HackerOne, a well-known platform for managing vulnerability disclosures, recently experienced a data breach involving its Salesforce system. The breach was traced back to a compromised integration with the Drift application, which was supplied by Salesloft. On August 22, Salesforce detected suspicious activity involving this integration and alerted affected clients. The following day, Salesloft confirmed that a vulnerability in the Drift integration had allowed unauthorized access to Salesforce records across several organizations, including HackerOne. Upon notification, HackerOne promptly activated its incident response procedures and began working closely with both Salesforce and Salesloft to contain the issue. The breach occurred due to a security flaw in the Drift app’s connection with Salesforce. Exploiting this weakness, attackers managed to access certain customer data stored within Salesforce. Fortunately, HackerOne’s internal safeguards, such as strict access control and data segmentation, ensured that sensitive vulnerability reports and security submissions remained secure. The compromised data was limited to general business records like contact details and standard account information, rather than critical or confidential disclosures. Nevertheless, HackerOne launched a full investigation, involving external forensic experts to assess the situation and ensure no lingering threats remained. To prevent similar incidents, organizations should regularly audit third-party integrations and monitor for any unusual activity. Disabling unused or vulnerable components and applying security updates promptly is essential. HackerOne has already deactivated the compromised integration and is collaborating on a secure update. Customers are advised to stay alert, review their account activity, and report any anomalies. Maintaining open communication and proactive security measures is crucial for protecting sensitive information and sustaining customer trust.
CERT-UA has reported a large-scale phishing campaign in which threat actors impersonated the agency to distribute a remote access trojan (RAT) known as AGEWHEEZE. The campaign, att...
A critical vulnerability identified as CVE-2026-33026 affects the backup and restore functionality of nginx-ui, exposing systems to severe security risks. This flaw enables attacke...
Microsoft has identified a new malware campaign that distributes malicious Visual Basic Script (VBS) files through WhatsApp messages, targeting Windows users. The campaign relies h...