Technology ❯ Cybersecurity ❯ Data Breaches ❯ Incident Response
Investigators say attackers abused a third-party app to obtain OAuth access, and customers are being directed to Salesforce logs to validate impact.