Top White Papers and Webcasts

  • Office 365 is a highly targeted application for hackers because it is widely deployed across industries. Okta’s security team commonly sees customers experiencing phishing, password spraying, and brute-force attacks, to name a few.   Office 365 uses several authentication methods and access protocols, but some of their authentication methods and legacy authentication protocols do not support MFA in their authentication flow. Attackers know this and commonly abuse these vulnerabilities to …

  • Attacks have many phases. Before launching, the attacker needs to stage Internet infrastructure to support each phase. Two early phases are to redirect or link to a malicious web domain or send a malicious email attachment. Attacks that target organizations often leverage email attachments or direct payload downloads. Yet attacks with an objective to exfiltrate data, still must initiate a command-and-control callback. This solution brief discusses a security solution that can block both initial exploit and …