Roast topics
Find topics
Roast it!
Roast topics
Find topics
Find it!
Login
From:
johnjhacking.com
(Uncensored)
subscribe
Hack the Galaxy
https://johnjhacking.com/blog/zix-exfiltration/
links
backlinks
A business logic flaw in various Zix configurations allows a threat actor to perform native data exfiltration from the context of the organization's own trust.