
OAuth 2.0 Attack Vector on Cloud Assets
This article is related to a recent security event that was reported by Microsoft. Here is a synopsis of what happened – A group of hackers used OAuth consent framework as the attack vector and tried to gain access to organizational assets stored in Office 365. Microsoft had to take legal recourse to fight this cybercrime […]