How to analyze metadata and hide it from hackers
EASM
In this post, we’re going to explore the dangers and risks of the tip of a very huge iceberg of...
The dangerous art of subdomain enumeration
EASM
Subdomain enumeration is an essential part of the reconnaissance phase in the cyber kill chain. This is where cyber-attackers map...