A single third-party OAuth integration can become a direct path into your environment. Push explains how the Vercel breach ...
Toxic combinations form when AI agents, integrations, or OAuth grants bridge SaaS apps into trust relationships no single ...
Vercel breached after attacker compromised Context.ai, hijacked an employee's Google Workspace via OAuth, and accessed ...
Stolen OAuth tokens, which are at the root of these breaches, "are the new attack surface, the new lateral movement," a ...
Vercel has been hacked and had some customer credentials compromised after an employee's single OAuth token, which had been ...
AI prompt injection attacks exploit the permissions your AI tools hold. Learn what they are, how they work, and how to ...
Explores how AI agents retrieve data with user permissions yet expose outputs to mixed audiences, urging audience-aware authorization.
Hackers are abusing the legitimate OAuth redirection mechanism to bypass phishing protections in email and browsers to take users to malicious pages. The attacks target government and public-sector ...
It’s a familiar moment in math class—students are asked to solve a problem, and some jump in confidently while others freeze, unsure where to begin. When students don’t yet have a clear mental model ...
From the Department of Bizarre Anomalies: Microsoft has suppressed an unexplained anomaly on its network that was routing traffic destined to example.com—a domain reserved for testing purposes—to a ...
Hackers are abusing a legitimate Microsoft authentication feature to break into enterprise Microsoft 365 accounts, even when multifactor authentication is enabled. Security researchers warn that ...