Threat actors misuse OAuth applications to automate financially driven attacks

Threat actors are misusing OAuth applications as an automation tool in financially motivated attacks. OAuth is an open standard for token-based authentication and authorization that enables applicatio ...

Continue Reading
Microsoft Incident Response lessons on preventing cloud identity compromise

Fifty percent of Microsoft cybersecurity recovery engagements relate to ransomware,1 and 61 percent of all breaches involve credentials.2 In this second report in our ongoing Cyberattack Series, we lo ...

Continue Reading
Microsoft Incident Response lessons on preventing cloud identity compromise

Fifty percent of Microsoft cybersecurity recovery engagements relate to ransomware,1 and 61 percent of all breaches involve credentials.2 In this second report in our ongoing Cyberattack Series, we lo ...

Continue Reading
Microsoft Incident Response lessons on preventing cloud identity compromise

Fifty percent of Microsoft cybersecurity recovery engagements relate to ransomware,1 and 61 percent of all breaches involve credentials.2 In this second report in our ongoing Cyberattack Series, we lo ...

Continue Reading
Microsoft Incident Response lessons on preventing cloud identity compromise

Fifty percent of Microsoft cybersecurity recovery engagements relate to ransomware,1 and 61 percent of all breaches involve credentials.2 In this second report in our ongoing Cyberattack Series, we lo ...

Continue Reading
Microsoft Incident Response lessons on preventing cloud identity compromise

Fifty percent of Microsoft cybersecurity recovery engagements relate to ransomware,1 and 61 percent of all breaches involve credentials.2 In this second report in our ongoing Cyberattack Series, we lo ...

Continue Reading
CVE-2023-2585

This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will b ...

Continue Reading
Expired tokens can be renewed without validating the account password

Impact In versions of the proxy from 2022-09-05 onwards (since 8c874c2ff3d503ac20c7d32f46e08547fcb9e23f), expired authorisation tokens could be renewed automatically without checking their validity ag ...

Continue Reading

Back to Main

Subscribe for the latest news: