Getting Inside the Mind of an Attacker: TLS Attacks and Pitfalls

Transport Layer Security (TLS) is a common cybersecurity protocol that is frequently seen in email, web browsers, messaging, and other communication methods that take place over networks. TLS is relied upon to ensure secrecy using different techniques like encryption, hash functions, and digital signatures.

These days, however, nothing is immune to attack, so despite being designed to improve security, threat actors have still managed to find ways to exploit TLS. In this webinar, you’ll learn about and get recommendations on how to defend against common weaknesses vulnerability scanners uncover and attacks targeting TLS, including:

  • Weak security certificate signatures
  • Unworthy certification authorities
  • Key exchange misconfiguration
  • Manipulation attacks like BEAST, CRIME, and POODLE
Media Video

Find Out How Pen Testing Can Take Vulnerability Assessments to the Next Level

Read our blog to learn how vulnerability scans can provide a valuable picture of what vulnerabilities are present, while penetration tests can add further insight to this picture with additional context.