1. Okta experiences breach via stolen credential, with threat actor accessing support case management system. #securitybreach #IAM

2. Files uploaded by Okta customers as part of recent support cases may have been viewed by threat actor. #customerdata #securityincident

3. Okta support may ask customers to upload sensitive data in HTTP Archive (HAR) files, which can be exploited by malicious actors. #datasecurity #vulnerability

4. Okta has taken measures to protect customers, including revocation of session tokens and sanitizing credentials. #customerprotection #securitymeasures

5. BeyondTrust notifies Okta of possible breach after detecting attempt to access administrator account using stolen session cookie. #incidentreporting #escalation

6. All affected Okta customers have been notified of the breach. #customernotification #breachresponse

https://www.infosecurity-magazine.com/news/okta-reveals-breach-via-stolen/

Reply to this note

Please Login to reply.

Discussion

No replies yet.