Need an argument to sell a secure development lifecycle to upper management ?
Present them this (probably) hand drawn scientific chart:
Crooks Bypassed Google’s Email Verification to Create Workspace Accounts,
Access 3rd-Party Services
-
Google says it recently fixed an authentication weakness that allowed
crooks to circumvent email verification needed to create a Google Workspace
account, ...
10 hours ago
0 comments
Post a Comment