely sold on the dark web Read More

PCI DSS 3.1 marks the end of SSL/early TLS encryption for retailers

By Mike Chapple 21 Jul 2015

The early arrival of PCI DSS 3.1 could leave organizations scrambling. The biggest change to the standard -- and the top priority for organizations -- is the end of SSL and early TLS. Read More

NCSC exposes Russian cyber attacks on UK political processes

By Alex Scroxton 07 Dec 2023

The NCSC has firmly attributed a long-running campaign of cyber attacks targeting UK political processes to a group run out of Russia’s FSB intelligence agency, known as Star Blizzard Read More

Threat activity increasing around Fortinet VPN vulnerability

By Arielle Waldman 02 Feb 2023

Following public disclosure of the critical VPN flaw in December, multiple reports show threat actors are exploiting it to target high-profile organizations. Read More

Researchers claim to have broken SSL/TLS encryption

By Warwick Ashford 22 Sep 2011

Two security researchers claim to have found a way of breaking the SSL/TLS encryption that is widely used to guarantee the reliability and privacy of data exchanged between web browsers and servers. Read More

3 types of PKI certificates and their use cases

By Isabella Harford 10 Jun 2022

Public key infrastructure helps authenticate senders via cryptography and digital certificates. Learn about three types of PKI certificates and their use cases. Read More

How Gigamon is making its mark in deep observability

By Aaron Tan 15 Nov 2023

Gigamon CEO Shane Buckley talks up the company’s ability to inspect encrypted network traffic for malicious activity, how it stands out with its deep observability capabilities and the tailwinds that are fuelling ... Read More

Find out whether secure email really protects user data in transit

By Kevin Tolly 20 Mar 2019

Outside of user perceptions, how safe is secure email in terms of protecting users' data in transit? Our expert explains how much the SSL and TLS protocols can protect email. Read More