Tag: Abused Code-signing

Stolen Code Signing Certificate

Hackers Signed Malware With Stolen Code Signing Certificate From Tech- Companies

A code signing certificate allows an application developer to sign their software before publishing to the web and the end-users can verify the author’s...
Abused Code-signing

Hackers Illegally Purchasing Abused Code-signing & SSL Certificates From Underground Market

Threat actors using Abused Code-signing certificate from reputable companies as a layer of obfuscation in distributing malicious payloads. Abused Codesigning certificates would provide integrity for...


Signup to get Hacking News & Tutorials to your Inbox

Computer Security