From SSL to TLS 1.3: 30 Years of Encryption and Innovation

Thirty years ago, the Internet was a wild, lawless territory—unregulated, unpredictable, and far from secure. Trust on the web was fragile, and encryption was more of a luxury than a necessity. But ...

NIST Releases New Report on Crypto-Agility – What You Need to Know Now

If you’re keeping up with post-quantum cryptography (PQC), here’s some big news: The U.S. National Institute of Standards and Technology (NIST) has released a fresh initial public draft of a Cybersecurity Whitepaper ...

Key Post-Quantum Cryptography Insights from the Executive Order On Strengthening And Promoting Innovation in the Nation’s Cybersecurity

Ever since the U.S. National Institute of Standards and Technology (NIST) set 2030 as the deadline for retiring legacy encryption algorithms like RSA and ECDSA, the PKI industry is abuzz with activity ...
 PQC Migration for TLS 1.3

Practical Advice for PQC Migration for TLS 1.3

Numerous blogs and articles are urging security professionals to start migrating to quantum-resistant algorithms immediately. This urgency was heightened on August 13, 2024, when NIST finalized the FIPS 203 (ML-KEM), FIPS 204 ...
TLS 1.3 vs TLS 1.2

Enabling TLS 1.3 Certificate – Are You Ready for Moving Forward?

Businesses are often reluctant to embrace new technologies due to assumed dependencies, perceived complications, and unclear information about the advantages. Digital communication security is not exempt from this happening and. The post ...
Unbelievable moment clever racoon cracks locked bin in SECONDS

Raccoon Attack: Researchers Find A Vulnerability in TLS 1.2

Bad news: there’s a vulnerability in TLS 1.2. Good news: researchers say it’s “very hard to exploit” and major vendors have already released security patches for it. A team of... The post ...
DNS over TLS and DNS over HTTPS

DNS over TLS and DNS over HTTPS

By Jamie Brim, Corelight Security Researcher In this post, we’ll explore DNS over TLS (DoT) and DNS over HTTPS (DoH). DoT and DoH were invented to address privacy concerns associated with cleartext ...
Detecting GnuTLS CVE-2020-13777 using Zeek

Detecting GnuTLS CVE-2020-13777 using Zeek

By Johanna Amann, Software Engineer, Corelight CVE-2020-13777 is a high severity issue in GnuTLS. In a nutshell, GnuTLS versions between 3.6.4 (released 2018-09-24) and 3.6.14 (2020-06-03) have a serious bug in their ...
cloud

A Seismic Shift for Decrypted Visibility in the Cloud

There is a seismic shift happening in the cloud. Two great, tectonic forces of change are colliding and creating unprecedented disruption for security, DevOps and cloud professionals. Ultimately, this shift has prompted ...
Security Boulevard
TLS 1.3: Everything you need to know

TLS 1.3: Everything you need to know

TLS 1.3 was officially published as RFC 8446 last Summer. Here's everything you need to know about the newest version of the protocol. The post TLS 1.3: Everything you need to know ...