Jan. 16, 2024, 5:30 a.m. | Help Net Security

Help Net Security www.helpnetsecurity.com

OAuth attacks are on the rise. In December, the Microsoft Threat Intelligence team observed threat actors misusing OAuth apps to take over a cloud server and mine cryptocurrency, establish persistence following business email compromise and launch spam activity using the target organization’s resources and domain name. What is OAuth? A widely adopted standard that facilitates secure and delegated access to resources on the internet, OAuth (Open Authorization) is designed to address the challenges of user … More


The post …

access control adaptive shield apps attacks authentication business business email compromise cloud compromise cryptocurrency cybersecurity december domain domain name don't miss email email compromise expert analysis expert corner hot stuff intelligence launch microsoft microsoft threat intelligence mine monitoring name oauth opinion organization persistence resources rising saas saas attacks server spam target team threat threat actors threat intelligence what is

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Network Security Engineer

@ Meta | Menlo Park, CA | Remote, US

Security Engineer, Investigations - i3

@ Meta | Washington, DC

Threat Investigator- Security Analyst

@ Meta | Menlo Park, CA | Seattle, WA | Washington, DC

Security Operations Engineer II

@ Microsoft | Redmond, Washington, United States

Engineering -- Tech Risk -- Global Cyber Defense & Intelligence -- Bug Bounty -- Associate -- Dallas

@ Goldman Sachs | Dallas, Texas, United States