oauth protocol exploits

  1. Russian Cyberattack Using OAuth 2.0 to Breach Microsoft 365 Accounts

    Russian cyber threat actors have recently exploited OAuth 2.0 authentication flows to compromise Microsoft 365 accounts belonging to employees involved with Ukraine-related and human rights organizations. This sophisticated attack, tracked since early 2025, is predominantly attributed to...
Cookies are required to use this site. You must accept them to continue using the site. Learn more…