Shadow AI, the unofficial use of AI tools by employees, creates significant security vulnerabilities and data exposure risks within organizations.…
Read More »OAuth
Entity category: technology
The Model Context Protocol (MCP) introduces unique security risks because it injects executable text directly into AI models, unlike standard…
Read More »Cybercriminals exploit internal OAuth applications to create persistent backdoors in corporate cloud systems, bypassing security measures like password resets and…
Read More »Auditing OAuth applications in Microsoft 365 is critical due to the high risk of malicious apps, which can severely compromise…
Read More »Modern digital workplaces face security challenges from interconnected tools, where attackers exploit legitimate access tokens rather than breaching traditional perimeters.…
Read More »AI-powered browsers introduce significant security vulnerabilities by embedding AI assistants that enable novel threats like malicious workflows and prompt injections,…
Read More »The rise of autonomous AI agents in workflows creates unprecedented security challenges, demanding a unified identity security fabric for protection…
Read More »A data breach at Salesloft originated from a March intrusion into its GitHub account, allowing attackers to steal authentication tokens…
Read More »Salesforce environments saw a twenty-fold surge in malicious activity in Q1 2025, as cybercriminals increasingly exploit trusted business platforms for…
Read More »A data breach at Salesloft impacted over 700 organizations, including major cybersecurity firms, by compromising OAuth tokens to access Salesforce…
Read More »Allianz Life suffered a cybersecurity breach affecting 1.1 million individuals, compromising sensitive personal data including names, addresses, and Social Security…
Read More »Workday experienced a security breach via a third-party CRM platform, exposing business contact information but not customer data, due to…
Read More »A critical Microsoft Exchange vulnerability (CVE-2025-53786, CVSS 8.0) threatens hybrid cloud environments, enabling privilege escalation across on-premises and cloud systems…
Read More »Phishing-resistant authentication methods like passkeys and FIDO2-based systems (e.g., YubiKeys) improve security, but attackers exploit weaknesses such as downgrade attacks…
Read More »Strata Identity launched Identity Orchestration for AI Agents, a solution using Maverics identity fabric to provide governance for AI agents…
Read More »A critical security flaw in Microsoft’s Entra ID, called nOAuth, has exposed thousands of enterprise applications for two years, allowing…
Read More »It is no surprise that developers are using AI models to write their code. However, a developer from Cloudflare sparked…
Read More »















