Azure can yield very powerful tokens while Google limits scopes, reducing the blast radius. Register for Huntress Labs' Live ...
Some Microsoft applications are vulnerable to an authentication issue that could enable Azure account takeover. A vulnerability in the way Microsoft applications use OAuth for third-party ...
Learn when to use 2-legged vs 3-legged OAuth flows for your authentication needs. Discover security vulnerabilities, implementation patterns, and how Workload Identity Federation eliminates credential ...
Malicious OAuth apps can hide inside Microsoft 365 tenants. Huntress Labs' Cazadora script helps uncover rogue apps before ...
Researchers have uncovered a sustained and ongoing campaign by Russian spies that uses a clever phishing technique to hijack Microsoft 365 accounts belonging to a wide range of targets, researchers ...
Microsoft now enables the use of its Outlook e-mail client applications for Android or iOS devices with some Exchange Server products in so-called "hybrid modern authentication" scenarios, according ...
Microsoft says users of its Azure cloud portal may be not be able to access Office 365, Minecraft or other services due to ...