Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Google Warns 2.5B Gmail Users to Reset Passwords Following Salesforce Data Breach

Posted on August 30, 2025August 30, 2025 By CWS

Google has issued a broad safety alert to its 2.5 billion Gmail customers, advising them to reinforce their account safety within the wake of an information breach involving one of many firm’s third-party Salesforce techniques.

The incident, which occurred in June 2025, has escalated issues over refined phishing campaigns concentrating on an enormous consumer base.

In June, a risk group recognized as UNC6040, additionally recognized by its extortion model ShinyHunters, efficiently infiltrated a company Salesforce occasion utilized by Google. This technique saved contact data and gross sales notes for small and medium-sized companies.

In line with Google’s evaluation, the risk actor accessed and retrieved a restricted set of knowledge containing primary, largely public enterprise data like firm names and get in touch with particulars.

Google has emphasised that the breach didn’t compromise shopper merchandise like Gmail or Google Drive and that no passwords or monetary information have been uncovered.

The attackers employed a social engineering tactic generally known as voice phishing, or “vishing,” to achieve preliminary entry. By impersonating IT assist workers over the cellphone, they deceived an worker into granting them system privileges.

This allowed the hackers to exfiltrate information earlier than their entry was found and terminated by Google’s safety groups. ShinyHunters is a widely known group linked to latest breaches at different main corporations, together with Adidas, Cisco, and LVMH.

Whereas the stolen information itself is taken into account low-risk, safety consultants warn that it may be weaponized to create extremely convincing phishing and vishing assaults.

Attackers are leveraging the information of the breach to craft scams that seem professional, tricking customers into revealing their login credentials or two-factor authentication (2FA) codes. The risk group is thought for escalating its techniques by leaking information or utilizing it for extortion to strain victims.

In response to the incident, Google promptly contained the breach, performed an affect evaluation, and started mitigation efforts.

On August 5, the corporate publicly detailed the occasion and the actions of UNC6040. By August 8, Google confirmed it had accomplished sending e mail notifications to all events straight affected by the breach.

Given the heightened threat of follow-on assaults, Google is urging all Gmail customers to stay vigilant and take proactive safety measures. The corporate strongly recommends updating passwords, enabling two-factor authentication, and being cautious of unsolicited emails or calls requesting private data.

Discover this Story Fascinating! Comply with us on Google Information, LinkedIn, and X to Get Extra Immediate Updates.

Cyber Security News Tags:2.5B, Breach, Data, Gmail, Google, Passwords, Reset, Salesforce, Users, Warns

Post navigation

Previous Post: WhatsApp Issues Emergency Update for Zero-Click Exploit Targeting iOS and macOS Devices
Next Post: Top 10 Best API Penetration Testing Companies In 2025

Related Posts

Hackers Exploit RTL/LTR Scripts and Browser Gaps to Hide Malicious URLs Cyber Security News
Threat Actors Weaponizing SVG Files to Embed Malicious JavaScript Cyber Security News
Threat Actors Leveraging Dynamic DNS Providers to Use for Malicious Purposes Cyber Security News
Endpoint Security Reimagined EDR vs XDR Comparison Cyber Security News
Threat Actors Adapting Android Droppers Even to Deploy Simple Malware to Stay Future-Proof Cyber Security News
MongoDB Server Pre-Authentication Vulnerability Let Attackers Trigger DoS Condition Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • ICS Patch Tuesday: Fixes Announced by Siemens, Schneider, Rockwell, ABB, Phoenix Contact
  • Windows 11 And Server 2025 Will Start Caching Plaintext Credentials By Enabling WDigest Authentication
  • Windows Agere Modem Driver 0-Day Vulnerabilities Actively Exploited To Escalate Privileges
  • Two New Windows Zero-Days Exploited in the Wild — One Affects Every Version Ever Shipped
  • High-Severity Vulnerabilities Patched by Fortinet and Ivanti

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • ICS Patch Tuesday: Fixes Announced by Siemens, Schneider, Rockwell, ABB, Phoenix Contact
  • Windows 11 And Server 2025 Will Start Caching Plaintext Credentials By Enabling WDigest Authentication
  • Windows Agere Modem Driver 0-Day Vulnerabilities Actively Exploited To Escalate Privileges
  • Two New Windows Zero-Days Exploited in the Wild — One Affects Every Version Ever Shipped
  • High-Severity Vulnerabilities Patched by Fortinet and Ivanti

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News