Our Blog

Browser Cache Smuggling: the return of the dropper

Reading time: ~8 min
A year and a half ago I wrote a blog post describing how browsers’ cache system can be abused to...

Browsers’ cache smuggling

Reading time: ~13 min
On red team engagements, I often use social engineering to get one of my client’s employees to run my malicious...