Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Workday Confirms Data Breach – Hackers Accessed Customers Data and Case Information

Posted on September 10, 2025September 10, 2025 By CWS

Workday has confirmed it suffered an information breach after a safety incident involving a third-party utility that compromised buyer info.

The breach originated from Salesloft’s Drift utility, which connects to Salesforce environments.

On August 23, 2025, Workday turned conscious of the problem and instantly disconnected the app, invalidated its entry tokens, and initiated an investigation with the assist of an exterior forensics agency. The incident highlights the persistent dangers related to third-party integrations in enterprise environments.

The foundation reason for the breach was a compromise inside Salesloft’s programs. On August 26, 2025, Salesloft confirmed {that a} risk actor had breached its infrastructure, obtained OAuth credentials, and used them to execute searches inside its clients’ Salesforce environments.

Workday’s personal investigation confirmed that its Salesforce occasion was impacted by this unauthorized entry.

In response, Workday promptly started evaluating all of its distributors that make the most of the Drift utility to evaluate the total scope of the incident and forestall additional unauthorized exercise. The corporate emphasised that its core buyer tenants weren’t straight accessed or compromised by way of this vector.

Information Uncovered

In accordance with Workday’s investigation, which a third-party forensics agency verified, the risk actor’s entry was restricted to a really small subset of knowledge saved inside its Salesforce atmosphere.

The uncovered information contains enterprise contact info, primary assist case particulars, tenant-related attributes equivalent to tenant and information middle names, product and repair names, coaching course information, and occasion logs.

Crucially, the risk actor didn’t achieve entry to delicate exterior recordsdata like contracts, order kinds, or any attachments that clients could have included in assist circumstances.

Workday is proactively looking out all assist circumstances for any credentials that will have been inadvertently shared and can notify affected clients straight.

Out of an abundance of warning, Workday is strongly urging all clients to instantly rotate any credentials that will have been shared with its assist groups by way of a assist case.

The corporate reiterated its recommendation that clients ought to by no means embody delicate info, equivalent to login credentials, in assist tickets.

Along with this main advice, Workday suggested clients to comply with safety finest practices, together with the necessary use of multi-factor authentication, conducting common phishing consciousness coaching for workers, and actively monitoring person exercise for any indicators of suspicious habits. Salesloft has additionally printed its personal safety suggestions for purchasers to assessment.

Confirmed victims of this provide chain assault embody:

Palo Alto Networks: The cybersecurity agency confirmed the publicity of enterprise contact info and inside gross sales information from its CRM platform.

Zscaler: The cloud safety firm reported that buyer info, together with names, contact particulars, and a few assist case content material, was accessed.

Google: Along with being an investigator, Google confirmed a “very small quantity” of its Workspace accounts had been accessed by way of the compromised tokens.

Cloudflare: Cloudflare has confirmed an information breach the place a classy risk actor accessed and stole buyer information from the corporate’s Salesforce occasion.

PagerDuty has confirmed a safety incident that resulted in unauthorized entry to a few of its information saved in Salesforce.

Tenable has confirmed an information breach that uncovered the contact particulars and assist case info of a few of its clients.

Qualys has confirmed it was impacted by a widespread provide chain assault that focused the Salesloft Drift advertising platform, leading to unauthorized entry to a portion of its Salesforce information.

Dynatrace has confirmed it was impacted by a third-party information breach originating from the Salesloft Drift utility, leading to unauthorized entry to buyer enterprise contact info saved in its Salesforce CRM.

Elastic has disclosed a safety incident stemming from a third-party breach at Salesloft Drift, which resulted in unauthorized entry to an inside e mail account containing legitimate credentials.

Discover this Story Attention-grabbing! Comply with us on Google Information, LinkedIn, and X to Get Extra Immediate Updates.

Cyber Security News Tags:Accessed, Breach, Case, Confirms, Customers, Data, Hackers, Information, Workday

Post navigation

Previous Post: Chrome Security Update Patches Critical Remote Code Execution Vulnerability
Next Post: Critical SAP NetWeaver Vulnerability Let Attackers Execute Arbitrary Code And Compromise System

Related Posts

Electronic Arts Blocked 300,000 Attempts Following Battlefield 6 Beta Launch Cyber Security News
Lampion Banking Malware Employs ClickFix Lures To Steal Banking Information Cyber Security News
New Variant of The XCSSET Malware Attacking macOS App Developers Cyber Security News
Windows 11 24H2 Security Update Causes SSD/HDD Failures and Potential Data Corruption Cyber Security News
Critical Microsoft Office Vulnerabilities Let Attackers Execute malicious Code Cyber Security News
Chinese Threat Actors Using 2,800 Malicious Domains to Deliver Windows-Specific Malware Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • SideWinder Adopts New ClickOnce-Based Attack Chain Targeting South Asian Diplomats
  • Apache Tomcat Security Vulnerabilities Expose Servers to Remote Code Execution Attacks
  • 81% Router Usres Have Not Changed Default Admin Passwords, Exposing Devices to Hackers
  • iOS 26 Deletes Pegasus and Predator Spyware Infection Evidence by Overwriting The ‘shutdown.log’ file on Reboot
  • nsKnox Launches Adaptive Payment Security™, Solving the “Impossible Triangle” of B2B Fraud Prevention

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • SideWinder Adopts New ClickOnce-Based Attack Chain Targeting South Asian Diplomats
  • Apache Tomcat Security Vulnerabilities Expose Servers to Remote Code Execution Attacks
  • 81% Router Usres Have Not Changed Default Admin Passwords, Exposing Devices to Hackers
  • iOS 26 Deletes Pegasus and Predator Spyware Infection Evidence by Overwriting The ‘shutdown.log’ file on Reboot
  • nsKnox Launches Adaptive Payment Security™, Solving the “Impossible Triangle” of B2B Fraud Prevention

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News