Why Certificates Are a Better Approach to SSH-V2

Why SSH Certificates Can Be A Better Option For Remote Access Than SSH Keys

SSH (Secure Shell) is a secure communication protocol widely used to enable secure access to remote devices and servers over an unsecured network like the Internet. stands as a strong and reliable ...
AnyDesk Breach Calls Urgent Attention To Code Signing Security

AnyDesk Breach Calls Urgent Attention To Code Signing Security

On February 2, 2024, popular remote access solution AnyDesk disclosed that it had suffered a cyberattack that compromised its production systems. AnyDesk revealed that they detected the breach in mid-January during a ...
Are Your Code Signing Processes Mature? A Guide to Navigating Your Code Signing Maturity Journey

Are Your Code Signing Processes Mature? A Guide to Navigating Your Code Signing Maturity Journey

On June 1, 2023, the Certificate Authority (CA)/Browser Forum’s new code signing baseline requirements came into effect, enforcing changes to the way organizations handle and protect code signing private keys. According to ...

RSA Keys Security: Insights from SSH Server Signing Errors

In the realm of secure communication protocols, RSA keys play a pivotal role in safeguarding sensitive information. Recently, a group of researchers from prominent universities in California and Massachusetts uncovered a vulnerability ...
Beware of Expired or Compromised Code Signing Certificates

Beware of Expired or Compromised Code Signing Certificates

Given the alarming rise in software supply chain attacks and consumers growing more cyber-aware and security-conscious, software providers need to demonstrate a stronger commitment to securing their software and applications and fostering ...
Introducing AppViewX SIGN+ – A Fast and Reliable Code Signing Solution for Modern Software Supply Chains

Introducing AppViewX SIGN+ – A Fast and Reliable Code Signing Solution for Modern Software Supply Chains

In today’s software-driven, highly interconnected business landscape, trust is non-negotiable. Having the right solutions and practices in place that help establish and preserve digital trust is highly critical for business survival and ...
10 Best Practices For Continuous Compliance When Managing Digital Certificates

10 Best Practices For Continuous Compliance When Managing Digital Certificates

It is not enough to claim you are secure; you must also be able to demonstrate your commitment towards keeping your infrastructures and your customers’ information safe. Prioritizing compliance is how you ...
LEAKED: Intel’s BIOS Source Code — All 6GB of It

LEAKED: Intel’s BIOS Source Code — All 6GB of It

Source code for the Intel Alder Lake processor EUFI BIOS has gone walkies. 4chan is said to be involved ...
Security Boulevard
business smb risk

APTs, RATs and Code-Signing Attacks

Code-signing certificates have become a high-value target for cybercriminals. Here’s how to keep your certificates safe There’s a lot of buzz right now about a report, recently released by BlackBerry that reveals ...
Security Boulevard