Google calls for halting use of WHOIS for TLS domain verifications
Threat actors can exploit WHOIS data verification to fraudulently obtain TLS certificates, prompting calls for a reevaluation of verification practices.
How researchers paid $20 and undermined internet integrity
Researchers found a vulnerability in the WHOIS protocol that could undermine certificate authorities and expose systems to potential exploitation.
The migration of WHOIS servers can leave expired domains vulnerable to exploitation, posing security risks for millions of systems.
Google calls for halting use of WHOIS for TLS domain verifications
Threat actors can exploit WHOIS data verification to fraudulently obtain TLS certificates, prompting calls for a reevaluation of verification practices.
How researchers paid $20 and undermined internet integrity
Researchers found a vulnerability in the WHOIS protocol that could undermine certificate authorities and expose systems to potential exploitation.
The migration of WHOIS servers can leave expired domains vulnerable to exploitation, posing security risks for millions of systems.