Not till long ago, getting user credentials by an attacker was equivalent to
getting access to all their data, so cred
Analysis of the possible implications of the Okta supply chain attack. What are we missing in the potential OKTA compromise?