Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

It's not buried; it's in the 2nd sentence of the abstract/summary:

"leveraging a subdomain takeover vulnerability"



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: