Source |
ProofPoint |
Identifiant |
3778715 |
Date de publication |
2021-12-09 12:46:37 (vue: 2021-12-11 04:05:25) |
Titre |
Phishing Attacks Abuse Microsoft OAuth Implementations (Recyclage) |
Texte |
|
Notes |
|
Envoyé |
Oui |
Condensat |
abuse attacks implementations microsoft oauth phishing |
Tags |
|
Stories |
|
Move |
|
Source |
Bleeping Computer |
Identifiant |
3769150 |
Date de publication |
2021-12-09 11:21:47 (vue: 2021-12-09 17:05:27) |
Titre |
Microsoft, Google OAuth flaws can be abused in phishing attacks |
Texte |
Researchers have discovered a set of previously unknown methods to launch URL redirection attacks against weak OAuth 2.0 implementations. [...] |
Notes |
|
Envoyé |
Oui |
Condensat |
abused against attacks can discovered flaws google have implementations launch methods microsoft oauth phishing previously redirection researchers set unknown url weak |
Tags |
|
Stories |
|
Move |
|