Digging Into Certificate Revocation Lists

In this blog we shall reveal the uses for certificates, uncover how to
combat abused certificates and dig deep into an example of how
malicious software can be digitally signed to pass certification
verification.
What is a certificate?
In cryptograp…