How to prevent credential stealing of customers via phishing and domain squatting

Threat actors are creating lookalike domains (ex. Telecom.com to te1ecom.com), and using those to phish users for credentials (not employees). They’re getting the MFA tokens, too.
What could be done so that the client-side code couldn’t be… Continue reading How to prevent credential stealing of customers via phishing and domain squatting

How integrity is compromised if forward secrecy is not enabled in TLS communication?

If TLS communication uses ciphers that does not support forward secrecy[FS] (like RSA key exchange ciphers), confidentiality of the past communication is compromised if the private key is compromised. But will the integrity also gets compr… Continue reading How integrity is compromised if forward secrecy is not enabled in TLS communication?

What is difference & link between threat modelling and vulnerability assessment?

My understanding is that, threat modelling is used at the design stage to identify the possible threats, prioritize them and help in identifying security requirements/security controls. Vulnerability assessment is done during development a… Continue reading What is difference & link between threat modelling and vulnerability assessment?

Which attribute in DN is commonly used to specify the class/type/usage of certificate/end-entity?

I have a private CA which provides certificates for three types of IoT devices (Type1, Type2 and Type3). On the IoT device certificate’s subject DN, which attribute can be used for specifying this type information? Is there any existing us… Continue reading Which attribute in DN is commonly used to specify the class/type/usage of certificate/end-entity?