Aggregator
CVE-2023-20897 | Salt prior 3005.2/3006.2 Minion denial of service (FEDORA-2023-ac1aa963e4 / Nessus ID 260715)
Tenable Response to Salesforce and Salesloft Drift Incident
At Tenable, we take transparency seriously, especially when it comes to protecting our customers’ data. We recently learned of a widespread data theft campaign involving the integration of Salesforce and Salesloft Drift, and Tenable was among the many organizations impacted. In line with our commitment to transparency and data protection, we made impacted customers aware of the details as quickly as possible. Importantly, we assured them that Tenable products and any data within the Tenable product suite were not impacted.
Our ongoing investigation found evidence that an unauthorized user had access to a portion of some of our customers’ information stored in our Salesforce instance, including subject lines and initial descriptions provided by our customers when opening a Tenable support case, and commonly available business contact information (such as names, business email addresses, phone numbers, and regional/location references). At this time we have no evidence that any of this information has been misused.
Tenable has robust controls in place and have taken immediate action to address this issue, including:
- Revoked and Rotated Credentials: Revoked and rotated all potentially compromised Salesforce, Drift and associated integrations (or systems) credentials.
- Secured Our Systems: Further hardened our Salesforce environment and other connected systems to reduce the likelihood of a future exploitation.
- Disabled and Removed the Application: Disabled and removed the Salesloft Drift application from our Salesforce instance and all applications that integrated with Salesloft.
- Actioned Indicators of Compromise: Applied known available indicators of compromise shared by Salesforce and leading cybersecurity experts.
- Maintained Continuous Monitoring: Ongoing monitoring of our Salesforce and other SaaS solutions utilizing our established SSPM technology for exposures and unusual activity.
The security and privacy of our customers’ data are critical to us, and we strongly recommend that our customers take the proactive steps recommended by Salesforce and leading cybersecurity experts, which can be viewed here.
At Tenable, we are committed to a transparent and thorough response to any security issue. Our team is working around the clock to safeguard our systems and our customers’ data, and will update as appropriate.
Need Assistance?
If you have concerns or need additional support, Tenable’s Support teams are available at [email protected].
CVE-2023-0821 | HashiCorp Nomad/Nomad Enterprise prior 1.2.16/1.3.9/1.4.4 Compressed Artifact Stanza Source data amplification (Nessus ID 260718)
CVE-2022-40208 | Moodle Quiz Web Service logic error (EUVD-2023-0958 / Nessus ID 260716)
CVE-2022-3261 | Red Hat OpenStack /var/log/messages log file (Nessus ID 260717)
CVE-2022-29969 | RSS Extension on MediaWiki RSS Element cross site scripting (Nessus ID 260720)
CVE-2022-39234 | GLPI up to 10.0.3 Cookie session expiration (GHSA-pgcx-mc58-3gmg / Nessus ID 260719)
Why Users and Businesses Are Choosing to Get Paid in USDT Instead of Local Currency
Microsoft изменила законы связи и провела интернет сквозь пустоту
CVE-2022-21673 | Grafana up to 7.5.12/8.3.3 Data Source information disclosure (GHSA-8wjh-59cw-9xh4 / Nessus ID 260721)
CVE-2022-31068 | GLPI up to 10.0.1 information disclosure (GHSA-g4hm-6vfr-q3wg / Nessus ID 260724)
CVE-2022-39370 | GLPI up to 10.0.3 Debug Panel install/update.php access control (GHSA-6c2p-wgx9-vrjc / Nessus ID 260722)
CVE-2022-39183 | SAML Auth Plugin on Moodle redirect (Nessus ID 260723)
Steam 每天增加 10 万新付费玩家
FTC announces settlement with toy robot makers that tracked location of children
Apitor collected data without informing parents or asking for permission, the FTC said, violating federal parental consent requirements.
The post FTC announces settlement with toy robot makers that tracked location of children appeared first on CyberScoop.
New Stealthy Python Malware Leverages Discord to Steal Data From Windows Machines
A sophisticated new Python-based information stealer has emerged in the cybersecurity landscape, demonstrating advanced capabilities for data exfiltration through Discord channels. The malware, identified as “Inf0s3c Stealer,” represents a significant evolution in the realm of data theft tools, combining traditional system reconnaissance techniques with modern communication platforms to avoid detection while efficiently harvesting sensitive information […]
The post New Stealthy Python Malware Leverages Discord to Steal Data From Windows Machines appeared first on Cyber Security News.