Unfortunately, this does not mean that those vulnerabilities cannot be exploited by attackers seeking fame, fortune, or revenge. They certainly can.
A series is born
Here be dragons
This series of posts will look into those problems in detail. It will also offer actionable guidance on how to find and avoid them.
Enjoying these posts? Subscribe for moreSubscribe now
Already have an account? Sign in