OAuth attacks are on the rise. In December, the Microsoft Threat Intelligence team observed threat actors misusing OAuth apps to take over a cloud server and mine cryptocurrency, establish persistence following business email compromise and launch spam activity using the target organization’s resources and domain name. What is OAuth? A widely adopted standard that facilitates secure and delegated access to resources on the internet, OAuth (Open Authorization) is designed to address the challenges of user … More →
The post 3 ways to combat rising OAuth SaaS attacks appeared first on Help Net Security.
http://news.poseidon-us.com/T1RsHR