News
The files the threat actor obtained in the Okta compromise comprised HTTP archive, or HAR, files, which Okta support personnel use to replicate customer browser activity during troubleshooting ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results