workflows

  • Blog

    Hackers abuse OAuth 2.0 workflows to hijack Microsoft 365 accounts

    Russian threat actors have been abusing legitimate OAuth 2.0 authentication workflows to hijack Microsoft 365 accounts of employees of organizations related to Ukraine and human rights. The adversary is impersonating officials from European countries and contact targets through WhatsApp and Signal messaging platforms. The purpose is to convince potential victims to provide Microsoft authorization codes that give access to accounts, or…

    Read More »
  • Blog

    Adobe enhances Acrobat AI with contract intelligence to streamline enterprise workflows – Computerworld

    “AI-powered Contract Lifecycle Management (CLM) systems raise compliance and legal concerns related to data privacy, regulatory adherence, bias, and liability, particularly in regulated industries such as banking, financial services, healthcare, life sciences, and legal,” added Kaushal. “These systems process sensitive contractual information, heightening risks under laws like GDPR, CCPA, HIPAA, and SOX, which impose stringent data protection and access control…

    Read More »
Back to top button
close