Salesforce Data Breach: ShinyHunters Exploit Gainsight OAuth Flaw
Hackers used Gainsight integrations to infiltrate Salesforce, exposing the hidden dangers of OAuth token theft and third-party app connections in the cloud era.
2317 article(s)
Hackers used Gainsight integrations to infiltrate Salesforce, exposing the hidden dangers of OAuth token theft and third-party app connections in the cloud era.
Samourai Wallet’s creators are now in prison after running a crypto mixing service that laundered over $2 billion in illicit funds, sparking a global crackdown.
Photocall, a massive illegal streaming network with millions of users, has been dismantled by a global anti-piracy coalition in a sweeping crackdown on IPTV crime.
A newly discovered SonicOS bug lets attackers remotely crash SonicWall firewalls. Learn what’s at stake, how it works, and why rapid patching is critical for businesses.
A coordinated cyber campaign hit Palo Alto's GlobalProtect VPN with 2.3 million scans in five days, exposing new risks and signaling possible new vulnerabilities ahead.
A massive cyberattack on Almaviva has exposed 2.3TB of sensitive data tied to Italy’s railways, raising urgent questions about the security of critical infrastructure.
A stealthy WhatsApp Trojan called Eternidade is sweeping Brazil, stealing banking and crypto credentials through clever phishing and adaptive malware tactics. Here’s how this digital plague operates.
A covert Chinese hacking group has hijacked routers to intercept software updates, compromising trusted apps and exposing a new cyber-espionage frontier. Find out how it works and how to defend.
A stealthy new Android trojan called Sturnus can bypass encrypted messaging, steal banking credentials, and hijack devices—posing a major threat to European financial institutions.
Amazon Prime Video’s AI-powered recaps create video summaries of TV shows, helping viewers catch up quickly and raising new questions about memory, streaming, and digital storytelling.