• About Us
  • Contact Us
  • Editorial Calendar
  • Careers
  • The Cyber Express by Cyble Vulnerability Disclosure Policy
  • Cyble Trust Portal
The Cyber Express
  • MagazineDownload
  • Firewall Daily
    • All
    • Bug Bounty & Rewards
    • Dark Web News
    • Data Breach News
    • Hacker News
    • Ransomware News
    • Vulnerabilities
    Stolen Credit Card Data Trafficking

    Chilean National Extradited to U.S. Over Stolen Credit Card Data Trafficking Scheme

    cybersecurity firewall

    Vietnam Announces National Cybersecurity Firewall Plan Under New Digital Governance Law

    weekly roundup The Cyber Express

    The Cyber Express Weekly Roundup: Space Security, Malware & Regulatory Alerts

    government cyber security

    UK Tightens Government Cyber Security After Cutting Critical Vulnerabilities by 75%

    NIS2 Directive

    National Cyber Security Bill and NIS2: Senior Management’s Compliance Guide

    iphone, ipad, apple devices

    Apple Devices Become First Consumer Products Cleared for NATO Classified Data—But Questions Remain

    OpenClaw Vulnerability

    OpenClaw Vulnerability Exposes How an Open-Source AI Agent Can Be Hijacked

    space cyber security

    India Strengthens Space Cyber Security with New CERT-In and SIA-India Framework

    cybersecurity threats of 2026

    Samsung SDS Identifies Top Cybersecurity Threats of 2026 as AI Risks Escalate

    Trending Tags

    • blackbyte ransomware
    • Ransomware
    • lapsus$ ransomware
    • Apple
    • Apple vulnerability
  • Essentials
    • All
    • Compliance
    • Governance
    • Policy Updates
    • Regulations
    Stolen Credit Card Data Trafficking

    Chilean National Extradited to U.S. Over Stolen Credit Card Data Trafficking Scheme

    cybersecurity firewall

    Vietnam Announces National Cybersecurity Firewall Plan Under New Digital Governance Law

    government cyber security

    UK Tightens Government Cyber Security After Cutting Critical Vulnerabilities by 75%

    iphone, ipad, apple devices

    Apple Devices Become First Consumer Products Cleared for NATO Classified Data—But Questions Remain

    space cyber security

    India Strengthens Space Cyber Security with New CERT-In and SIA-India Framework

    CISCO SD-WAN, Cisco, SD-WAN, CISA, ASD, Zero-Day

    Hackers Exploited Cisco SD-WAN Zero-Day for Three Years Before Detection

    age verification technologies

    FTC Clarifies COPPA Stance, Backs Age Verification Technologies for Platforms

    scam centers in Southeast Asia

    Scam Centers in Southeast Asia Drive Billion-Dollar Losses: FBI

    Digital Services Act

    X vs EU: Platform Appeals Against €120M Digital Services Act Penalty

    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Knowledge Hub
    • All
    • How to
    • What is
    Google Chrome

    How to Remove Saved Passwords From Google Chrome (And Why You Should)

    DPDP Rules, Cyble, DPDP Act, Cyble Vantage

    How Cyble’s Front-Row Vantage Can Help You in Complying to India’s DPDP Act

    Cybersecurity Countries

    The Top 8 Countries Leading the Cyber Defense Race in 2025

    link building

    The Link Building Secrets Your Competitors Don’t Want You to Know

    Supply Chain Attack

    Supply Chain Resilience and Physical Security: Lessons for 2025

    Healthcare cybersecurity trends of 2024

    Healthcare Cybersecurity: 2024 Was Tough, 2025 May Be Better

    CEO's Guide to Take-Down Services

    Shield Your Organization: CEO’s Perspective on Take-Down Services

    Azure sign-in Microsoft

    Microsoft Announces Mandatory MFA for Azure Sign-ins to Bolster Cloud Defenses

    Signal Proxy, Signal, Signal Ban in Russia, Signal Ban in Venezuela, Bypass Signal Ban, How to Activate Signal Proxy, Signal Proxy Server

    How to Set Up Signal Proxy to Help Bypass Censorship in Russia and Venezuela

  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business
    • All
    • Appointments
    • Budgets
    • Mergers & Aquisitions
    • Partnerships
    • Press Release
    • Startups
    Terrorist Cyberattacks, UAE Cyber Security Council

