How threat actors abuse OAuth apps

OAuth apps have become prominent in several attack groups’ TTPs in recent years. OAuth apps are used for every part of the attack process. In this Help Net Security video, Tal Skverer, Research Team Lead at Astrix Security, shares insights…

Data Breach Response: A Step-by-Step Guide

Just when you thought your organization was prepared for anything, a data breach strikes – discover the step-by-step guide to navigate this treacherous terrain. The post Data Breach Response: A Step-by-Step Guide appeared first on Security Zap. This article has…