SecurityBrief Asia logo
Asia's leading source of cybersecurity and cyber-attack news

Venafi news stories - Page 2

Story image
Venafi
Security professionals want to return fire – Venafi
Seventy-two percent of professionals surveyed believe nation-states have the right to ‘hack back’ cybercriminals.
Story image
Dark web
SSL/TLS certificate marketplaces thriving on dark web - study
These services deliver machine-identities-as-a-service to cybercriminals who wish to spoof websites, eavesdrop on encrypted traffic, perform man-in-the-middle attacks and steal sensitive data.
Story image
Identity and Access Management
Venafi and nCipher Security partner on machine identity protection
Cryptographic keys serve as machine identities and are the foundation of enterprise information technology systems.
Story image
Phishing
Cyber criminals using lookalike online shopping domains to phish buyers
Because they point to malicious online shopping sites that mimic legitimate, well-known retail websites, it makes it increasingly difficult for customers to detect the fake domains.
Story image
Venafi
Study: 80% of enterprises struggle to protect machine identities
The study focused on enterprise machine identity protection challenges and included responses from 350 senior IT security professionals.
Story image
Hackers
Exclusive: Venafi talks weaponisation of machine identities
As companies integrate more digital tools into their business, many of them remain unaware of the risk code-signing certificates are exposing them to.
Story image
Scams
Scammers spoof UK university domains as part of massive fraud campaign
Action Fraud UK is warning people to be wary of any emails they receive that look like they belong to UK university email addresses.
Story image
Endpoint Protection
Venafi announces new enterprise endpoint management solution
Organisations must provide mobile devices of all types with secure machine identities that support authentication, encryption and decryption.
Story image
Venafi
Four Major Misunderstandings about public key infrastructure (PKI)
There’s a misconception that public key infrastructure (PKI) is dead.
Story image
Cybersecurity
70% of security experts say social media should be government regulated
A survey has found the majority believe social media data collection needs to be regulated, despite having little faith in their governments.
Story image
Cybersecurity
Venafi announces business growth and expansion plans
Over the past year, Venafi has seen significant growth and success across every part of its business.
Story image
Symantec
Blunder by Trustico revokes 23,000 website certificates
23,000 customers of Trustico recently received an email informing them their website security certificates will be rendered useless within 24 hours.
Story image
Encryption
Assessing the rising threat of encrypted tunnels
Venafi senior technical manager Nick Hunter takes a look at five key threats posed by encrypted tunnel attacks.
Story image
Cybersecurity
INTERVIEW: What Google’s decision to distrust Symantec certificates means
Last year Chrome announced a formal plan to remove trust from Symantec-issued certificates - Venafi's Walter Goulet discusses the implications.
Story image
Cybersecurity
Malicious Reddit clone fooling users into giving away logins
A simple typo is taking users to a seemingly secure Reddit clone that is actually stealing their login details - we have commentary from two experts.
Story image
Encryption
Four steps organisations can take to protect against encrypted tunnel attacks
Nefarious actors can use encrypted tunnels to pivot across corporate networks, eavesdrop, route traffic to phishing websites & access sensitive data.
Story image
Cybersecurity
Cyber warfare set to surge in 2018 but expert says Britain is not prepared
Cyber war has exploded and is now quite literally on our doorstep - despite this an expert claims Britain's defences are severely underfunded.
Story image
Cybersecurity
Cybersecurity experts opine on confession it’s not if but when UK is attacked
Ciaran Martin says the UK has been ‘fortunate’ to avoid an attack that could cause devastating disruption to elections or critical infrastructure.
Story image
Encryption
Six questions every business needs to consider to measure their cyber security
For those of you reading this that don’t know your binary from a recursive hole in the ground, it’s important to have a little foundational knowledge.
Story image
Venafi
Poor SSH key management an open invitation for malicious threats
Organisations that use Secure Shell (SSH) technologies and keys are doing a poor job of making sure they are secure, survey finds.
Story image
LinkedIn
LinkedIn’s outage blunder left users exposed and was ‘easily preventable’
LinkedIn went down yesterday in countries across the world due to an SSL certificate expiry, leaving some users' data at risk with no encryption.
Story image
Cybersecurity
Illicit code signing certificates more valuable than handguns
Venafi has released its findings of a six month investigation into the lucrative sale of digital code signing certificates on the dark web.
Story image
Bluetooth
Experts comment: Behind the Bluetooth 'BlueBorne' zero-days
As news spreads of the Bluetooth zero-day that affects more than 5 billion devices, security experts are warning users to use Bluetooth with caution.
Story image
Elections
State-sponsored election hacks are acts of cyber warfare - survey
78% of respondents said they would deem an act as cyber war if a nation-state was behind a successful or attempted hack of another country’s election.