Obsidian Security’s Post

Despite claims that Okta's CORS policies and device matching can stop AiTM phishing attacks, our research proves otherwise. We demonstrate how attackers can easily modify Evilginx configurations to bypass these controls and steal session cookies—even with MFA enabled. Learn why traditional security measures fall short against sophisticated phishing and what actually works: phishing-resistant MFA like Okta FastPass, proactive domain monitoring, and robust ITDR solutions. Link in comments.

  • graphical user interface
C H.

Principal Information Security Engineer @ RGA

1w

Was reading about this on vector on Push Security last month.  Interesting and really great use case for fast pass via Okta.  If that fails as it should I’d imagine 90%+ of users will just use push.

Alfredo Hickman

CISO at Obsidian Security | Founder | Board Advisor | Veteran | Father

2w

Fantastic insights.

Like
Reply
See more comments

To view or add a comment, sign in

Explore topics