IT Security News
Cybersecurity news and articles about information security, vulnerabilities, exploits, hacks, laws, spam, viruses, malware, breaches.

Main menu

Skip to content
  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Apps
    • Telegram Channel
EN, www.infosecurity-magazine.com

Cloudflare and Palo Alto Networks Victimized in Salesloft Drift Breach

2025-09-03 13:09

Cloudflare has notified customers that hackers may have accessed their data as part of the Salesloft Drift campaign

This article has been indexed from www.infosecurity-magazine.com

Read the original article:

Cloudflare and Palo Alto Networks Victimized in Salesloft Drift Breach

Tags: EN www.infosecurity-magazine.com

Post navigation

← Misconfigured Server Leaks 378GB of Navy Federal Credit Union Files
Pennsylvania Attorney General Confirms Ransomware Behind Weeks-Long Outage →

Pages

  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Apps
    • Telegram Channel

Recent Posts

  • IT Security News Hourly Summary 2025-09-03 15h : 13 posts September 3, 2025
  • Why this Bosch screwdriver is my new all-time favorite tool (and it charges with USB-C) September 3, 2025
  • I’m ditching passwords for passkeys for one reason – and it’s not what you think September 3, 2025
  • Cato Networks Acquires AI Security Firm Aim Security September 3, 2025
  • Veeam Software Appliance boosts data protection September 3, 2025
  • Everfox HSV-T protects data transfer between classified and unclassified networks September 3, 2025
  • Nucleus Insights turns CVE noise into an explainable threat signal September 3, 2025
  • PagerDuty Confirms Data Breach After Salesforce Account Compromise September 3, 2025
  • Why Zero Trust Is Not a Product but a Strategy You Can’t Ignore in 2025 September 3, 2025
  • As an Android user, this is the closest thing to AirTags for my wallet (and better in some ways) September 3, 2025
  • Marshall’s latest sound systems are making me reconsider splurging on Bose September 3, 2025
  • How to clear your iPhone cache (and why you shouldn’t wait to do it) September 3, 2025
  • 5 ways to fill the AI skills gap in your business September 3, 2025
  • Passkeys are the passwordless future, but they’re a mess September 3, 2025
  • Cloudflare confirms data breach linked to Salesloft Drift supply chain compromise September 3, 2025
  • CISA Alerts on TP-Link Authentication Flaw Under Active Exploitation September 3, 2025
  • Namespace Reuse Vulnerability Exposes AI Platforms to Remote Code Execution September 3, 2025
  • I looked into the most popular AI apps, and the runner-up caught me by surprise September 3, 2025
  • Google is giving a free $240 offer to all Pixel 10 Pro users – how to redeem it September 3, 2025
  • I use these 3 hidden Pixel camera features for better videos instantly September 3, 2025

Copyright © 2025 IT Security News. All Rights Reserved. The Magazine Basic Theme by bavotasan.com.

Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}