SalesDrift Debacle: A Comedy of Errors in Supply Chain Security
SalesDrift hack lands a punch on cybersecurity titans Tenable and Qualys, exposing Salesforce customer data. Yet, amidst the chaos, Tenable and Qualys’ products remain unscathed. Who knew OAuth tokens could stir such drama? Remember, folks, always keep your tokens in a safe place—and no, your sock drawer doesn’t count.

Hot Take:
In a plot twist worthy of a tech-thriller series, Tenable and Qualys have joined the unfortunate cast of companies caught up in the latest installment of the ‘SalesDrift’ saga. Who knew OAuth tokens could become the hottest commodity since Bitcoin? It’s a bit like discovering the key to the office candy jar has been stolen, but the candy remains untouched… for now. At this rate, Salesforce might want to consider offering a new feature: Hackers Anonymous Support Group!
Key Points:
– Tenable and Qualys were targeted in a supply chain attack via Salesforce.
– The attack involved theft of OAuth tokens linked to the Salesloft Drift app.
– No evidence suggests the stolen data has been misused so far.
– Both firms have taken steps to secure their systems and revoke compromised credentials.
– The ‘SalesDrift’ hack has affected numerous other companies, including Google and Okta.