identity compromise
2 posts
Article
OAuth Consent Abuse: A Trust Boundary Collapse in Microsoft 365
A malicious browser extension exploited OAuth consent in Microsoft 365 to gain full tenant access. No password or MFA was required. The attack bypassed all perimeter controls and created a persistent, unrevocable access path-highlighting a fundamental flaw in identity trust models.
Article
The Real Failure in the axios npm Compromise Wasn't Code - It Was Trust
The [email protected] and [email protected] npm compromise was not a code flaw - it was a failure in trust validation. Credential theft enabled persistent supply chain poisoning due to lack of enforced MFA and session verification at every publish event.