Today’s whitelisted applications are tomorrow’s security breaches
You may have seen the news last week, but if you haven’t, let me bring you up to speed. The research team at PerimeterX disclosed a “CSP bypass” involving the use of Google Analytics. Naturally, this generated a lot of buzz - which is great if the nature of the ... Read More
Today’s whitelisted applications are tomorrow’s security breaches
You may have seen the news last week, but if you haven’t, let me bring you up to speed. The research team at PerimeterX disclosed a “CSP bypass” involving the use of Google Analytics. Naturally, this generated a lot of buzz - which is great if the nature of the ... Read More
When is a “CSP bypass” not a CSP bypass?
You may have seen the news last week, but if you haven’t, let me bring you up to speed. The research team at PerimeterX disclosed a “CSP bypass” involving the use of Google Analytics. Naturally, this generated a lot of buzz - which is great if the nature of the ... Read More
When is a CSP bypass not a CSP bypass?
You may have seen the news last week, but if you haven’t, let me bring you up to speed. The research team at PerimeterX disclosed a “CSP bypass” involving the use of Google Analytics. Naturally, this generated a lot of buzz - which is great if the nature of the ... Read More