Login
From:
johnjhacking.com
(Uncensored)
subscribe
Hack the Galaxy
https://johnjhacking.com/blog/zix-exfiltration/
links
backlinks
A business logic flaw in various Zix configurations allows a threat actor to perform native data exfiltration from the context of the organization's own trust.
Roast topics
Find topics
Roast it!
Roast topics
Find topics
Find it!
Roast topics
Find topics
Find it!