Threat Intelligence
Breaking news, news analysis, and expert commentary on cybersecurity threat intelligence, including tools & technologies.
Okta logo in front of a blue background
Vulnerabilities & ThreatsOkta: Credential-Stuffing Attacks Spike via Proxy NetworksOkta: Credential-Stuffing Attacks Spike via Proxy Networks
Okta warns users that the attack requests are made through an anonymizing service like Tor or various commercial proxy networks.
Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.