Cybercriminals have launched a widespread phishing campaign exploiting Microsoft's OAuth device code flow to bypass MFA and ...
Compare the 15 best passwordless authentication solutions for 2026. Explore features, pricing, use cases, and how to choose ...
This story was originally published on Cybersecurity Dive. To receive daily news and insights, subscribe to our free daily Cybersecurity Dive newsletter. Russia-backed threat actors have attacked a ...
A surge in phishing campaigns abusing Microsoft’s OAuth device code authorization flow has been observed with multiple threat ...
A Russia-aligned threat group uses Microsoft 365 device code phishing to steal credentials and take over accounts, tracked ...
Just as we think we’re getting one step ahead of cybercriminals, they find a new way to evade our defenses. The latest method causing trouble for security teams is that of device code phishing, a ...
Personal Access Tokens make API integration faster, simpler, and safer, the company said. Tokens are generated within seconds ...
A malicious package in the Node Package Manager (NPM) registry poses as a legitimate WhatsApp Web API library to steal ...
Descope has launched its first product, a platform designed to help developers add authentication and user management capabilities to their business-to-consumer and business-to-business applications.
San Francisco — September 19, 2019 — OneLogin, the leader in Unified Access Management, today announced Vigilance AI, the new artificial intelligence and machine learning (AI/ML) risk engine, and ...