CYBERNEWSMEDIA Network:||
AD · 970×250

Cybersecurity Funding·Identity & Access

Okta Impersonation Technique Could be Utilized by Attackers

Okta has a standard process that can be abused for nefarious purposes. The legitimate method for changing credential details within Okta (for example, if a person gets married and changes her last name and adopts a new email address) can be misused by an attacker to impersonate another existing user. The post Okta Impersonation Technique Could be Utilized by Attackers appeared first on SecurityWeek.

Okta has a standard process that can be abused for nefarious purposes. The legitimate method for changing credential details within Okta (for example, if a person gets married and changes her last name and adopts a new email address) can be misused by an attacker to impersonate another existing user.

Latest News

CYBERNEWSMEDIAPublisher