Our Recent Posts

Archive

Tags

No tags yet.

Common Vulnerabilities and Exploits Series - Episode 1 - GET Requests

GET requests can be used to manipulate your HTML web pages for phishing campaigns, session stealing and other malicious purposes.