How attackers use public information for reconnaissance: what compliance programs miss | Vulnox Blog