Our Blog

Browsers’ cache smuggling

Reading time: ~13 min
On red team engagements, I often use social engineering to get one of my client’s employees to run my malicious...