A recently discovered phishing campaign uses a novel approach to infiltrating Office365 accounts: through the Microsoft OAuth API. This continues a trend of hackers exploiting recognizable software companies in order to convince users to accept malware, including another Microsoft vulnerability that compromised account tokens.
Experts Comments
What do you think of the topic? Do you agree with expert(s) or share your expert opinion below.
Be part of our growing Information Security Expert Community (1000+), please register here.
Be part of our growing Information Security Expert Community (1000+), please register here.
Linkedin Message
@Sudhakar Ramakrishna, CEO, provides expert commentary at @Information Security Buzz.
"Zero Trust is key to countering this tactic...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/experts-comments-office365-accounts-compromised-using-oauth
Facebook Message
@Sudhakar Ramakrishna, CEO, provides expert commentary at @Information Security Buzz.
"Zero Trust is key to countering this tactic...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/experts-comments-office365-accounts-compromised-using-oauth