Certificate Management
Read More →
Attacker searches CT logs for target organization
After conducting hundreds of penetration tests, I've discovered that certificate management represents one of the most consistently underexamined attack surfaces. This post reveals the certificate vulnerabilities that traditional pen tests miss and how attackers exploit them.
Tim Henrich
11 min read
Aug 25, 2025