How threat actors abuse OAuth apps

OAuth apps have become prominent in several attack groups’ TTPs in recent years. OAuth apps are used for every part of the attack process. In this Help Net Security video, Tal Skverer, Research Team Lead at Astrix Security, shares insights on how threat actors abuse OAuth apps as an easy, unmonitored way into companies’ environments.

The post How threat actors abuse OAuth apps appeared first on Help Net Security.

This article has been indexed from Help Net Security

Read the original article: