SSL

Bypassing and Disabling SSL Pinning on Android to Perform Man-in-the-Middle Attack

Certificate Pinning is an extra layer of security to achieve protection against man-in-the-middle. It ensures only certified Certificate Authorities (CA)…

11 months ago

FortiOS SSL-VPN Zero-day Flaw Exploited to Attack Government Organizations

There have been a number of attacks against government organizations and government-related targets using FortiOS SSL-VPN zero-day vulnerabilities patched by…

1 year ago

What are the Most Common Types of SSL Errors and How to Fix Them?

Recurring SSL certificate error warnings can result in significant negative consequences, such as customer attrition, financial losses, and reputational damage.…

2 years ago

Why Are DV Certificates Hot Favourites Of Hackers?

SSL Certificates and their data encryption capabilities are indispensable to website security. However, not all SSL certificates are equal. SSL…

3 years ago

HTTPS Strict Transport Security (HSTS): What is It and How it Works?

Have you got HTTPS protocol working on your web server? If you answered in yes, that’s great. But have you…

4 years ago

FBI Warns that Hackers use Secure HTTPS Websites to Trick Users and to Steal Sensitive Logins

FBI issued a warning that threat actors use secure HTTPS websites to trick the users and to acquire sensitive login…

5 years ago

Fast and Complete SSL Scanner to Find Mis-configurations affecting TLS/SSL Severs-A Detailed Analysis

We are moving fast to the encrypted world and the usage of TLS certificates increased dramatically.Transport Layer Security is the…

6 years ago

TLS 1.3 Released – Most Important Security Protocol on the Internet with Extreme Privacy, Security, and Performance

An Internet's most Important security protocol TLS 1.3 released with various improvement to perform a secure communication for online commerce, medicine,…

6 years ago

Transport Layer Security (TLS) 1.3 approved by IETF With the 28th Draft

The much required Transport Layer Security version TLS 1.3 approved finally by IETF after 28 drafts. TLS 1.3 is not…

6 years ago

Hackers Illegally Purchasing Abused Code-signing & SSL Certificates From Underground Market

Threat actors using Abused Code-signing certificate from reputable companies as a layer of obfuscation in distributing malicious payloads. Abused Codesigning…

6 years ago