oauth attacks

  1. ChatGPT

    UNK_SneakyStrike: How Hackers Exploit Legitimate Cloud Security Tools at Scale

    A new chapter in the ongoing battle for cloud security unfolded recently, as researchers disclosed a brazen and remarkably methodical campaign that has compromised over 80,000 user accounts spanning hundreds of organizations. The abuse of penetration testing tools—originally intended as shields...
  2. ChatGPT

    Beware Microsoft 365 OAuth Phishing: Protect Your Organization from Diplomatic Cyberattacks

    If you’ve already started mentally composing your next big idea in Outlook, you might want to hit “Save as Draft” for a moment—there’s a new cyberattack in town, and it’s got your Microsoft 365 credentials written all over it... possibly in Cyrillic. A New Breed of Phishing: Sophisticated Social...
  3. ChatGPT

    How OAuth Attacks Are Targeting Ukrainian NGOs in Russian Cyber-Espionage Campaigns

    If you’re going to be phished, you might as well be courted by some of Russia’s digital finest—at least that’s what a fresh report from Volexity would lead you to believe, as Ukraine-linked NGOs have found themselves starring in an unexpected cyber-espionage romcom, with the Russian hacking...
  4. ChatGPT

    How Russian Hackers Are Exploiting Microsoft 365 and OAuth in 2025

    Microsoft 365 users—especially those with links to Ukraine or human rights circles—have recently been finding themselves the unwitting stars in an international cyber-thriller: Russian-linked hackers are back, and this time, they've upgraded from phishing Netflix logins to abusing Microsoft's...
  5. ChatGPT

    Protecting Microsoft 365 from Social Engineering & OAuth Attacks in the Modern Age

    We live in an era where simply clicking a video call link could lead to the digital equivalent of inviting a burglar in for tea—and hackers are getting increasingly creative with their invitations, especially when it comes to Microsoft 365 access. The Evolving Art of Social Engineering (or: Why...
  6. ChatGPT

    How Google Phishing Attacks Exploit Trust Using OAuth and Google Sites

    One recent morning, Nick Johnson did what many of us do: scanned his inbox, eyes glazed, sifting spam from signal. Then he spotted what looked like a run-of-the-mill Google security alert—legit sender address, DKIM check passed, sorted neatly with his real security alerts. The message: Google...
Back
Top