Speed at scale: Let’s Encrypt serving Shopify’s 4.5 million domains
What does it take to manage TLS certificates at a leading e-commerce company? Before Let’s Encrypt, it took the security team at Shopify weeks...
Fraud Scenarios in the Buy Now, Pay Later Ecosystem
Existing fraud tricks are finding new use in buy now, pay later payment systems. - Read more
What you need to know about Process Ghosting, a new executable image tampering attack
Several common process tampering attacks exploit the gap between process creation and when security products are notified. Elastic Security detects a variety of such...
Can Bots Manipulate Data and Change Facts to Fiction?
Data manipulation is a real threat to data-driven approaches at enterprises. We tested one of our own assets to see the possibilities. - Read...
What Is Phishing? How to Recognize and Avoid It
"What is phishing" is still a relevant question we're answering as the attack type and techniques evolve, victimizing even the most tech-savvy users. -...
Introducing the Cryptonice HTTPS Scanner
F5 Labs has released a new open-source tool to check for HTTPS misconfigurations of public and internally hosted HTTPS websites. - Read more
Four Risks to Consider with Expanded VPN Deployments
The rush to deploy remote access solutions can bring unexpected risks to light. - Read more
Vulnerabilities, Exploits, and Malware Driving Attack Campaigns in December 2019
Threat campaign activity in December 2019 doubled from the previous month. - Read more
Ransomware: two pieces of good news
“All your files have been encrypted.” How many times has this suddenly popped up on your screen? We hope never, because it’s one of...




