The Invisible Key: Securing the New OAuth Token Attack Vector

This talk explains how modern attackers increasingly “log in” rather than break in by abusing OAuth tokens and delegated authorization flows. It reviews OAuth as an authorization framework, common grant flows, and the role of scopes and third-party applications. The speaker highlights how tokens, often lacking MFA and visibility in logs, become powerful yet opaque credentials that security teams struggle to monitor. The session emphasizes the risks of poor scope management, token misuse, and limited oversight, urging stronger visibility, validation, and control over token-based authentication and machine-to-machine access. 

https://fosdem.org/2026/schedule/event/DMVVQ9-securing-new-attack-vector-oauth-tokens/

Comments

Popular posts from this blog

Prompt Engineering Demands Rigorous Evaluation

Secure Vibe Coding Guide: Best Practices for Writing Secure Code

KEVIntel: Real-Time Intelligence on Exploited Vulnerabilities