Okta completes Lapsus$ probe, commits to stricter third-party controls.

  /     /     /  
Publicated : 27/11/2024   Category : security


News

Okta Wraps Up Lapsus$ Investigation, Pledges More Third-Party Controls

Okta, a leading provider of identity management and security solutions, recently announced that they have completed their investigation into the recent security breach that took place at Lapsus$, a hacking group responsible for numerous high-profile cyberattacks. Okta has also pledged to implement additional third-party controls to prevent similar incidents in the future.

Why Did Okta Investigate Lapsus$?

Following the security breach at Lapsus$, which compromised sensitive data from multiple organizations, including government agencies and private companies, Okta decided to launch an investigation to determine the extent of the breach and identify any vulnerabilities in their systems.

What Did Okta Discover in Their Investigation?

During their investigation, Okta uncovered evidence that Lapsus$ had exploited a vulnerability in a third-party providers system to gain unauthorized access to Oktas systems. This allowed the hackers to steal credentials and access sensitive information from Oktas clients.

What Steps Is Okta Taking to Enhance Third-Party Controls?

In response to the security breach, Okta has committed to implementing additional third-party controls to strengthen their security infrastructure and prevent similar incidents in the future. These measures include stricter vetting of third-party providers, enhanced monitoring of network activity, and improved encryption protocols.

People Also Ask

How Can Companies Protect Themselves Against Cyberattacks?

Companies can protect themselves against cyberattacks by implementing robust security measures, such as regularly updating software, training employees on cybersecurity best practices, and conducting regular security audits.

What Are the Risks of Third-Party Providers?

Third-party providers can pose a security risk to companies if their systems are not adequately secured. Hackers can exploit vulnerabilities in third-party systems to gain unauthorized access to a companys data and systems.

What Role Does Encryption Play in Cybersecurity?

Encryption is a crucial component of cybersecurity as it helps protect data from unauthorized access by encrypting it in a way that only authorized users can decrypt and access it. Implementing strong encryption protocols can help companies protect their sensitive information from cyber threats.


Last News

▸ ArcSight prepares for future at user conference post HP acquisition. ◂
Discovered: 07/01/2025
Category: security

▸ Samsung Epic 4G: First To Use Media Hub ◂
Discovered: 07/01/2025
Category: security

▸ Many third-party software fails security tests ◂
Discovered: 07/01/2025
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Okta completes Lapsus$ probe, commits to stricter third-party controls.