Post-exploitation attack technique has been discovered that enables adversaries to read cleartext user passwords for Okta, the identity access, and management (IAM) provider,...
Authomize researchers
Cyber Attacks
IAM system
Identity Access and Management
Mitiga
Okta senior senior security research