Common Oauth Apps Used in Business Email Compromise
This article serves as another place to document some common (and not so common) Oauth applications that are abused for malicious purposes during a BEC. Some are well documented, while…
A Very Cool and Serious Website