Tech Talk The Principles of a Subdomain Takeover In this blog post we will dig deep into the matter of Subdomain Takeovers, to make you understand all you need to know in order to defend yourself.
Tech Talk The Art of Subdomain Enumeration We will set you up with all you need to know about Subdomain enumeration. Cyber attackers map out the digital footprint of the target in order to find weak spots to gain for example access to an internal network. Already know enough?