From federation to fabric: IAM’s evolution

In the modern day, we’ve come to expect that our various applications can share our identity information with one another. Most of our core systems federate seamlessly and bi-directionally. This means that you can quite easily register and log in to a given service with the user account from another service or even invert that […]

The post From federation to fabric: IAM’s evolution appeared first on Security Intelligence.

Continue reading From federation to fabric: IAM’s evolution

How threat actors abuse OAuth apps

OAuth apps have become prominent in several attack groups’ TTPs in recent years. OAuth apps are used for every part of the attack process. In this Help Net Security video, Tal Skverer, Research Team Lead at Astrix Security, shares insights on how… Continue reading How threat actors abuse OAuth apps

3 ways to combat rising OAuth SaaS attacks

OAuth attacks are on the rise. In December, the Microsoft Threat Intelligence team observed threat actors misusing OAuth apps to take over a cloud server and mine cryptocurrency, establish persistence following business email compromise and launch spam… Continue reading 3 ways to combat rising OAuth SaaS attacks

Malware Leveraging Google Cookie Exploit via OAuth2 Functionality

By Deeba Ahmed
CloudSEK found a major Google exploit allowing persistent access after password changes. Among others, Lumma, an infostealer malware,…
This is a post from HackRead.com Read the original post: Malware Leveraging Google Cookie Exploi… Continue reading Malware Leveraging Google Cookie Exploit via OAuth2 Functionality

can we use access token as session cookie in browser? and how to protect it?

The scenario is: you have refresh token that is valid for a longer period of time and an access token that is valid for a shorter period of time.
The setup: There is a client, application server and authentication server.
The client stores… Continue reading can we use access token as session cookie in browser? and how to protect it?

Microsoft: Storm-1283 Sent 927,000 Phishing Emails with Malicious OAuth Apps

By Deeba Ahmed
Cloud Security Shakeup: Experts Urge Caution as OAuth Becomes Hacker Playground.
This is a post from HackRead.com Read the original post: Microsoft: Storm-1283 Sent 927,000 Phishing Emails with Malicious OAuth Apps
Continue reading Microsoft: Storm-1283 Sent 927,000 Phishing Emails with Malicious OAuth Apps