资讯
A widespread data theft campaign has allowed hackers to breach sales automation platform Salesloft to steal OAuth and refresh tokens associated with the Drift artificial intelligence (AI) chat agent.
Salesforce customers have again been targeted in a “widespread data theft campaign,” this time via compromised OAuth tokens associated with the third-party Salesloft Drift application. Salesloft Drift ...
A threat actor managed to obtain Salesforce OAuth tokens from a third-party integration called Salesloft Drift and used the tokens to download large volumes of data from impacted Salesforce instances.
HR and finance giant Workday has disclosed a data breach that may be the result of an attack launched as part of a widespread campaign. Workday said threat actors gained access to a third-party ...
Proofpoint observed campaigns impersonating trusted brands like SharePoint and DocuSign with malicious OAuth applications to get into Microsoft 365 accounts. Threat actors have cooked up a clever way ...
Cybersecurity researchers have detailed a new cluster of activity where threat actors are impersonating enterprises with fake Microsoft OAuth applications to facilitate credential harvesting as part ...
A new wave of targeted phishing attacks exploiting Microsoft 365’s OAuth workflows has been uncovered by cybersecurity experts. These campaigns, observed by Volexity since March 2025, involve ...
Processors Nova Lake shipping manifest confirms rumours that Intel's flagship CPU will be packing up to 52 cores, but more cores aren't all Intel needs Processors Even after performance fixes and ...
Node.js 24 has officially arrived, and it’s bringing a rather tasty selection of improvements to the table. If you’re a developer knee-deep in web apps or wrestling with asynchronous code, this ...
The company previews the new chip node as Intel's foundry business tries to take on TSMC and recruit more tech companies as clients. As Intel prepares to manufacture chips with its 18A process, the ...
Russian hackers have exploited legitimate OAuth 2.0 authentication workflows to hijack Microsoft 365 accounts. As the cybersecurity space is evolving with time, cyberattackers are trying different ...
一些您可能无法访问的结果已被隐去。
显示无法访问的结果