It appears the hacking group used social engineering efforts to gather knowledge about their target’s business operations. Okta services are generally used internally for employee identity integrated in the authentication stack, customers have nothing to worry about unless they themselves use Okta.
You always wanted to become a cybersecurity professional and you succeeded in achieving your goal after years of hard work and dedication. Now, you are promoted to the hot seat of a cybersecurity leader in your organization. The first thing you will notice after being promoted to the leadership role is that Continue Reading
The Google Chrome team just published a warning for Windows and Mac users over a zero-day vulnerability that hackers are already exploiting. Insufficient data validation in Mojo critical CVE-2021-4098, High CVE-2021-4099, High CVE-2021-4100, High CVE-2021-4101, High CVE-2021-4102. So far, a total of $10,000 reward was issued to two of the individuals that reported to Google. “Access to bug details and links Continue Reading
In cybersecurity, the stakes are higher than ever before, to lighten the load of infosec professionals already dealing with the sudden and rapid adoption of digital technologies. By implementing a system of digital currency such as cryptocurrency, you are able to send and receive payments over a secure connection. A cryptocurrency is Continue Reading
A private for-profit career canadian post-secondary institution, CDI College after facing scrutiny from its outdated Microsoft Server 2016 courses has yet again come to light after it informed its students that it had suffered an incident whereby their IT systems were compromised by a third party. This cybersecurity incident has since been Continue Reading
ADVERTISEMENT: Learn more