Technology ❯ Cybersecurity ❯ Threat Actors
Attack Trends Cyber Extortion
Investigators say attackers abused a third-party app to obtain OAuth access, and customers are being directed to Salesforce logs to validate impact.