Information security services
When trust becomes a threat: how Google and Microsoft are being exploited in cyberattacks
In this article, we’ll explore how attackers are misusing trusted technologies - like OAuth and DKIM (more on these in a moment) - and why everyone should be cautious when a message or application requests access to user accounts.