If it’s discovered that your unit is utilizing DocuSign improperly, your unit will be contacted. No special permissions needed. University and non-university signers do not need access permissions to ...
The attackers sent phishing emails that included a Docusign ... source code. It used a Base64-encoded URL for credential harvesting and redirecting the victims to an Outlook Web Access login ...
DocuSign provides several optional methods for recipient authentication, including access code authentication, phone authentication, knowledge-based authentication (KBA), and ID verification (IDV).