via Articles on TechRepublic https://ift.tt/2KhFGLJ Security research firm examines configuration of core components to spot weaknesses in PFCP and HTTP/2 protocols.
No comments