The vulnerability was found through the company’s bug bounty program, now in its tenth year.
This post appeared first on WIRED Security
Author: Lily Hay Newman
The vulnerability was found through the company’s bug bounty program, now in its tenth year.
This post appeared first on WIRED Security
Author: Lily Hay Newman