SalesDrift Debacle: A Comedy of Errors in Supply Chain Security

SalesDrift hack lands a punch on cybersecurity titans Tenable and Qualys, exposing Salesforce customer data. Yet, amidst the chaos, Tenable and Qualys’ products remain unscathed. Who knew OAuth tokens could stir such drama? Remember, folks, always keep your tokens in a safe place—and no, your sock drawer doesn’t count.

Pro Dashboard

Hot Take:

In a plot twist worthy of a tech-thriller series, Tenable and Qualys have joined the unfortunate cast of companies caught up in the latest installment of the ‘SalesDrift’ saga. Who knew OAuth tokens could become the hottest commodity since Bitcoin? It’s a bit like discovering the key to the office candy jar has been stolen, but the candy remains untouched… for now. At this rate, Salesforce might want to consider offering a new feature: Hackers Anonymous Support Group!

Key Points:

– Tenable and Qualys were targeted in a supply chain attack via Salesforce.
– The attack involved theft of OAuth tokens linked to the Salesloft Drift app.
– No evidence suggests the stolen data has been misused so far.
– Both firms have taken steps to secure their systems and revoke compromised credentials.
– The ‘SalesDrift’ hack has affected numerous other companies, including Google and Okta.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?