Security Dive Select a topic DFIR Security and Tech Security basics Threat research Vulnerabilities Select an industry Application Security Artificial Intelligence Cloud security Data security Endpoints OT and IoT Resilience Threat Detection and Response Trusted identities Zero Trust CA/Browser Forum Code Signing Certificate Requirements: what is it and what to do about it? Discover October 2022 CA/Browser Forum requirements for the issuance and management of publicly‐trusted code signing certificates. Distributed Denial of 2023 Get insights into the major Distributed Denial of Service (DDoS) attacks of 2023, including attacker methods, data collection, and impacts on targets. Domain spoofing Learn about domain spoofing, its techniques like typosquatting and homograph attacks, and effective strategies to protect against these threats. Writeup Drive Hackthebox Explore a detailed guide on pentesting, covering essential techniques, tools like Nmap and Gobuster, and strategies for privilege escalation. From zero to certificate hero. The 5 Steps to a mature Certificate Lifecycle Management Learn how to manage your certificates with our 5-step model for a mature Certificate Lifecycle Management (CLM), from policy creation to automation. Citrix NetScaler flaw exposing sensitive data Explore the critical Citrix NetScaler vulnerability CVE-2023-4966, its impact on sensitive data exposure, and the necessary mitigation steps Prev1/3Next