Security defenders can run these queries against Certificate Transparency logs to identify misconfigured SSL certificates before they can be used by adversaries to map out attacks.
Go to Source
Author: Dark Reading Staff, Dark Reading
Cyber Security Expert
Go to Source
Author: Dark Reading Staff, Dark Reading