Normal view
-
/r/netsec - Information Security News & Discussion
- CVE-2026-34621: Adobe Acrobat Reader zero-day was on VirusTotal for 136 days before Adobe named it a CVE
UNC6692 Impersonates IT Help Desk via Microsoft Teams to Deploy SNOW Malware
-
ZDNet | security RSS
- Watch out, Whoop: I'd switch to Google's new Fitbit tracker if these features are true
Watch out, Whoop: I'd switch to Google's new Fitbit tracker if these features are true
-
ZDNet | security RSS
- Samsung Micro RGB vs. QLED vs. OLED: I compared all three and found a surprising winner
Samsung Micro RGB vs. QLED vs. OLED: I compared all three and found a surprising winner
-
ZDNet | security RSS
- Want free e-books? Stuff Your Kindle Day has 150+ titles discounted - today only
Want free e-books? Stuff Your Kindle Day has 150+ titles discounted - today only
Apple just fixed an iOS flaw exploited by the FBI - here's what happened
Age checks could turn internet into an ID checkpoint, complains Proton CEO
Push to protect minors risks hitting everyone online
Proton's boss has waded into the age verification fight with a warning that sounds less like child safety and more like an identity checkpoint for the entire internet.β¦
My favorite MagSafe car charger easily handles bumpy roads (and it's on sale)
-
/r/netsec - Information Security News & Discussion
- OAuth 2.0 BCP Β§4.14 reuse detection in practice β race vs theft disambiguation
OAuth 2.0 BCP Β§4.14 reuse detection in practice β race vs theft disambiguation
Standard advice for refresh tokens: rotate on every use, store hashed, set a short expiry. Done, right?
Not quite.
Rotation alone does nothing against token theft. If malware or XSS lifts a refresh token from a legit client, the attacker and the client race to rotate it next. Whoever loses the race gets a "token revoked" error β and the winner keeps the session.
From the serverβs point of view, it just sees two valid requests seconds apart. No alarm, no signal, nothing.
The missing piece is what OAuth 2.0 Security BCP Β§4.14 calls refresh token reuse detection: if a token that was already rotated is presented again, treat it as evidence of compromise and invalidate the entire session.
The core idea
Every token belongs to a family (FamilyId), shared across all rotations of a single login.
If a rotated token shows up again (outside a small grace window), you revoke the entire family:
- the attacker is locked out
- the legit user is forced to re-authenticate
- the session is no longer silently compromised
β
if (stored.ReplacedByTokenHash is not null && stored.RevokedAtUtc.HasValue) { var withinGrace = stored.RevokedAtUtc.Value.AddSeconds(graceSeconds) > DateTime.UtcNow; if (withinGrace) return Fail("token_recently_rotated"); // benign race (SPA tabs, retries) await RevokeFamilyAsync(stored.FamilyId, ip, reason: "reuse_detected"); return Fail("token_reuse_detected"); } Client-side itβs just one extra branch:
if (error.code === "token_reuse_detected") { // "You've been signed out for security reasons. Please log in again." router.push("/login?reason=compromised"); } You can also hook into it for observability (alerts, SIEM, etc.):
services.AddSingleton<IAuthEventSink, SlackAlertSink>(); The tricky parts
- Race vs theft look identical. Two requests with the same token arrive. One is legit, one might not be. Only timing differs. Grace window too small β false positives on flaky networks. Too large β real attack window. ~30 seconds worked well in practice.
- Revoking the whole chain. On reuse you must invalidate all still-active tokens from that session. A simple
FamilyId+ index makes this a single bulk update. - Concurrency is common. Multi-tab SPAs, retries, mobile reconnects β without a grace window, I was logging myself out constantly during tests.
I ended up adding this to a small self-hosted auth library Iβve been working on (https://www.reddit.com/r/dotnet/comments/1shpady/selfhosted\_auth\_lib\_for\_net/)
[link] [comments]
-
ZDNet | security RSS
- I'm automating these 5 unexpected home devices - and life has been so much easier
I'm automating these 5 unexpected home devices - and life has been so much easier
The best SEO reporting software of 2026: Expert tested and reviewed
-
ZDNet | security RSS
- Sony WH-1000XM6 vs. Bowers & Wilkins Px8 S2: How I'd justify spending $300 more for headphones
Sony WH-1000XM6 vs. Bowers & Wilkins Px8 S2: How I'd justify spending $300 more for headphones
Built for a hostile internet: Canonical VP of Engineering on Ubuntu 26.04 LTS
-
ZDNet | security RSS
- I finally tried pairing headphones to my TV streaming stick, and I'm not going back
I finally tried pairing headphones to my TV streaming stick, and I'm not going back
Bitwarden CLI Compromised in Ongoing Checkmarx Supply Chain Campaign
-
The Register - Security
- American farms have a new steward for their safety net, disaster programs... Palantir
American farms have a new steward for their safety net, disaster programs... Palantir
Wins $300M deal over Salesforce, IBM because of 'integration with existing USDA systems,' among other things
Palantir has won a $300 million contract from the US Department of Agriculture (USDA) to support the National Farm Security Action Plan (NFSAP) and modernize how USDA delivers services to America's farmers.β¦
-
The Hacker News
- ThreatsDay Bulletin: $290M DeFi Hack, macOS LotL Abuse, ProxySmart SIM Farms +25 New Stories
ThreatsDay Bulletin: $290M DeFi Hack, macOS LotL Abuse, ProxySmart SIM Farms +25 New Stories
-
ZDNet | security RSS
- 98% of IT leaders want digital sovereignty: Now SUSE is operationalizing it for companies everywhere
98% of IT leaders want digital sovereignty: Now SUSE is operationalizing it for companies everywhere
-
The Register - Security
- Medical data of 500k Biobank volunteers listed for sale on Alibaba, UK minister reveals
Medical data of 500k Biobank volunteers listed for sale on Alibaba, UK minister reveals
World's largest biomedical dataset lifted and shifted on Chinese mega marketplace
Updated Details of volunteers of UK-based Biobank, which describes itself as the custodian of the world's most comprehensive biomedical dataset, are for sale on Chinese ecommerce site Alibaba.β¦
-
The Register - Security
- Hybrid clouds have two attack surfaces and youβre not paying enough attention to either
Hybrid clouds have two attack surfaces and youβre not paying enough attention to either
Windows Admin Center flaws mean on-prem can attack cloud, and vice-versa
Black Hat Asia Israeli researchers found a series of flaws in Microsoft's Windows Admin Center (WAC) and suggest this shows hybrid cloud management tools are a two-way attack surface that users don't spend enough time worrying about.β¦