Are there HTTP/2 specific attacks different from request smuggling?

I’m researching information about HTTP/2 from a cybersecurity point of view for an article, and i wanted to include a section about attacks exclusive to HTTP/2 or were this protocol have a key role.
I already got information about request … Continue reading Are there HTTP/2 specific attacks different from request smuggling?