    UAE Blocked AI-Powered Terrorist Cyberattacks Targeting Critical Infrastructure

    Eurail Breach, Eurail

    Eurail Breach Escalates as Stolen Passport Data and IBANs Surface on Dark Web for Sale

    Discord teen-by-default settings

    Discord Introduces Stronger Teen Safety Controls Worldwide

    The Cyber Express cybersecurity roundup

    The Cyber Express Weekly Roundup: FortiOS Exploits, Ransomware, Hacktivist Surge, and EU Telecom Rules

    Nicole Ozer appointment

    Nicole Ozer Joins CPPA to Drive Privacy and Digital Security Initiatives

    National Security Agency (NSA) appointment

    NSA Appoints Timothy Kosiba to Oversee Strategy and Cybersecurity Operations

    Shinhan Card data breach

    South Korea’s Shinhan Card Data Breach Affects 192,000 Merchants

    Cyble's Beenu-Recognized-by-ET-Edge-as-an-Impactful-CEO-2025_

    Beenu Arora, CEO & Co-Founder of Cyble, Recognized by ET Edge as an Impactful CEO 2025

    LastPass UK

    Password Manager LastPass Penalized £1.2m by ICO for Security Failures

    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • Events
    • Conference
    • Webinar
    • Endorsed Events
  • Advisory Board
No Result
View All Result
  • MagazineDownload
  • Firewall Daily
    • All
    • Bug Bounty & Rewards
    • Dark Web News
    • Data Breach News
    • Hacker News
    • Ransomware News
    • Vulnerabilities
    Stolen Credit Card Data Trafficking

    Chilean National Extradited to U.S. Over Stolen Credit Card Data Trafficking Scheme

    cybersecurity firewall

    Vietnam Announces National Cybersecurity Firewall Plan Under New Digital Governance Law

    weekly roundup The Cyber Express

    The Cyber Express Weekly Roundup: Space Security, Malware & Regulatory Alerts

    government cyber security

    UK Tightens Government Cyber Security After Cutting Critical Vulnerabilities by 75%

    NIS2 Directive

    National Cyber Security Bill and NIS2: Senior Management’s Compliance Guide

    iphone, ipad, apple devices

    Apple Devices Become First Consumer Products Cleared for NATO Classified Data—But Questions Remain

    OpenClaw Vulnerability

    OpenClaw Vulnerability Exposes How an Open-Source AI Agent Can Be Hijacked

    space cyber security

    India Strengthens Space Cyber Security with New CERT-In and SIA-India Framework

    cybersecurity threats of 2026

    Samsung SDS Identifies Top Cybersecurity Threats of 2026 as AI Risks Escalate

    Trending Tags

    • blackbyte ransomware
    • Ransomware
    • lapsus$ ransomware
    • Apple
    • Apple vulnerability
  • Essentials
    • All
    • Compliance
    • Governance
    • Policy Updates
    • Regulations
    Stolen Credit Card Data Trafficking

    Chilean National Extradited to U.S. Over Stolen Credit Card Data Trafficking Scheme

    cybersecurity firewall

    Vietnam Announces National Cybersecurity Firewall Plan Under New Digital Governance Law

    government cyber security

    UK Tightens Government Cyber Security After Cutting Critical Vulnerabilities by 75%

    iphone, ipad, apple devices

    Apple Devices Become First Consumer Products Cleared for NATO Classified Data—But Questions Remain

    space cyber security

    India Strengthens Space Cyber Security with New CERT-In and SIA-India Framework

    CISCO SD-WAN, Cisco, SD-WAN, CISA, ASD, Zero-Day

    Hackers Exploited Cisco SD-WAN Zero-Day for Three Years Before Detection

    age verification technologies

    FTC Clarifies COPPA Stance, Backs Age Verification Technologies for Platforms

    scam centers in Southeast Asia

    Scam Centers in Southeast Asia Drive Billion-Dollar Losses: FBI

    Digital Services Act

    X vs EU: Platform Appeals Against €120M Digital Services Act Penalty

    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Knowledge Hub
    • All
    • How to
    • What is
    Google Chrome

    How to Remove Saved Passwords From Google Chrome (And Why You Should)

