Cyber Defense Advisors

Subdomains — uses and attacks

ACM.235 Why you might want to configure a subdomain and how attackers can abuse misconfigurations through subdomain takeover