News

The cybersecurity landscape witnessed a seismic shift in 2024-2025 as threat actors, led by groups like ShinyHunters (UNC6040), systematically exploited OAuth device authorization grant ...
Modern enterprises rely on dozens of SaaS, PaaS, and IaaS platforms, many of which bake authentication and access security deep into their products. But in 2025, a new wave of sophisticated phishing ...
I started using V2 in order to employ the auto OAuth flow. When I created a clientId in TS, I chose a reasonable set of scopes which I thought would cater for the tsdproxy to setup machines etc.
Is your feature request related to a problem? Please describe. The problem is: The internal sealed class ClientOAuthProvider implements one specific OAuth flow: Authorization Code flow. Furthermore ...
Researchers have uncovered a sustained and ongoing campaign by Russian spies that uses a clever phishing technique to hijack Microsoft 365 accounts belonging to a wide range of targets, researchers ...