Architecture, Network security, Strategy, Vulnerability management

Researcher details decades-old design flaws in Microsoft’s CTF protocol

SC StaffAugust 14, 2019