can we use access token as session cookie in browser? and how to protect it?

The scenario is: you have refresh token that is valid for a longer period of time and an access token that is valid for a shorter period of time.
The setup: There is a client, application server and authentication server.
The client stores… Continue reading can we use access token as session cookie in browser? and how to protect it?

Microsoft: Storm-1283 Sent 927,000 Phishing Emails with Malicious OAuth Apps

By Deeba Ahmed
Cloud Security Shakeup: Experts Urge Caution as OAuth Becomes Hacker Playground.
This is a post from HackRead.com Read the original post: Microsoft: Storm-1283 Sent 927,000 Phishing Emails with Malicious OAuth Apps
Continue reading Microsoft: Storm-1283 Sent 927,000 Phishing Emails with Malicious OAuth Apps

Isn’t there a critical built-in vulnerability in OAuth’s Implicit flow?

I’ve read some blogs and did some labs regarding OAuth’s implicit flow,
but it seems to me everyone just turn a blind eye to a very critical point in the flow.
Assuming that site A uses the implicit flow for authentication,
it will redirec… Continue reading Isn’t there a critical built-in vulnerability in OAuth’s Implicit flow?