RC RANDOM CHAOS

identity compromise

2 posts

Article

OAuth Consent Abuse: A Trust Boundary Collapse in Microsoft 365

A malicious browser extension exploited OAuth consent in Microsoft 365 to gain full tenant access. No password or MFA was required. The attack bypassed all perimeter controls and created a persistent, unrevocable access path-highlighting a fundamental flaw in identity trust models.

Article

The Real Failure in the axios npm Compromise Wasn't Code - It Was Trust

The [email protected] and [email protected] npm compromise was not a code flaw - it was a failure in trust validation. Credential theft enabled persistent supply chain poisoning due to lack of enforced MFA and session verification at every publish event.