By looking through CT logs an attacker can gather a lot of information about organization’s infrastructure i.e. internal domains,email addresses …

By looking through CT logs an attacker can gather a lot of information about organization’s infrastructure i.e. internal domains,email addresses …