1.31.19
Hacker, Interrupted
What happens when you find a data leak in your own environment using your own network traffic analysis product? You investigate, of course, and record the whole process. Read on to learn how I used Reveal(x) to catch the fake Postman Chrome extension red-handed, complete with screenshots of the hunt.
Matt Schurr