The New Oil<p><a href="https://mastodon.thenewoil.org/tags/Okta" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Okta</span></a> open-sources catalog of <a href="https://mastodon.thenewoil.org/tags/Auth0" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Auth0</span></a> rules for threat detection</p><p><a href="https://www.bleepingcomputer.com/news/security/okta-open-sources-catalog-of-auth0-rules-for-threat-detection/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/okta-open-sources-catalog-of-auth0-rules-for-threat-detection/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a></p>