While we research AI security, our critical DNS infrastructure contains legacy software with critical vulnerabilities. Read how @samwcyo, @bbuerhaus, @rhyselsmore, and @infosec_au managed to compromise 19 DNS zones including .AI.
While we research AI security, our critical DNS infrastructure contains legacy software with critical vulnerabilities. Read how @samwcyo, @bbuerhaus, @rhyselsmore, and @infosec_au managed to compromise 19 DNS zones including .AI.