1 result(s)
Microsoft reports attackers abusing OAuth redirection flows to route users from legitimate sign-in pages to attacker-controlled infrastructure. The technique uses trusted authentication redirects as a delivery path for phishing and malware.