
A CISO’s Playbook Vol. 2 – 0Auth Token Vulnerability That Caused Salesforce Breach
Executive Summary OAuth tokens are now central to enterprise workflows, enabling seamless and secure integrations across platforms like Salesforce, Google Workspace, and marketing automation systems. However, this convenience has introduced a new attack surface that adversaries are actively exploiting. High-profile incidents — including the Salesforce campaigns attributed to UNC6040 and UNC6395 — demonstrate that OAuth […] The post A CISO’s Playbook Vol. 2 – 0Auth Token Vulnerability That Caused Salesforce Breach appeared first on Health-ISAC - Health Information Sharing and Analysis Center.