Tag

authentication

This article delves into the exploitation of OAuth account takeover using app impersonation through custom scheme hijacking, an overlooked vulnerability pattern affecting most OAuth providers and consequently many popular applications including apps with over 1B downloads.

Product

AI-powered recommendations and fixes, Improved Flutter Detection, and much more

The new release brings a new AI Engine for improved recommendations, powerful new additions to Fl...

Mon 26 June 2023