Security Feed
  1. Archives

Nov 03 2025 OAuth Device Code Phishing: Azure vs. Google Compared

Source

Device code phishing abuses the OAuth device flow, and Google and Azure produce strikingly different attack surfaces. Register for Huntress Labs' Live Hack to learn about attack techniques, defensive tactics, and get an Identity Security Assessment. [...]

Posted by Sponsored by Huntress Labs on Mon 03 November 2025 in BleepingComputer.

Tags: Security.

Categories

  1. Ars Technica
  2. AWS Security
  3. BleepingComputer
  4. Brian Krebs
  5. Bruce Schneier
  6. GCP Security
  7. Google Project Zero
  8. The Daily Swig
  9. The Guardian
  10. The Register
  11. Threatpost

Tag cloud

  • Security
  • Uncategorized
  • Security, Identity, & Compliance
  • Biz & IT
  • Security Blog
  • Microsoft
  • Security & Identity
  • google
  • AI
  • CryptoCurrency
  • Announcements
  • Foundational (100)
  • A Little Sunshine
  • Legal
  • Artificial Intelligence
  • privacy
  • Apple
  • Mobile
  • squid
  • Advanced (300)
  • Intermediate (200)
  • hacking
  • The Coming Storm
  • Technical How-to
  • vulnerabilities

Security Feed. Powered by Pelican and m.css. Code is available on GitLab.