Answer:
Attackers use malicious browser extensions or plugins in Browser Exploitation attacks by injecting malicious code into seemingly legitimate extensions or plugins.
Attackers use malicious browser extensions or plugins in Browser Exploitation attacks by injecting malicious code into seemingly legitimate extensions or plugins.
You may be interested in:
Web Security MCQs - PART 2