{"data":{"allFeedSecurityBlog":{"nodes":[{"title":"Uncloaking VoidProxy: a Novel and Evasive Phishing-as-a-Service Framework","link":"https://okta-sec.helptechsolucoes.com.br/articles/uncloakingvoidproxy/"},{"title":"Attackers Target Hotelier Accounts in Malvertising and Phishing Campaign","link":"https://okta-sec.helptechsolucoes.com.br/articles/2025/08/attackers-target-hotelier-accounts-in-broad-phishing-campaign/"},{"title":"Using Auth0 Logs for Proactive Threat Detection","link":"https://okta-sec.helptechsolucoes.com.br/articles/2025/08/auth0-detection-catalog/"},{"title":"Controlling Cross-App Data Sprawl in Google Workspace","link":"https://okta-sec.helptechsolucoes.com.br/articles/controllingoauthsprawl/"},{"title":"How this ClickFix campaign leads to Redline Stealer","link":"https://okta-sec.helptechsolucoes.com.br/articles/2025/07/how-this-clickfix-campaign-leads-to-redline-stealer/"}]}}}