What to Do When a Memory Corruption on an Input String Generates a DoS

Co-authored by Serena Mancini. We often think of vulnerabilities as complex technical problems that are difficult to discover and exploit.

Read full news article on Security Intelligence