All Collections
Security Bulletins
No exposure to potential Okta-breach
No exposure to potential Okta-breach
Bertel Torp avatar
Written by Bertel Torp
Updated over a week ago

And at this time, we see no direct impact on the Ulobby Platform. We will continue to monitor and investigate the situation.

What is the vulnerability?

Is Ulobby impacted?

  • Upon becoming aware of the potential, Ulobby initiated an investigation to determine if any further action is require to mitigate against it. This investigation, has at this time, found no indication of compromise, and there is no action required for Ulobby customers

  • Ulobby is not a customer of Okta, and our primary hosting providers does not use Okta, so so our preliminary investigation has determined that a breach of Okta does not have implications for our customer data.

  • As Okta is a widely used provider some of our supporting vendors are bound to use Oktas services, initial research has identified HubSpot and LinkedIn as Okta users. We will continue to monitor reports regarding the potential breach and work with our vendors to ensure the security of our customers.

  • UPDATED: Wednesday, 23-Mar-22 10:06:39 UTC: Okta has responded to the news report; OKTA, CISO:
    โ€‹"I am confident in our conclusions that the Okta service has not been breached and there are no corrective actions that need to be taken by our customers" (https://www.okta.com/blog/2022/03/oktas-investigation-of-the-january-2022-compromise/)

Do I need to do anything?

  • Customers do not need to take any action unless they themselves use Okta.

We will continue to evaluate this matter, and if we determine Ulobby or our customers are impacted going forward, we will take all appropriate measures to help protect our customers and provide additional communications. We appreciate your trust in us as we continue to make your success our top priority.

Did this answer your question?