Post-exploitation attack method exposes Okta passwords

New research reveals a potential post-exploitation attack method in Okta that enables adversaries to read users’ passwords in Okta audit logs.

Article Link: Post-exploitation attack method exposes Okta passwords | SC Media