Watch Out for User Impersonation in Low-Code/No-Code Apps

Last month I wrote an article about the way low-code/no-code platforms are offering credential-sharing as a service, why they are doing it, and how this looks from an attacker’s perspective. In this article, I’ll focus on the implications of that compromise and how it affects enterprises today.

Read full article on Dark Reading: Cloud

 


Date:

Categorie(s):