Back to Browse

How Attackers Abuse Trusted Code Signing Systems

May 11, 2026
7:22

Most attackers do not break cryptography — they inherit trusted signing authority. This video examines how compromised keys, CI/CD pipelines, insiders, and supply-chain vendors are used to distribute malicious software through legitimate signing paths. Topics covered: Stolen signing certificates CI/CD pipeline compromise Signed malware and trusted abuse Supply chain attacks Insider misuse Revocation failures Governance failures behind modern incidents Part of the Code Signing Authoritative Series.

Download

0 formats

No download links available.

How Attackers Abuse Trusted Code Signing Systems | NatokHD