JumpCloud, a supplier of cloud-based identification and entry administration options, has swiftly reacted to an ongoing cybersecurity incident that impacted a few of its shoppers.
As a part of its harm management efforts, JumpCloud has reset the appliance programming interface (API) keys of all prospects affected by this occasion, aiming to guard their useful information.
The corporate has knowledgeable the involved shoppers concerning the important nature of this transfer, reinforcing its dedication to safeguarding their operations and organizations. This API key reset will, nonetheless, disrupt sure functionalities like AD import, HRIS integrations, JumpCloud PowerShell modules, JumpCloud Slack apps, Listing Insights Serverless apps, ADMU, third-party zero-touch MDM packages, Command Triggers, Okta SCIM integration, Azure AD SCIM integration, Workato, Aquera, Tray, and extra.
Regardless of the potential disruptions, JumpCloud maintains that the important thing reset is for the larger good of its shoppers. For these needing help with resetting or re-establishing their API keys, the corporate stands prepared to supply assist.
The corporate urges affected shoppers to promptly reset their API keys to boost their techniques’ safety. To assist on this, JumpCloud has made obtainable an in depth information and an interactive simulation.
This latest occasion has highlighted the significance of API safety, demonstrating the necessity for strong protecting measures. It’s essential for companies to adequately safe their APIs to avert potential safety breaches.
JumpCloud’s cloud-based Energetic Listing (AD) companies are utilized by over 180,000 organizations globally. A large number of software program distributors and cloud service suppliers have built-in their techniques with JumpCloud’s suite of identification, entry, and gadget administration companies.
🔐 Privileged Entry Administration: Be taught Tips on how to Conquer Key Challenges
Uncover completely different approaches to beat Privileged Account Administration (PAM) challenges and degree up your privileged entry safety technique.
Particulars relating to the specifics or scale of the incident aren’t obtainable at this second, however JumpCloud is actively addressing the scenario. It’s but to be ascertained whether or not the corporate’s community was compromised or the exact reason behind the problem.
JumpCloud’s communication has drawn some criticism for not being totally clear.
Shoppers of JumpCloud affected by this occasion are suggested to expedite their API key resets and keep tuned for additional developments or bulletins associated to this incident.