News

Salesloft says attackers first breached its GitHub account in March, leading to the theft of Drift OAuth tokens later used in ...
The malware tricks IT personnel into downloading malicious GitHub Desktop installers with GPU-gated decryption targeting ...
Threat actors had access to Salesloft’s GitHub account between March and June 2025 and performed reconnaissance.
Security investigators from Google said UNC6395 hackers spent several months running through Salesloft and Drift systems before launching a data breach campaign that some security researchers say has ...
The leaked token, accidentally embedded by the company’s employee in a public repository, might have provided an attacker with unrestricted access to the company’s GitHub Enterprise server. Thus, ...
Investigations into the Nx "s1ngularity" NPM supply chain attack have unveiled a massive fallout, with thousands of account ...
Salesloft has revealed that threat actors targeted customer Salesforce data after breaching its GitHub account ...
Thousands of secrets such as PyPI and AWS keys, GitHub tokens, and more, were stolen recently during a supply-chain attack ...
The breach, now known to have begun in March, raises questions about why it took six months for Salesloft to detect the breach.
Google-owned Mandiant, which began an investigation into the incident, said the threat actor, tracked as UNC6395, accessed the Salesloft GitHub account from March through June 2025. It's currently not ...
Cloudflare last week pinned the attack on a threat group it tracks as GRUB1 that aligns with UNC6395. And it's suspected that ...
Mosyle security firm has discovered malware bypassing antivirus software on Windows, macOS, and Linux. The research firm ...