Authorization sprawl: Attacking modern access models

Attackers exploit authorization sprawl by using legitimate credentials and SSO tokens to move between systems, bypassing security controls and deploying ransomware undetected.

This article has been indexed from Search Security Resources and Information from TechTarget

Read the original article: