Why Okta Hack is a Big Deal: What You Need to Know
LAPSUS$, a ransomware gang, announced that they had superuser access to Okta. To prove their unfettered access to Okta’s backend, they published a bunch of screenshots on their Telegram channel. The screenshots show that hackers gained access to Okta.com backend and several SaaS providers, like Jira and Salesforce, that Okta uses to run their services. Let me back up a little bit. Okta is a San Francisco-based identity and access management provider. They offer services like Single Sign-On or SSO and Multi-factor Authentication or MFA to thousands of enterprise customers. They are a leader in Gartner’s Magic Quadrant for IAM with over 30% market share. They compete with the likes of Microsoft, Ping Identity and OneLogin.
Okta is a Federal Risk and Authorization Management Program (FedRAMP) approved identity vendor.
#lapsus #Okta #identity
★★ WHO AM I ★★
https://bit.ly/3qZsCLm
https://twitter.com/AfaqMKhan
Видео Why Okta Hack is a Big Deal: What You Need to Know канала Technology Leadership
Okta is a Federal Risk and Authorization Management Program (FedRAMP) approved identity vendor.
#lapsus #Okta #identity
★★ WHO AM I ★★
https://bit.ly/3qZsCLm
https://twitter.com/AfaqMKhan
Видео Why Okta Hack is a Big Deal: What You Need to Know канала Technology Leadership
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
![Career in Network Automation: Must-Have Security Fundamentals Knowledge for the NetDevOps](https://i.ytimg.com/vi/5H3cNUo2lWw/default.jpg)
![Career in Network Automation: 10 Domains of Knowledge for Network Automation Engineering (Part 1)](https://i.ytimg.com/vi/wjs5nfJc2gE/default.jpg)
![The Shifting Landscape of Ransomware Attacks](https://i.ytimg.com/vi/XYJQLX0W-7Q/default.jpg)
![Biden Putin Summit 2021 And the Future of Cybersecurity](https://i.ytimg.com/vi/iFfXIjWlWmI/default.jpg)
![Career in Network Automation: 10 Domains of Knowledge for Network Automation Engineering (Part 4)](https://i.ytimg.com/vi/FfIWh7WxLTQ/default.jpg)
![#SolarWinds Orion Hack for #Cyber Professionals: What Happened & How to Address Supply-Chain Attacks](https://i.ytimg.com/vi/Un1qbm3oTD8/default.jpg)
![What to Do if You Get Hit By a Ransomware Attack](https://i.ytimg.com/vi/Zbh-4lWII3g/default.jpg)
![Career in Network Automation: 10 Domains of Knowledge for Network Automation Engineering (Part 3)](https://i.ytimg.com/vi/7ZpmKgkNzig/default.jpg)
![Career in Network Automation: 10 Domains of Knowledge for Network Automation Engineering (Part 2)](https://i.ytimg.com/vi/ssSgdUUXbTw/default.jpg)
![Zero Trust Security Model Explained](https://i.ytimg.com/vi/jWRuoaaIZiU/default.jpg)
![What We can Learn from KASEYA Ransomware Attack](https://i.ytimg.com/vi/NoGh1eO0e_U/default.jpg)
![Can SIGSTORE and Code Signing Save Us from Supply Chain Hacks](https://i.ytimg.com/vi/ixQo-MpqPTs/default.jpg)
![Why #SolarWinds #Hack is a Big Deal for the #Cybersecurity industry](https://i.ytimg.com/vi/tbNyMInjBQI/default.jpg)
![Career in Network Automation: NAE, NETDEVOPS, NRE Job Roles Explained](https://i.ytimg.com/vi/gwkprYh8p1o/default.jpg)
![Cloud is the New IT Platform: The Incoming Multi-Cloud Networking Boom](https://i.ytimg.com/vi/qDwnSo99XLg/default.jpg)
![Cyber Security Basic Terms and Concepts for Beginners (Part 2)](https://i.ytimg.com/vi/axHyZ1bWq58/default.jpg)
![The Holy Grail of Spyware: The Pegasus and NSO Group Explained](https://i.ytimg.com/vi/4IsqLqL1zGg/default.jpg)
![Is Multicloud Networking Market a Hype: What You Need to Know](https://i.ytimg.com/vi/DY_DzdD-uiU/default.jpg)
![Network Automation with Python Libraries Netmiko, Napalm, and Nornir](https://i.ytimg.com/vi/3L5KbuEDl0E/default.jpg)
![Career in Network Automation: Must-Have Linux OS Fundamentals Knowledge for the NetDevOps](https://i.ytimg.com/vi/sZUBmwZ66o8/default.jpg)