1. Counterfeit Code

    Malware writers are obtaining VALID code-signing certificates from other cyber criminals who are using stolen credentials from REAL companies to generate them. Check out the report by Insikt Group. Host-based controls may be rendered ineffective by legitimate code-signing certificates. Click Here t…Read More