Security vulnerabilities due to resource reuse (subdomain takeover is just one example of this) are rampant and readily exploitable for tons of major companies, especially as cloud providers and SaaS often overlook these as being client responsibilities.<p>Shameless plug, I’ve worked on identifying/characterizing these issues on cloud providers: <a href="https://arxiv.org/pdf/2204.05122.pdf" rel="nofollow">https://arxiv.org/pdf/2204.05122.pdf</a><p>It’s only a matter of time before adversaries become more sophisticated at identifying and exploiting these in bulk.