1

Inbox Invasion: Exploiting MIME Ambiguities to Evade Email Attachment Detectors
Where URLs Become Weapons: Automated Discovery of SSRF Vulnerabilities in Web Applications
Under the Dark: A Systematical Study of Stealthy Mining Pools (Ab)use in the Wild