Using applications as an attack vector, in a DDoS campaign for example, is not new. But application abuse is evolving […]