Tuesday, March 4, 2025
HomeInfosec- ResourcesFinally, Symantec sells of Digital Certificate(SSL) Business to DigiCert Inc

Finally, Symantec sells of Digital Certificate(SSL) Business to DigiCert Inc

Published on

SIEM as a Service

Follow Us on Google News

Today Symantec announced that they are to sell Digital certificate(SSL) business to DigiCert Inc for $950 million plus.Problems started from 2015 where Google had issues in Symantec certificate issuance process.

Security engineers from Google and Firefox engineers discovered that Symantec misissued around 127 SSL certificates, as the investigation progress this underlying estimation developed to an outstanding figure of more than 30,000 certificates.

Also Read  Google Announces Final Decision in Distrusting Symantec SSL Certificates

With the recent update from Chrome 70 (expected late October 2018). All Symantec certificates issued from their present roots will not be trusted on this date if legitimate re-issuance move was not made.

To avoid this Symantec need to rebuild a new PKI infrastructure and certificates need to be issued with it, which is not a simple process.

So Finally Symantec has now announced the sale of its PKI business, for “US$950 million in upfront cash proceeds and approximately a 30 percent stake in the common stock equity of the DigiCert business at the closing of the transaction.”

Transitioning our Website Security and related PKI solutions to DigiCert allows us to sharpen our enterprise focus on delivering unparalleled protection for the cloud generation through Symantec’s Integrated Cyber Defense Platform. says Symantec CEO Greg Clark.
We carefully examined our options to ensure our customers would have a world-class experience with a company that offers a modern website PKI platform and is poised to lead the next generation of website security innovation. I’m thrilled that our customers will benefit from a seamless transition to DigiCert Clark added.

Also Read Fast and Complete SSL Scanner to Find Mis-configurations affecting TLS/SSL Severs-A Detailed Analysis

Digicert

DigiCert one of the leading certificate provider and having 2.2% of SSL certificate as per W3Techs.

We look forward to building a great security company and supporting all of Symantec’s and DigiCert’s customers well into the future. We have assembled the best team in the industry to help us deliver even better security solutions and service to our customers,” said DigiCert CEO John Merrill.

When compared to Symantec, DigiCert is a smaller Certification Authority. Now DigiCert needs to ensure a smooth Transition and to lift the penalty imposed by Google.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Docusnap for Windows Flaw Exposes Sensitive Data to Attackers

A recently disclosed vulnerability in Docusnap's Windows client software (CVE-2025-26849) enables attackers to decrypt...

CISA Warns of Active Exploitation of Microsoft Windows Win32k Vulnerability

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2018-8639, a decade-old Microsoft Windows...

Update Alert: Google Warns of Critical Android Vulnerabilities Under Exploit

Google’s March 2025 Android Security Bulletin has unveiled two critical vulnerabilities—CVE-2024-43093 and CVE-2024-50302—currently under...

BigAnt Server 0-Day Vulnerability Lets Attackers Run Malicious Code Remotely

A critical vulnerability in BigAntSoft's enterprise chat server software has exposed ~50 internet-facing systems...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Is this Website Safe: How to Check Website Safety – 2025

is this website safe? In this digital world, Check a website is safe is...

LegionLoader Abusing Chrome Extensions To Deliver Infostealer Malware

LegionLoader, a C/C++ downloader malware, first seen in 2019, delivers payloads like malicious Chrome...

PentestGPT – A ChatGPT Powered Automated Penetration Testing Tool

GBHackers come across a new ChatGPT-powered Penetration testing Tool called "PentestGPT" that helps penetration...