
Attack on Google OAuth using abandoned domains
A vulnerability in Google OAuth allows attackers to access accounts of defunct organizations through abandoned domains.
5 articles
A vulnerability in Google OAuth allows attackers to access accounts of defunct organizations through abandoned domains.
By hijacking domains with CNAME records and exploiting forgotten SPF records, attackers seize domains and use them for their own purposes.
Fake websites and email addresses are often used in phishing and targeted attacks. How do fake domains get created, and how to spot one?
At RSAC 2019, a SANS Institute instructor talked about how DNS manipulations can be used to hijack a company’s IT infrastructure.
Forgotten online resources can be used for extortion or phishing