    DPDP Rules, Cyble, DPDP Act, Cyble Vantage

    How Cyble’s Front-Row Vantage Can Help You in Complying to India’s DPDP Act

    Cybersecurity Countries

    The Top 8 Countries Leading the Cyber Defense Race in 2025

    link building

    The Link Building Secrets Your Competitors Don’t Want You to Know

    Supply Chain Attack

    Supply Chain Resilience and Physical Security: Lessons for 2025

    Healthcare cybersecurity trends of 2024

    Healthcare Cybersecurity: 2024 Was Tough, 2025 May Be Better

    CEO's Guide to Take-Down Services

    Shield Your Organization: CEO’s Perspective on Take-Down Services

    Azure sign-in Microsoft

    Microsoft Announces Mandatory MFA for Azure Sign-ins to Bolster Cloud Defenses

    Signal Proxy, Signal, Signal Ban in Russia, Signal Ban in Venezuela, Bypass Signal Ban, How to Activate Signal Proxy, Signal Proxy Server

    How to Set Up Signal Proxy to Help Bypass Censorship in Russia and Venezuela

  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business
    • All
    • Appointments
    • Budgets
    • Mergers & Aquisitions
    • Partnerships
    • Press Release
    • Startups
    Terrorist Cyberattacks, UAE Cyber Security Council

    UAE Blocked AI-Powered Terrorist Cyberattacks Targeting Critical Infrastructure

    Eurail Breach, Eurail

    Eurail Breach Escalates as Stolen Passport Data and IBANs Surface on Dark Web for Sale

    Discord teen-by-default settings

    Discord Introduces Stronger Teen Safety Controls Worldwide

    The Cyber Express cybersecurity roundup

    The Cyber Express Weekly Roundup: FortiOS Exploits, Ransomware, Hacktivist Surge, and EU Telecom Rules

    Nicole Ozer appointment

    Nicole Ozer Joins CPPA to Drive Privacy and Digital Security Initiatives

    National Security Agency (NSA) appointment

    NSA Appoints Timothy Kosiba to Oversee Strategy and Cybersecurity Operations

    Shinhan Card data breach

    South Korea’s Shinhan Card Data Breach Affects 192,000 Merchants

    Cyble's Beenu-Recognized-by-ET-Edge-as-an-Impactful-CEO-2025_

    Beenu Arora, CEO & Co-Founder of Cyble, Recognized by ET Edge as an Impactful CEO 2025

    LastPass UK

    Password Manager LastPass Penalized £1.2m by ICO for Security Failures

    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • Events
    • Conference
    • Webinar
    • Endorsed Events
  • Advisory Board
No Result
View All Result
The Cyber Express
No Result
View All Result
Home Firewall Daily Data Breach News

Stocks Plunge, Digital Ridicule, Reputation at Stake: Lessons From Okta’s Cyber Breach Saga

Every data breach offers valuable lessons, and the recent Okta incident is no exception, providing insights for businesses and cybersecurity experts alike.

thecyberexpress by thecyberexpress
October 23, 2023
in Data Breach News, Firewall Daily
0
Okta Data Breach
641
SHARES
3.6k
VIEWS
Share on LinkedInShare on Twitter

Okta, a leading identity and access management provider, announced over the weekend that its systems suffered a security breach. Cyber adversaries reportedly gained access to its support case management through stolen credentials, with affected customers already being notified of the incident.

The firm clarified that the recent Okta data breach did not affect its Auth0/CIC case management system. Notably, BeyondTrust and Cloudflare are among the organizations impacted by the breach.

The threat actor was able to view files uploaded by certain Okta customers as part of recent support cases,” Chief Security Officer at Okta, David Bradbury said, adding “It should be noted that the Okta support case management system is separate from the production Okta service, which is fully operational and has not been impacted.

“HAR files can also contain sensitive data, including cookies and session tokens, that malicious actors can use to impersonate valid users,” warned Okta.

Okta is taking measures with affected clients to prevent further abuse by revoking session tokens. The breach poses a threat to over 17,000 Okta clients, potentially impacting more than 50 billion users globally.

