An attacker can hide amidst legitimate traffic in the application’s update function.

By admin