<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Oauth on microsegment.io</title>
    <link>https://microsegment.io/tags/oauth/</link>
    <description>Recent content in Oauth on microsegment.io</description>
    <generator>Hugo</generator>
    <language>en-us</language>
    <lastBuildDate>Sat, 25 Apr 2026 00:00:00 +0000</lastBuildDate>
    <atom:link href="https://microsegment.io/tags/oauth/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Weekly Security Landscape: April 18 - 25, 2026</title>
      <link>https://microsegment.io/post/2026-04-25-weekly-security-landscape-w17/</link>
      <pubDate>Sat, 25 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://microsegment.io/post/2026-04-25-weekly-security-landscape-w17/</guid>
      <description>&lt;h2 id=&#34;the-week-at-a-glance&#34;&gt;The Week at a Glance&lt;/h2&gt;&#xA;&lt;p&gt;This week was not defined by one giant breach.&lt;/p&gt;&#xA;&lt;p&gt;It was defined by repeated proof that attackers do not need exotic tradecraft when trust is already overextended. Management planes, collaboration paths, developer tooling, and edge infrastructure kept turning into the fastest route from access to impact.&lt;/p&gt;&#xA;&lt;p&gt;Cisco SD-WAN Manager, Apache ActiveMQ, SharePoint, Teams helpdesk impersonation, Vercel&amp;rsquo;s OAuth-linked exposure, Forest Blizzard&amp;rsquo;s router-to-token collection, and the Checkmarx KICS and Bitwarden CLI supply-chain chain all pointed to the same operational truth. The attack surface that matters most right now is the layer that connects systems to each other - admin consoles, brokers, package channels, OAuth grants, remote support paths, and poorly governed edge devices.&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
