Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
HackerOne Confirms Data Breach – Hackers Gained Unauthorized Access To Salesforce Instance

HackerOne Confirms Data Breach – Hackers Gained Unauthorized Access To Salesforce Instance

Posted on September 10, 2025September 10, 2025 By CWS

HackerOne has confirmed it was among the many firms affected by a current information breach that supplied unauthorized entry to its Salesforce occasion. The entry was gained via a compromise of the third-party utility Drift, which Salesloft owns.

The bug bounty platform introduced the safety incident, aligning with its firm worth of “Default to Disclosure.” In keeping with the corporate, its safety crew was first notified of a possible compromise by Salesforce on Friday, August 22, 2025.

This was subsequently confirmed by Salesloft the next day, prompting HackerOne to activate its incident response protocols instantly.

The corporate is working in partnership with each Salesforce and Salesloft to analyze the complete scope and influence of the breach. This incident is a part of a broader assault marketing campaign that has impacted lots of of firms.

HackerOne Confirms Knowledge Breach

As detailed in a report by Google’s Mandiant, risk actors focused Salesforce buyer information by exploiting a vulnerability inside the Drift advertising and gross sales utility.

By compromising Drift, attackers have been capable of pivot and acquire unauthorized entry to related Salesforce environments, permitting for the theft of delicate buyer and gross sales information.

HackerOne’s affirmation locations it on a rising record of companies responding to this provide chain assault. Whereas the investigation stays ongoing, HackerOne said {that a} subset of information inside its Salesforce occasion was accessed by the unauthorized events.

Nonetheless, the corporate expressed confidence that no buyer vulnerability information was impacted or uncovered throughout the incident.

That is attributed to the agency’s strict inner insurance policies and controls, which govern information segmentation, successfully siloing delicate vulnerability info away from the compromised gross sales and advertising information within the Salesforce setting.

HackerOne is constant to conduct a forensic evaluation on the particular information accessed to find out the precise nature of the uncovered info.

The corporate has dedicated to speaking straight with any prospects who’re recognized as being impacted by the breach.

This incident highlights the numerous dangers related to third-party utility integrations and the potential for provide chain assaults to bypass a corporation’s direct safety defenses.

Discover this Story Attention-grabbing! Comply with us on Google Information, LinkedIn, and X to Get Extra Instantaneous Updates.

Cyber Security News Tags:Access, Breach, Confirms, Data, Gained, HackerOne, Hackers, Instance, Salesforce, Unauthorized

Post navigation

Previous Post: New Phishing Kit Targeting US and EU Enterprises
Next Post: Critical Microsoft Office Vulnerabilities Let Attackers Execute malicious Code

Related Posts

Threat Actors Pioneering a New Operational Model That Combines Digital and Physical Threats Threat Actors Pioneering a New Operational Model That Combines Digital and Physical Threats Cyber Security News
CISA Releases Guide to Protect Network Edge Devices From Hackers CISA Releases Guide to Protect Network Edge Devices From Hackers Cyber Security News
Angular HTTP Client Vulnerability Exposes XSRF Token to an Attacker-Controlled Domain Angular HTTP Client Vulnerability Exposes XSRF Token to an Attacker-Controlled Domain Cyber Security News
NIST Releases Control Overlays to Manage Cybersecurity Risks in Use and Developments of AI Systems NIST Releases Control Overlays to Manage Cybersecurity Risks in Use and Developments of AI Systems Cyber Security News
10 Best API Monitoring Tools in 2025 10 Best API Monitoring Tools in 2025 Cyber Security News
Synology BeeStation 0-Day Vulnerability Let Remote Attackers Execute Arbitrary Code Synology BeeStation 0-Day Vulnerability Let Remote Attackers Execute Arbitrary Code Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News