The open-source IAM system Keycloak 26.6 promotes five features to production status – including federated client ...
Microsoft has warned that phishers are exploiting a built-in behavior of the OAuth authentication protocol to redirect victims to malware, using links that point to legitimate identity provider ...
Microsoft observed phishing-led exploitation of OAuth’s by-design redirection mechanisms. The activity targets government and public-sector organizations and uses silent OAuth authentication flows and ...
PCWorld reports that Anthropic and Google are banning users who connect flat-rate Claude and Gemini accounts to OpenClaw without warning or refunds. OpenClaw’s massive token consumption degrades ...
Developers using third-party AI tools tied to Claude subscription credentials face immediate disruption in the week of February 19, 2026. Anthropic says OAuth tokens from Free, Pro, and Max plans are ...
In December, the Push Security research team discovered and blocked a brand new attack technique that we coined ConsentFix. This technique merged ClickFix-style social engineering with OAuth consent ...
Hackers are abusing a legitimate Microsoft authentication feature to break into enterprise Microsoft 365 accounts, even when multifactor authentication is enabled. Security researchers warn that ...
A surge in phishing campaigns abusing Microsoft’s OAuth device code authorization flow has been observed with multiple threat clusters using the technique to gain unauthorized access to Microsoft 365 ...
IT managers have limited visibility into when users give external apps access to company data. When those external apps are AI agents, the security risks multiply by orders of magnitude. Okta has ...
AI on the JVM accelerates: New frameworks like Embabel, Koog, Spring AI, and LangChain4j drive rapid adoption of AI-native and AI-assisted development in Java. Java 25 anchors a modern baseline: The ...