all InfoSec news
Post-exploitation attack method exposes Okta passwords
March 24, 2023, 4:08 p.m. | Stephen Weigand
SC Magazine feed for Strategy www.scmagazine.com
New research reveals a potential post-exploitation attack method in Okta that enables adversaries to read users’ passwords in Okta audit logs.
adversaries attack audit exploitation identity and access logs okta passwords post-exploitation research vulnerability management
More from www.scmagazine.com / SC Magazine feed for Strategy
Jobs in InfoSec / Cybersecurity
SOC 2 Manager, Audit and Certification
@ Deloitte | US and CA Multiple Locations
Cyber Security Cloud Solution Architect
@ Microsoft | London, London, United Kingdom
Compliance Program Analyst
@ SailPoint | United States
Software Engineer III, Infrastructure, Google Cloud Security and Privacy
@ Google | Sunnyvale, CA, USA
Cryptography Expert
@ Raiffeisen Bank Ukraine | Kyiv, Kyiv city, Ukraine
Senior Cyber Intelligence Planner (15.09)
@ OCT Consulting, LLC | Washington, District of Columbia, United States