ICYMI:
**Globalsign certs issued on Monday 1st Dec 2025 will not be trusted on some clients because they incorrectly use 2027 CT logs.**
You can simply reissue them to resolve the problem.
ICYMI:
**Globalsign certs issued on Monday 1st Dec 2025 will not be trusted on some clients because they incorrectly use 2027 CT logs.**
You can simply reissue them to resolve the problem.
Dans un rapport publiĂ© par eSentire, leur Threat Response Unit (TRU) a dĂ©couvert en juin 2025 une version backdoor du client SonicWall NetExtender, dĂ©signĂ©e sous le nom de SilentRoute par Microsoft. Cette version malveillante est presque identique au logiciel lĂ©gitime, mais avec des modifications subtiles permettant lâexfiltration de donnĂ©es sensibles. Le processus dâinfection commence lorsque lâutilisateur tĂ©lĂ©charge le client NetExtender depuis un site frauduleux imitant la page officielle de SonicWall. Le fichier tĂ©lĂ©chargĂ©, un installateur MSI signĂ© nommĂ© âSonicWall-NetExtender.msiâ, utilise un certificat numĂ©rique frauduleux Ă©mis par GlobalSign, permettant de contourner la protection SmartScreen de Microsoft.
20$ and a few days of enthusiasm and work granted a researcher access to way too many moving parts of the mobi. #TLD, because the #whois server domain changed. If I understand it correctly did the researcher simply register the old #domain.
arstechnica.com reports that the user was even able to "rightfully" claim ownership of certificates. The example mentioned is, that he could have claimed authority over "microsoft[.]mobi" of which #GlobalSign is the #certificate #authority.
Recommend to give this article at least a brief read.