From Certificate Transparency Logs to Vulnerabilities
In this blog post, we’ll learn about Certificate Transparency logs and how they can be used in threat hunting and bug bounty programs to discover newly created assets. These fresh assets are often less secure, making them a great target for finding v...
hexlog.hashnode.dev3 min read