Hackers are using OAuth applications to deploy virtual machines for cryptocurrency mining, establish persistence, and launch phishing attacks, posing a significant threat to organizations.
View full story…