OAuth+XSS Attack Threatens Millions of Web Users With Account Takeover

July 29, 2024 at 10:50AM Recent security research by Salt Security’s Salt Labs revealed critical API security flaws in both Hotjar and Business Insider, exposing millions of users to potential account takeover. The flaws involve manipulating the OAuth standard with cross-site scripting, potentially enabling attackers to access sensitive data. The researchers warn that similar vulnerabilities … Read more

Microsoft Previews Feature to Block Malicious OAuth Apps

May 6, 2024 at 01:04PM Microsoft is adding automated attack disruption capabilities to its extended detection and response (XDR) offering to combat the increasing presence of malicious OAuth apps in cloud-based systems. This feature can automatically deactivate these apps, preventing exploitation and unauthorized access. The company also announces new protection for industrial control systems and … Read more

Dropbox dropped the ball on security, haemorrhaging customer and third-party info

May 1, 2024 at 09:02PM Dropbox has disclosed a significant security breach affecting its eSignature service, Dropbox Sign. Unauthorized access exposed user data such as emails, usernames, and some authentication information. Fortunately, no evidence indicates access to user content or payment details. Dropbox assures that the incident has not affected its financials and is actively … Read more

Microsoft Shares New Guidance in Wake of ‘Midnight Blizzard’ Cyberattack

January 26, 2024 at 03:43PM Microsoft has released new guidance to protect against nation-state attacks like the recent intrusion into its corporate email system by threat group Midnight Blizzard. The attack resulted in compromised accounts and exfiltration of emails and documents. Microsoft advises on protecting against malicious OAuth apps and detecting and mitigating the threat … Read more

Microsoft: OAuth apps used to automate BEC and cryptomining attacks

December 12, 2023 at 06:54PM Threat actors are leveraging OAuth applications to automate BEC and phishing attacks, push spam, and deploy VMs for cryptomining. Microsoft recommends using multi-factor authentication (MFA) and implementing security measures like conditional access policies and continuous access evaluation to defend against these malicious activities. Security teams should also prioritize enabling MFA … Read more