Cloud Snooper Attack Uses Innocent-Looking Requests to Bypass Firewall Rules
2 min read - Security researchers discovered a new attack they're calling "Cloud Snooper" that uses innocent-looking requests to bypass the rules of many, if not most, firewalls.