A business logic flaw in various Zix configurations allows a threat actor to perform native data exfiltration from the context of the organization's own trust.| johnjhacking.com
A business logic flaw in various Zix configurations allows a threat actor to perform native data exfiltration from the context of the organization's own trust.| johnjhacking.com