Latest Tech News

Stay updated with the latest in technology, AI, cybersecurity, and more

Filtered by: csp Clear Filter

OCSP Service Has Reached End of Life

Today we turned off our Online Certificate Status Protocol (OCSP) service, as announced in December of last year. We stopped including OCSP URLs in our certificates more than 90 days ago, so all Let’s Encrypt certificates that contained OCSP URLs have now expired. Going forward, we will publish revocation information exclusively via Certificate Revocation Lists (CRLs). We ended support for OCSP primarily because it represents a considerable risk to privacy on the Internet. When someone visits a

CRLite: Certificate Revocation Checking in Firefox

Firefox is now the first and the only browser to deploy fast and comprehensive certificate revocation checking that does not reveal your browsing activity to anyone (not even to Mozilla). Tens of millions of TLS server certificates are issued each day to secure communications between browsers and websites. These certificates are the cornerstones of ubiquitous encryption and a key part of our vision for the web. While a certificate can be valid for up to 398 days, it can also be revoked at any p

More VMware cloud partners axed as Broadcom launches new invite-only program

Broadcom is kicking some cloud service providers (CSPs) out of the VMware channel partner program, bringing uncertainty for the technological and financial futures of numerous businesses, especially small-to-medium-sized ones. As reported by The Register today, Broadcom this week revealed to VMware CSP partners that it is launching a new invite-only channel program for CSPs on November 1. Fewer CSPs are expected to be eligible for this new program. The Register said that “some mid-size partners

Citrix warns of login issues after NetScaler auth bypass patch

Citrix warns that patching recently disclosed vulnerabilities that can be exploited to bypass authentication and launch denial-of-service attacks may also break login pages on NetScaler ADC and Gateway appliances. This happens because starting with NetScaler 14.1.47.46 and 13.1.59.19, the Content Security Policy (CSP) header, which mitigates risks associated with cross-site scripting (XSS), code injection, and other client-side attacks, is enabled by default. However, while it is designed to b