
Sign up to save your podcasts
Or


Attackers are using CT logs to identify brand new WordPress sites and install malware before upcoming security measures are in place. This attack is novel in how it exploits Certificate Transparency information to identify likely targets. In this episode we explain what is happening and why it's noteworthy.
By Tim Callan and Jason Soroko5
1515 ratings
Attackers are using CT logs to identify brand new WordPress sites and install malware before upcoming security measures are in place. This attack is novel in how it exploits Certificate Transparency information to identify likely targets. In this episode we explain what is happening and why it's noteworthy.

30,609 Listeners

187 Listeners

2,011 Listeners

1,649 Listeners

372 Listeners

371 Listeners

651 Listeners

1,028 Listeners

8,077 Listeners

315 Listeners

195 Listeners

8,043 Listeners

6,097 Listeners

10,254 Listeners

45 Listeners