Redirecting you to

Resource Library

Looking for something? Search or browse our extensive library of resources.

Start typing to search tags.

Advanced Filters

Filter by Tag

Clear Selection

Filter by Date Range

  • Learn More

    AT&T Discloses 2022 Data Breach Affecting Nearly Every Customer

    A News Article from Sectigo

    News Article Jul 12, 2024

    On July 12, 2024, AT&T disclosed a data security incident that occurred in 2022. The company confirmed that unauthorized individuals accessed customer data stored on a third-party cloud platform.

  • Learn More

    FishXProxy Phishing Kit Outfits Cybercriminals for Success

    A News Article from Sectigo

    News Article Jul 12, 2024

    A fresh end-to-end phishing toolkit is making the rounds that significantly lowers the barrier to entry for cybercriminals to successfully mount and manage malicious email attacks that evade typical security protections.

  • Learn More

    Understanding The 5 Pillars of Certificate Lifecycle Management

    A Blog Post from Sectigo

    Blog Post Jul 12, 2024

    Certificate Lifecycle Management (CLM) involves discovering, issuing, renewing, and revoking digital certificates, crucial for enterprise cybersecurity. Key pillars: Discover, Deploy, Revoke and Replace, Renew, Integration.

  • Listen Now
    Root Causes - A PKI & Security Podcast

    EPISODE 403

    Broadcast Date:
    July 12, 2024

    21 minutes

    Podcast Jul 12, 2024

    Root Causes 403: NIST PQC Contest Round 4 and Onramp with Dustin Moody

    We are joined again by Dustin Moody, who leads the NIST search for PQC algorithms. We cover going-forward efforts, including Round 4 and the Onramp.

  • Learn More

    Eldorado Ransomware Strikes Windows and Linux Networks

    A News Article from Sectigo

    News Article Jul 10, 2024

    Security researchers have uncovered significant insights into the latest iteration of Ransomware-as-a-Service (RaaS) known as Eldorado.

    The sophisticated malware, designed to target both Windows and Linux operating systems, utilizes the programming language Golang to facilitate its cross-platform attacks.

  • Learn More

    Eldorado Ransomware Cruises Onto the Scene to Target VMware ESXi

    A News Article from Sectigo

    News Article Jul 09, 2024

    The ransomware-as-a-service platform just rolled off the assembly line, also targets Windows, and uses Golang for cross-platform capabilities.


  • Learn More

    Eldorado Ransomware Targeting Windows and Linux with New Malware

    A News Article from Sectigo

    News Article Jul 09, 2024

    Group-IB researchers report a sharp rise in Eldorado – Golang-based ransomware with cross-platform encryption- operations, targeting various industries. Learn how Eldorado ransomware affiliates operate and how to protect your business from attacks.

  • Learn More

    Essential Cyber Resilience Frameworks — Review & Guide

    A News Article from Sectigo

    News Article Jul 09, 2024

    Building and maintaining a cyber resilience framework is essential for defending against cyberattacks, involving continuous updates and new policies. Cyber resilience ensures that organizations can anticipate, withstand, recover from, and adapt to cyber threats. Jason Soroko from Sectigo underscores the need for thorough risk assessments, robust security architectures, and continuous monitoring. Overall, achieving cyber resilience involves proactive measures, regular system monitoring, employee training, and implementing advanced technologies for swift threat detection and response.

  • Learn More

    New Ransomware Group Eldorado Targets Mainly US Organizations

    A News Article from Sectigo

    News Article Jul 09, 2024

    Eldorado, a new ransomware-as-a-service group, has targeted 16 organizations, mostly in the US, since its emergence in spring 2024. Focusing on sectors like real estate and healthcare, Eldorado uses Golang for cross-platform attacks and encrypts files with ChaCha20 and RSA-OAEP. Its ability to shut down and encrypt virtual machines severely disrupts business operations. Experts advise using multi-factor authentication, endpoint detection, regular backups, timely patching, and continuous employee training to defend against such threats.

  • Listen Now
    Root Causes - A PKI & Security Podcast

    EPISODE 402

    Broadcast Date:
    July 9, 2024

    15 minutes

    Podcast Jul 09, 2024

    Root Causes 402: New Social Engineering Powershell Attack

    A new social engineering exploit instructs victims to enter command line prompts to hack themselves on behalf of the hacker.

  • Listen Now
    Root Causes - A PKI & Security Podcast

    EPISODE 401

    Broadcast Date:
    July 5, 2024

    10 minutes

    Podcast Jul 05, 2024

    Root Causes 401: New SSH Remote Code Execution Vulnerability Revealed

    A newly revealed OpenSSH vulnerability can open enterprises to remote code execution. We explain what is happening and what to do about it.

  • Download Now

    Case Study: Rijkswaterstaat

    A Case Study from Sectigo

    Case Study Jul 04, 2024

    Sectigo CLM delivers security and universal visibility from a single pane of glass for Rijkswaterstaat.