News

Proofpoint observed campaigns impersonating trusted brands like SharePoint and DocuSign with malicious OAuth applications to ...
GitHub said Friday that five specific OAuth applications were affected — four versions of Heroku Dashboard, and Travis CI (IDs 145909, 628778, 313468, 363831 and 9261).
The attacker used stolen OAuth app tokens issued to Heroku and Travis-CI to breach GitHub.com customer accounts with authorized Heroku or Travis CI OAuth app integrations.
GitHub has uncovered evidence that an attacker abused stolen OAuth user tokens issued to two third-party OAuth integrators, Heroku and Travis-CI. Read more about the impact to GitHub, npm, and our ...
GitHub has revealed that dozens of organizations were compromised by a data thief that used stolen OAuth tokens to access their private repositories. The developer platform’s security team opened an ...
How states Bleeping Computer, dozens of similar cases have been reported since February. Developers received fake job offers or security alerts. In the latter case, the emails came from “ [email ...
By April 27, GitHub said it was sending out its final notifications to impacted customers, and said the attackers used the stolen OAuth tokens issued to Heroku and Travis CI to list user ...
Last week, GitHub Security researchers reported that an unknown attacker is using stolen OAuth user tokens issued to Heroku and Travis-CI to download data from dozens of organization’s private ...
Hashed and salted passwords of customers were exfiltrated thanks to a stolen GitHub integration OAuth token. Written by Chris Duckett, Contributor May 5, 2022, 7:06 p.m. PT ...