Feb. 8, 2024, 4:30 a.m. | Help Net Security

Help Net Security www.helpnetsecurity.com

OAuth apps have become prominent in several attack groups’ TTPs in recent years. OAuth apps are used for every part of the attack process. In this Help Net Security video, Tal Skverer, Research Team Lead at Astrix Security, shares insights on how threat actors abuse OAuth apps as an easy, unmonitored way into companies’ environments.

The post How threat actors abuse OAuth apps appeared first on Help Net Security.

abuse access control access management application security apps astrix security attack attack groups attacks companies cybersecurity don't miss easy help net security hot stuff insights oauth process research security team threat threat actors ttps video

Deputy Chief Information Security Officer

@ United States Holocaust Memorial Museum | Washington, DC

Humbly Confident Security Lead

@ YNAB | Remote

Information Technology Specialist II: Information Security Engineer

@ WBCP, Inc. | Pasadena, CA.

Head of Incident Response

@ Halcyon | Remote

Consultant Sénior Cyber Sécurité H/F

@ Hifield | Lyon, France

Staff Application Security Engineer (AppSec) - Open to remote across ANZ

@ Canva | Sydney, Australia