Technology ❯ Cybersecurity ❯ Threat Actors ❯ Shiny Hunters
Investigators say attackers abused a third-party app to obtain OAuth access, and customers are being directed to Salesforce logs to validate impact.