article thumbnail

What you need to know about Okta’s security breach

CIO

On October 20, 2023, Okta Security identified adversarial activity that used a stolen credential to gain access to the company’s support case management system. Once inside the system, the hacker gained access to files uploaded by Okta customers using valid session tokens from recent support cases.

article thumbnail

How to minimize remote access cyber security threats in 2024

CIO

Cloud is the dominant attack surface through which these critical exposures are accessed, due to its operational efficiency and pervasiveness across industries. Change your vulnerability mindset to identify legacy vulnerability management systems. Attack premeditation is another vital way to secure your systems. Security

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

CVE-2023-46747: Critical Authentication Bypass Vulnerability in F5 BIG-IP

Tenable

A critical authentication bypass vulnerability in F5’s BIG-IP could allow remote, unauthenticated attackers to execute system commands. Analysis CVE-2023-46747 is a critical severity authentication bypass vulnerability in F5 BIG-IP that could allow an unauthenticated attacker to achieve remote code execution (RCE).

article thumbnail

CVE-2020-6207: Proof of Concept Available for Missing Authentication Vulnerability in SAP Solution Manager

Tenable

A researcher has published a proof-of-concept exploit script for a critical SAP vulnerability patched in March 2020 and attackers have begun probing for vulnerable SAP systems. The vulnerability was discovered and disclosed by security researchers Pablo Artuso and Yvan Genuer of Onapsis. Background.

article thumbnail

10 projects top of mind for IT leaders today

CIO

A committee reviews potential projects and expected returns, to ensure the company is pursuing impactful AI initiatives. The State of the CIO research confirms that observation, with 70% of CIOs listing cybersecurity as an area of increasing involvement, coming in just after AI.

article thumbnail

Prioritizing AI? Don’t shortchange IT fundamentals

CIO

Independent research analyst Sageable founder Andi Mann agrees, pointing out how many internal operations and basic functions of IT infrastructure turn out to be the ‘picks and shovels’ to power an AI gold rush. Data due diligence Generative AI especially has particular implications for data security, Mann says.

article thumbnail

CVE-2023-4966 (CitrixBleed): Invalidate Active or Persistent Sessions To Prevent Further Compromise

Tenable

Tenable Research has published two blogs on CitrixBleed, our initial analysis of the vulnerability as well as a Frequently Asked Questions (FAQ) blog providing added context surrounding the in-the-wild exploitation by threat actors including multiple ransomware groups. ransomware group in their exploitation of CitrixBleed.