Get a Pentest and security assessment of your IT network.

News

How to defend against OAuth-enabled cloud-based attacks

Malwarebytes reported that SolarWinds hackers accessed its internal emails using the same intrusion vector they used in other attacks. The attack sequence suggests that the attacker tricked an end user into authorizing a third-party site to share authentication via OAuth. Adding multi-factor authentication will not prevent these attacks. You need to add policies for reviewing for certain activities and anomaly actions. The attacks are typically made to mimic the branding of the target company so that users are less suspicious. The user is then prompted with screen that grants limited access to the resources.”]

Source: https://www.csoonline.com/article/3607348/how-to-defend-against-oauth-enabled-cloud-based-attacks.html

Related posts
News

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

News

Art of Twitter account hacking

News

BlackEnergy exploits recently fixed flaws in Siemens WinCC

News

Google Chrome will block code injection from third-party software within 14 months