Digital Certificates - Models for Trust and Targets for Misuse
To automate the whole process, different actors have been developing tools that can spoof entire certificate chains and automatically sign applications.
Read More
Get the best of RL Blog delivered to your in-box weekly to stay up to date on key trends, analysis and best practices across threat intelligence and software supply chain security.