Study: How Well Are You Protecting Code Signing Certificates?

Code signing processes are used to secure and assure the authenticity of software updates for a wide range of software products, including firmware, operating systems, mobile and cloud applications, and application container images. However, over 25 million malicious binaries are enabled with code signing certificates, so it’s clear that cybercriminals are gaining access to private keys and allowing them to misuse these certificates in their attacks.

Read full article on Dzone