What you need to know about Okta’s security breach
CIO Business Intelligence
OCTOBER 25, 2023
Identity attacks use social engineering, prompt-bombing, bribing employees for 2FA codes, and session hijacking (among many techniques) to get privileged access. The blast radius from the attack can be reduced by enforcing stringent segmentation policies. In this recent OKTA breach, no reports suggest major incidents so far.
Let's personalize your content