×
Please click
here
if you are not redirected within a few seconds.
All
Images
Videos
News
Maps
Shopping
Books
Search tools
Archives
Recent
Past hour
Past 24 hours
Past week
Past month
Past year
Archives
Sorted by relevance
Sorted by relevance
Sorted by date
Clear
Hidden OAuth attack vectors
PortSwigger
Intro The OAuth2 authorization protocol has been under fire for the past ten years. You've probably already heard about plenty of...
38 months ago
3 ways to combat rising OAuth SaaS attacks
Help Net Security
OAuth attacks are on the rise. In December, the Microsoft Threat Intelligence team observed threat actors misusing OAuth apps to take over a...
4 months ago
5 Tips on Using OAuth 2.0 for Secure Authorization
eSecurity Planet
OAuth 2.0 can be an effective authorization method. Here we offer tips on implementing and using an OAuth 2.0 authorization server using the...
91 months ago
Threat actors misuse OAuth applications to automate financially driven attacks
Microsoft
Threat actors are misusing OAuth applications as an automation tool in financially motivated attacks. OAuth is an open standard for...
5 months ago
The OAuth Flows You Need for Modern Security
The New Stack
A lot has happened around the OAuth and OpenID specifications. Some flows have updated, others deprecated and some added.
21 months ago
Critical OAuth Flaws Uncovered in Grammarly, Vidio, and Bukalapak Platforms
The Hacker News
Critical security flaws have been disclosed in the Open Authorization (OAuth) implementation of popular online services such as Grammarly,...
7 months ago
Microsoft fell victim to OAuth attack it issued warning about
SC Media
Microsoft said it was also compromised via the same OAuth app abuse it warned about and offers tips to detect and protect.
4 months ago
Social Logins with Oauth.io - Log in with Anything, Anywhere — SitePoint
SitePoint
Memi Allamani takes you through a crash course of implementing a merged Google+ / Facebook login with Oauth.io.
89 months ago
Attackers Target Microsoft Accounts to Weaponize OAuth Apps
Dark Reading
Threat actors are abusing organizations' weak authentication practices to create and exploit OAuth applications, often for financial gain,...
5 months ago
SAML vs. OAuth: What is Federated Identity Management?
FedTech Magazine
Federated Identity Management allows for more system control, and seamless user experiences. Learn what FIM is, and what you need to know...
52 months ago