The Dangers of Legacy ProtocolsHow poisoning legacy broadcast name resolution protocols led to domain compromiseIn a recent (more…)Rachel Braford2025-04-03T16:01:17+00:00Tags: pen|
Exploiting API EndpointsRelying on frontend controls for access (more…)Rachel Braford2024-12-13T23:46:26+00:00Tags: pen|