Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore a comprehensive 32-minute cybersecurity webinar that examines OAuth application security threats through real-world analysis. Learn to differentiate between legitimate and malicious OAuth applications as Red Canary's threat hunting experts Alex and Harrison guide you through concerning trends in AI email applications that request excessive permissions. Discover how OAuth tokens can remain active even after password changes through a detailed case study, and understand the critical importance of auditing application permissions. Master techniques for identifying and removing potentially malicious apps while learning to trust established vendors to mitigate OAuth-related security risks. Gain practical insights into Azure OAuth fundamentals, examine specific abuse patterns, and develop skills for conducting thorough OAuth application audits to protect your organization from sophisticated cyber attacks.
Syllabus
00:00 - 00:49 Intro
00:50 - 02:30 Welcome to Red Canary Office Hours
02:31 - 04:03 What is Azure OAuth?
04:04 - 09:43 Case Study
09:44 - 11:04 How OAuth's are abused
11:05 - 30:29 Auditing OAuth Apps
30:30 - 32:25 See you next time!
Taught by
Red Canary