Okta faces significant backlash on Twitter following the weekend’s data breach. Attached are screenshots illustrating the reactions.

report-ad-banner
Okta Data Breach
Credit: @KimZetter on ‘X’
Okta Data Breach
Credit: @Dinosn on Twitter
Okta Data Breach
Credit: @InsiderPhD on ‘X’
Okta Data Breach
Credit: @KimZetter on ‘X’
Okta Data Breach
Credit: @vxunderground on ‘X’

This latest occurrence joins a series of security challenges that Okta grappled with over the previous year. Throughout 2022, Okta confronted several security issues:

January 2022: Lapsus$ hacker group exploited Okta’s third-party customer support services provider, Sitel. By manipulating a Sitel engineer into approving a multi-factor authentication (MFA) push notification, they accessed the engineer’s desktop through the Remote Desktop Protocol (RDP).

While they gained access to two active customer tenants within Okta’s SuperUser application, they couldn’t impact customer data or security.

March 2022: The same hacker group, Lapsus$, asserted they had penetrated Okta’s internal systems, supporting their claim with images on their Telegram channel.

Initially, Okta refuted any system breaches, but subsequent revelations admitted a limited exposure of customer and employee information.

October 2022: BeyondTrust, a cybersecurity firm, identified an identity-focused assault on its internal Okta administrator account.

Swift action led to the attack’s quick detection and resolution, ensuring no compromise to BeyondTrust’s infrastructure or its clientele.

December 2022: A more concerning revelation came when Okta verified the theft of the source code for its Workforce Identity Cloud (WIC) product.

Although the stolen data didn’t contain sensitive customer specifics, Okta clarified that they found no indication of affected customer accounts.

The recent Okta data breach appears to have dealt a significant blow to the company. Following the announcement that hackers accessed client files through its support system, Okta’s stock plummeted by 11%.

Okta Data Breach

Cloudflare, one of the impacted clients of Okta said, “The threat-actor was able to hijack a session token from a support ticket which a Cloudflare employee created,”. Adding, “Using the token extracted from Okta, the threat-actor accessed Cloudflare systems on October 18.”

Amidst the chatter about the Okta Data Breach, what cybersecurity lessons can we draw?

Learnings from the Okta Data Breach

Okta’s security breaches, while unfortunate, provide essential lessons for the cybersecurity. First and foremost, they underscore that no entity, regardless of its size or prominence, is exempt from potential cyber threats.

The breaches also draw attention to the potential vulnerabilities introduced by third-party vendors, emphasizing the necessity of rigorous security checks and continuous monitoring when integrating external services.

1. Identity Infrastructure is the Target

Identity infrastructure is the new target of cybercriminals. The attackers get around authentication and then start compromising your assets by entering the identity provider.

2. Post-Authentication Defence

Disabling or bombing MFA, or social engineering are just a few among numerous methods to find a way into an organization. Using ITDR for conditional access to make the authentication process more complex can be helpful.

3. Identity Management Systems Need to be Monitored

Identity infrastructure needs to be monitored just like the cloud, endpoint, and networks are monitored. Identity Threat detection and Response Solutions (ITDR) can help protect the IdPs effectively.

4. Attackers Target The Weakest Link

A chain is as strong as its weakest link. Here are a few weak links that can cause incidents like the Okta data breach.

  • Mergers and Acquisitions: Being an integral part of a business that can not be bypassed, security teams should get extra vigilant post mergers and acquisitions and pay some serious attention to the new portions into the network that could be an easier target.
  • Third-Party Access: Companies should set strict rules for third-party access. Because, devices connecting with your systems might not be aligned to security practices as much as yours are, but you are responsible for a breach that happens even because of their shortcomings.

5. Compromised Credentials are the Ultimate Risk

Identity attack vectors weaved weaknesses like exposure of cloud resources to cyberattacks originating from an on-premise environment. Even the highly protected resources could get exposed due to the identity attack vector.

The series of security breaches experienced by Okta over the past year accentuates the intricate cybersecurity challenges faced by even industry-leading tech firms.

In the aftermath of the breaches, the firm has been a target of ridicule and mockery, particularly on platforms like Twitter, highlighting the reputational damage that can accompany technical vulnerabilities.

To add to the firm’s challenges, a notable dip in Okta’s stock prices further underlined the tangible business implications of cybersecurity lapses.

These incidents, from the erosion of shareholder value to public skepticism, serve as a stark warning to all corporations about the gravity of cybersecurity. It’s not just about protecting data, but also about maintaining trust, reputation, and financial stability.

