"Covert Data Channel in TLS Dodges Network Perimeter Protection"
A new method has been identified by security researchers at Fidelis Cybersecurity that could be used by attackers to covertly exchange data during TLS negotiation and circumvent network perimeter defenses. This technique is performed through the exploitation of the public key certificate standard X.509. This article further discusses the method and the research behind it.
Threatpost reports "Covert Data Channel in TLS Dodges Network Perimeter Protection"
Submitted by Anonymous
on