Security pros see the Dropbox Sign breach as not just a blow to Dropbox, but a really bad day for electronic signatures.
OAuth authentication works by assigning access tokens to third-party applications that can act as a proxy for a user's ...
OAuth is an open, secure data sharing standard designed to protect user data by providing access to that data, but keeping a user’s identity private. The standard was created in 2006 ...
Threat actor dropped in to Dropbox Sign production environment and accessed emails, passwords, and other PII, along with APIs ...
The new offering is designed to mitigate vulnerabilities and misconfigurations associated with the open authentication (OAuth ...
E -signature service providers DropBox Sign suffered a cyberattack recently, in which hackers stole some seriously sensitive ...
An attacker accesses the cloud storage provider's e-signature platform and users' personal information. No customer documents ...
As Dropbox confirms a hacker accessed customer passwords and MFA information during a breach of the Sign platform, here's ...
SaaS apps can boost workforce productivity, but they can also be a thorn in the side for those of us on the security front ...
These innovations will empower organizations to identify and mitigate malicious attempts to exploit OAuth flows, ultimately ...
The names and email addresses of those customers were also exposed who had never created an account with Dropbox Sign but had ...
Dropbox said hackers breached its infrastructure and stole swaths of customer data for its legally binding electronic ...