oauth abuse
WTH? Google Auth Bug Lets Hackers Login as You
Richi Jennings | | G Suite, Google Apps, Google Apps for Work, Google Workspace, OAuth, oauth 2.0, oauth abuse, Oauth Application Abuse, SB Blogwatch, securing oauth
G Suite Sours: Domain owners flummoxed as strangers get Google for their domains ...
Security Boulevard
Google Whistles While OAuth Burns — ‘MultiLogin’ 0-Day is 70+ Days Old
Richi Jennings | | access-token-manipulation, authentication token, Business Associate Agreements, Chrome, chrome 0-day, chrome phishing, Chrome Security, Chromium, Chromium-Based Browsers, Federated Identity, federated sso, google, Google Account, google account security, Google Advanced Protection, infostealer, infostealers, OAuth, oauth 2.0, oauth abuse, Oauth Application Abuse, oauth refresh token, OAuth Token Vunerability, Prisma, Protecting OAuth Tokens, SB Blogwatch, securing oauth
What a Mickey Mouse operation: Infostealer scrotes having a field day with unpatched vulnerability ...
Security Boulevard
Securing OAuth for Microsoft Environments
Emile Antone | | FEATURED, Microsoft, oauth abuse, Product Spotlights, SaaS Security, securing oauth
This blog was co-authored by Obsidian Product Manager Tim Wenzlau and Staff Security Researcher Noah Corradin. SaaS environments are a complex web of interconnectivity between SaaS platforms, third-party applications, and custom in-house ...
ServiceNow Security with the Obsidian Platform
Emile Antone | | Data Privacy, integration risk, oauth abuse, Product Spotlights, SaaS Security, servicenow security
Thousands of enterprises rely on ServiceNow to customize and automate their workflows, facilitating better communication and collaboration with IT teams, employees, and customers. To help security teams protect this critical service and ...