Phishing and Social Engineering

# phishing
# oauth

OAuth Consent Phishing

OAuth phishing abuses legitimate Microsoft and Google login flows to gain API access without stealing credentials, often bypassing MFA. Learn how it works and how to defend.