This is the best summary I could come up with:
The password authenticator was hit by a cyberattack in September and said earlier this month that just 1% of its customers were affected.
David Bradbury, Okta’s chief security officer, said in the post: “While we do not have direct knowledge or evidence that this information is being actively exploited, there is a possibility that the threat actor may use this information to target Okta customers via phishing or social engineering attacks.”
Bradbury advised all customers to use multi-factor authentication, which requires more than one security test, to keep their information safe online.
San Francisco-based Okta offers companies identity management tools including single sign-in and multi-factor authentication for secure website logins.
The company has more than 18,000 corporate clients including FedEx, S&P Global, T-Mobile and Zoom, per its website.
Then in August hacking group Scatter Swine gained access to Okta customer data, it claimed in a blog post, breaching more than 100 companies including software firm Twilio.Okta didn’t immediately respond to a request for comment from Business Insider, made outside normal working hours.
The original article contains 249 words, the summary contains 172 words. Saved 31%. I’m a bot and I’m open source!
This is the best summary I could come up with:
A prolific espionage hacking group with ties to China spent over two years looting the corporate network of NXP, the Netherlands-based chipmaker whose silicon powers security-sensitive components found in smartphones, smartcards, and electric vehicles, a news outlet has reported.
The intrusion, by a group tracked under names including “Chimera” and “G0114,” lasted from late 2017 to the beginning of 2020, according to Netherlands national news outlet NRC Handelsblad, which cited “several sources” familiar with the incident.
“Once nested on a first computer—patient zero—the spies gradually expand their access rights, erase their tracks in between and secretly sneak to the protected parts of the network,” NRC reporters wrote in an English translation.
According to the log files that Fox-IT finds, the hackers come every few weeks to see whether interesting new data can be found at NXP and whether more user accounts and parts of the network can be hacked.”
NXP also provides chips for the MIFARE card used by transit companies, FIDO-compliant security keys, and tools for relaying data inside the networks of electric vehicles.
Security firm Cycraft documented one two-year hacking spree that targeted semiconductor makers with operations in Taiwan, where NXP happens to have research and development facilities.
The original article contains 989 words, the summary contains 199 words. Saved 80%. I’m a bot and I’m open source!