New research reveals a potential post-exploitation attack method in Okta that enables adversaries to read users’ passwords in Okta audit logs.
Article Link: Post-exploitation attack method exposes Okta passwords | SC Media
New research reveals a potential post-exploitation attack method in Okta that enables adversaries to read users’ passwords in Okta audit logs.
Article Link: Post-exploitation attack method exposes Okta passwords | SC Media