For companies operating in the digital era, investing in and continually updating cybersecurity measures isn’t merely optional—it’s imperative.

The Okta breaches, replete with their multi-dimensional impacts, emphasize the urgency and significance of fortifying cyber defenses and staying prepared for the unpredictabilities of the digital domain.

Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.

Share this:

  • Share on LinkedIn (Opens in new window) LinkedIn
  • Share on Reddit (Opens in new window) Reddit
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
  • More
  • Email a link to a friend (Opens in new window) Email
  • Share on WhatsApp (Opens in new window) WhatsApp

Related

Tags: Okta AttackOkta BreachOkta Security BreachThe Cyber ExpressThe Cyber Express News
Previous Post

Irish Drivers’ Nightmare: Massive Data Breach Exposes Half a Million Motorists

Next Post

20% of Hive Victims Reported Ransomware Attacks, 80% Kept Quiet – FBI

Next Post
20% of Hive Victims

20% of Hive Victims Reported Ransomware Attacks, 80% Kept Quiet - FBI

Threat Landscape Reports 2025

❮ ❯
Cyble-Vision


Follow Us On Google News

Latest Cyber News

Stolen Credit Card Data Trafficking
Governance

Chilean National Extradited to U.S. Over Stolen Credit Card Data Trafficking Scheme

March 2, 2026
cybersecurity firewall
Firewall Daily

Vietnam Announces National Cybersecurity Firewall Plan Under New Digital Governance Law

March 2, 2026
weekly roundup The Cyber Express
Firewall Daily

The Cyber Express Weekly Roundup: Space Security, Malware & Regulatory Alerts

February 27, 2026
government cyber security
Cyber News

UK Tightens Government Cyber Security After Cutting Critical Vulnerabilities by 75%

February 27, 2026

Categories

Web Stories

Do This on Telegram, Your Bank Account Will Become Zero
Do This on Telegram, Your Bank Account Will Become Zero
If You Install the iOS 18 Beta, Your iPhone Could Be Hacked
If You Install the iOS 18 Beta, Your iPhone Could Be Hacked
Cricket World Cup Ticketing Systems Under Cybersecurity
Cricket World Cup Ticketing Systems Under Cybersecurity
Cyber Threats and Online Ticket Scams During the NBA Finals
Cyber Threats and Online Ticket Scams During the NBA Finals
Biometric Data Security: Protecting Sensitive Information
Biometric Data Security: Protecting Sensitive Information

About

The Cyber Express

#1 Trending Cybersecurity News and Magazine

The Cyber Express is a handbook for all stakeholders of the internet that provides information security professionals with the latest news, updates and knowledge they need to combat cyber threats.

 

Contact

For editorial queries: [email protected]

For marketing and Sales: [email protected]

 

Quick Links

  • About Us
  • Contact Us
  • Editorial Calendar
  • Careers
  • The Cyber Express by Cyble Vulnerability Disclosure Policy
  • Cyble Trust Portal

Our Address

We’re remote friendly, with office locations around the world:

San Francisco, Atlanta, Rome,
Dubai, Mumbai, Bangalore, Hyderabad,  Singapore, Jakarta, Sydney, and Melbourne

 

Headquarters:

The Cyber Express LLC
10080 North Wolfe Road, Suite SW3-200, Cupertino, CA, US 95014

 

India Office:

Cyber Express Media Network
HD-021, 4th Floor, C Wing, Building No.4. Nesco IT Park, WE Highway, Goregaon East, Mumbai, Maharashtra, India – 4000063

  • Privacy Statement
  • Terms of Use
  • Write For Us

© 2026 The Cyber Express - Cybersecurity News and Magazine.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

No Result
View All Result
  • Magazine
  • Firewall Daily
  • Essentials
    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Knowledge Hub
  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business
    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • Events
    • Conference
    • Webinar
    • Endorsed Events
  • Advisory Board

© 2026 The Cyber Express - Cybersecurity News and Magazine.

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?
-
00:00
00:00

Queue

Update Required Flash plugin
-
00:00
00:00
Do This on Telegram, Your Bank Account Will Become Zero If You Install the iOS 18 Beta, Your iPhone Could Be Hacked Cricket World Cup Ticketing Systems Under Cybersecurity Cyber Threats and Online Ticket Scams During the NBA Finals Biometric Data Security: Protecting Sensitive Information