Jump to content
  • entries
  • comments
  • views

Entries in this blog

Cloning a Code Signing certificate or how to reduce antivirus detections in 60 seconds

Code signing is an important security mechanism that allows users to establish trust in the application they are about to run. For security purposes, developers must use code signing certificates to confirm that the application is legitimate and has not been modified by intruders. How does a code signing certificate get cloned? To understand how this attack works, you need to understand how the code signing process works. When signing code, a key pair (public and private key) is used t


_xvi in Anti-Viruses

  • Create New...