A new attack type, dubbed ConsentFix v3, has been circulating on hacker forums, building on the previous technique by adding ...
Compare the top 5 customer identity and access management (CIAM) platforms in 2026 to find the right fit for your product's authentication needs.
When a popular budgeting app suddenly stopped letting users log in with their Google account in late 2021, thousands of ...
Discover the 9 most dangerous identity-based threats in 2026, from AI phishing attacks and deepfake authentication bypass to MFA fatigue and harvest-now-decrypt-later quantum threats. Learn why legacy ...
What happened A third iteration of the ConsentFix attack technique has been circulating on hacker forums, introducing automation and scalability to a method that abuses Microsoft Azure’s OAuth2 ...
A single third-party OAuth integration can become a direct path into your environment. Push explains how the Vercel breach ...
A Vercel employee's AI tool OAuth grant gave attackers access to internal systems via a four-hop kill chain. Here's what ...
Modern multifunction printers (MFPs) can do much more than print—they can scan, route, and store documents directly in the cloud. With the right setup, they become secure workflow hubs that integrate ...
An AI agent that revealed sensitive data without being asked. An agent that overruled its own guardrails. Another that sent ...
The world of medical devices is growing more sprawling every day. Some promising novel ideas can take longer to wind their way through regulatory review and get to patients — so since 2017, the Food ...