The Perils of Expired Domains: We're Reading Your Email
When we think about attack surfaces, historical thinking has thrown us at
network services, web applications, APIs and other 'fuller stack' technology
layers to review for high-impact weaknesses.
But, as real attackers, we look at organisations holistically and consider
anything that is exposed to the Internet or could be abused