Technology ❯ Cybersecurity ❯ Data Breaches ❯ Third-Party Risks
The activity traces to a third‑party connection rather than a Salesforce vulnerability, prompting forensic reviews and customer audits.