#oauth-20

[ follow ]
Information security
fromComputerworld
1 week ago

New phishing campaign tricks employees into bypassing Microsoft 365 MFA

Attackers trick employees into registering a hacker-controlled device via OAuth device authorization, granting persistent access to Microsoft accounts and bypassing MFA.
Node JS
fromHackernoon
7 months ago

How to Capture OAuth Callbacks in CLI and Desktop Apps with Localhost Servers | HackerNoon

Use a temporary localhost HTTP server to capture OAuth authorization codes for CLI and desktop apps, enabling native OAuth flows without a public-facing callback URL.
[ Load more ]