Skip to main content
Vol. I · No. 1

The Identity at the Core

The Definitive Chronicle of Identity & Access Management

Breach: BREACH: Major healthcare provider confirms 2.3M patient records exposed via misconfigured SCIM endpointVulnerability: CVE-2026-31847: Critical RCE in FortiAuthenticator — CVSS 9.8 — Patch immediatelyBreach: BREACH: European fintech platform leaks OAuth tokens affecting 890K usersAdvisory: ADVISORY: CISA warns of active exploitation of SAML implementation flaws in enterprise SSO productsBreach: BREACH: Major healthcare provider confirms 2.3M patient records exposed via misconfigured SCIM endpointVulnerability: CVE-2026-31847: Critical RCE in FortiAuthenticator — CVSS 9.8 — Patch immediatelyBreach: BREACH: European fintech platform leaks OAuth tokens affecting 890K usersAdvisory: ADVISORY: CISA warns of active exploitation of SAML implementation flaws in enterprise SSO products

BREACH: Major healthcare provider confirms 2.3M patient records exposed via misconfigured SCIM endpoint

CVE-2026-31847: Critical RCE in FortiAuthenticator — CVSS 9.8 — Patch immediately

BREACH: European fintech platform leaks OAuth tokens affecting 890K users

Security

Responsible Disclosure

Last updated: May 5, 2026

We take security seriously. If you have found a vulnerability, please report it privately so we can fix it before it can be exploited. We follow the principles of coordinated disclosure as defined by ISO/IEC 29147 and value the work of independent researchers.

How to report

Email security@identityatcore.org. If you would like to encrypt your report, request our PGP key in the first message — we will reply with the public key.

You can also use the machine-readable details published at /.well-known/security.txt (RFC 9116).

What to include

Our commitments

Scope

Out of scope

Safe harbor

Activity conducted in accordance with this policy will be considered authorized, and we will not initiate or support legal action against you. If a third party initiates legal action against you for activity that complied with this policy, we will make this authorization known.

Hall of fame

Researchers who have responsibly disclosed valid issues to us. Want to be on this list? Get in touch.

No reports yet. Be the first.

Bug bounty

We do not currently run a paid bug-bounty program. We are happy to discuss recognition and swag for impactful reports.

site:security | Identity at the Core