Alerts
Events
DCR
Explore Cyware Products
Alerts
Events
DCR
Go to listing page
Researchers discover way to impersonate Okta users in popular cloud environments
Malware and Vulnerabilities
August 30, 2022
SC Magazine
In a blog post, Permiso Security and ACV Auctions said, based on “in the wild” detections they reviewed, the impersonation technique is also an effective method of bypassing multi-factor authentication (MFA).
Read More
Cloud Environments
Okta customers
Impersonation Attack
Okta Administrator
MFA bypass
Publisher
Previous
Australia Invests AU$9.9 Billion in Cybersecurity
Govt., Critical Infrastructure
Next
Majority of YouTube accounts Google terminated in Q3 li ...
Social Media Threats