Security defenders can run these queries against Certificate Transparency logs to identify misconfigured SSL certificates before they can be used by adversaries to map out attacks.
Support the originator by clicking the read the rest link below.
Information about Cyber Security and Threat Intelligence should spread as fast as possible. Our goal is to collect these sources and place them all in one area for quick reading. If the information is important to the viewer and they want more information, we forward them to the direct source. The more people talking about cyber security and the more people sharing the information, the better!
If you have a resource that should be added, please let us know via the contact form. We will review the information and get back to you.