XM Cyber blog series on Okta attack techniques:

- Part 1 – A (Really) Deep Dive into Okta Key Terms: https://xmcyber.com/blog/attack-techniques-in-okta/

#okta #attacktechniques

Attack Techniques in Okta - Part 1 – A (Really) Deep Dive into Okta Key Terms | XM Cyber

Learn more about Attack Techniques in Okta - Part 1 – A (Really) Deep Dive into Okta Key Terms . Read more on XM Cyber website.

XM Cyber

The SaaS attack matrix we released as open source research project a couple weeks ago introduced some new SaaS attack methods for evading EDR and network monitoring tools.

πŸ‘€ Here's a new demo combining two new SaaS attack techniques - poisoned tenants and SAMLjacking - to make a simple, but effective attack chain.

Link in the comments!

#SaaSSecurity #attacktechniques #saasattacks #redteam #pentester #blueteam

Link to article here: https://bit.ly/3YMCrhi

SAMLjacking a poisoned tenant | Push Security

In this article, we’re going to demo combining two of our favorite new SaaS attack techniques to make a simple, but effective attack chain.

Push Security