OAuth Consent Phishing Ramps Up with Microsoft Office 365 Attacks
Attackers gain read-only permissions to snoop around Office 365 accounts, including emails, contacts and more.
Read MoreAttackers gain read-only permissions to snoop around Office 365 accounts, including emails, contacts and more.
Read MoreVulnerabilities ‘that have existed for years’ in WS-Trust could be exploited to attack other services such as Azure and Visual Studio.
Read MoreThe Russia-linked threat group is harvesting credentials for Microsoft’s cloud offering, and targeting mainly election-related organizations.
Read MoreAttackers check the victims’ Office 365 credentials in real time as they are typed into the phishing landing page, by using authentication APIs.
Read MoreMalicious attachments continue to be a top threat vector in the cybercriminal world, even as public awareness increases and tech companies amp up their defenses.
Read MoreMalicious attachments continue to be a top threat vector in the cybercriminal world, even as public awareness increases and tech companies amp up their defenses.
Read MoreUp to 200,000 patient records from Office 365 and Google G Suite exposed by hardcoded credentials and other improper access controls.
Read MoreLegacy applications don’t support modern authentication — and cybercriminals know this.
Read MoreLegacy applications don’t support modern authentication — and cybercriminals know this.
Read MoreBy continuing to use the site, you agree to the use of cookies. more information
The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.