This type of application interacts with DocuSign on its own. There is no user interface and no user is present during normal operation. The application uses the OAuth JWT grant flow to impersonate a ...
Threat actors are abusing DocuSign's Envelopes API to create and mass-distribute fake invoices that appear genuine, impersonating well-known brands like Norton and PayPal. Using a legitimate service, ...
Cybercriminals are abusing a Docusign API in a widescale, innovative phishing campaign to send fake invoices to corporate users that appear authentic and likely would not trigger typical security ...
DocuSign is a great and efficient way to obtain authentic signatures for contracts and invoices. As with other efficient tools, threat actors will and have found a way to use the DocuSign API to send ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results