Crime ❯ Cybercrime ❯ Hacking Groups
Data Theft Social Engineering Tactics Data Manipulation Voice Phishing Social Engineering Ransom Demands Phishing Data Exfiltration Data Extortion
Investigators say attackers abused a third-party app to obtain OAuth access, and customers are being directed to Salesforce logs to validate impact.