Close Menu

    Subscribe to Updates

    Get the latest tech news from Tallwire.

      What's Hot

      Password Managers Share a Hidden Weakness

      March 1, 2026

      Say Goodbye to the Undersea Cable That Made the Global Internet Possible

      March 1, 2026

      Cybersecurity & Resilience Bill Raises Compliance Stakes For Providers

      February 28, 2026
      Facebook X (Twitter) Instagram
      • Tech
      • AI
      • Get In Touch
      Facebook X (Twitter) LinkedIn
      TallwireTallwire
      • Tech

        Say Goodbye to the Undersea Cable That Made the Global Internet Possible

        March 1, 2026

        Microsoft Copilot Bug Exposed “Confidential” Emails Despite Label

        February 28, 2026

        Taara Beam Launch Brings 25Gbps Optical Wireless Networks to Cities

        February 27, 2026

        Global Memory Shortage Set to Push Up Prices on Phones, Laptops, and More

        February 27, 2026

        OpenAI’s Stargate Data Center Ambitions Hit Major Roadblocks

        February 27, 2026
      • AI

        AI Password Generation Poses Major Security Risk, Experts Warn

        February 28, 2026

        Microsoft Copilot Bug Exposed “Confidential” Emails Despite Label

        February 28, 2026

        AI Productivity Gains Concentrated Among High-Skilled Workers, Study Finds

        February 28, 2026

        X to Let Users Mark Posts ‘Made With AI’ as Platform Eyes Voluntary Disclosure Feature

        February 27, 2026

        Uber Rolls Out “Uber Autonomous Solutions” To Support Third-Party Robotaxi Partners

        February 27, 2026
      • Security

        Password Managers Share a Hidden Weakness

        March 1, 2026

        AI Password Generation Poses Major Security Risk, Experts Warn

        February 28, 2026

        Microsoft Copilot Bug Exposed “Confidential” Emails Despite Label

        February 28, 2026

        Starkiller Phishing Kit Exposes Dangerous New Wave of Proxy-Based Credential Theft

        February 28, 2026

        Single Compromised Account Exposes 1.2 Million French Banking Records

        February 28, 2026
      • Health

        Social Media Addiction Trial Draws Grieving Parents Seeking Accountability From Tech Platforms

        February 19, 2026

        Portugal’s Parliament OKs Law to Restrict Children’s Social Media Access With Parental Consent

        February 18, 2026

        Parents Paint 108 Names, Demand Snapchat Reform After Deadly Fentanyl Claims

        February 18, 2026

        UK Kids Turning to AI Chatbots and Acting on Advice at Alarming Rates

        February 16, 2026

        Landmark California Trial Sees YouTube Defend Itself, Rejects ‘Social Media’ and Addiction Claims

        February 16, 2026
      • Science

        Microsoft Claims 100 Percent Renewable Energy Match Across Global Electricity Use

        February 28, 2026

        Taara Beam Launch Brings 25Gbps Optical Wireless Networks to Cities

        February 27, 2026

        Large Hadron Collider Enters Third Shutdown For Major Upgrade

        February 26, 2026

        Google Phases Out Android’s Built-In Weather App, Replacing It With Search-Based Forecasts

        February 25, 2026

        Microsoft’s Breakthrough Suggests Data Could Be Preserved for 10,000 Years on Glass

        February 24, 2026
      • Tech

        Sam Altman Says ‘AI Washing’ Is Being Used to Mask Corporate Layoffs

        February 28, 2026

        Zuckerberg Testifies In Landmark Trial Over Alleged Teen Social Media Harms

        February 23, 2026

        Gay Tech Networks Under Spotlight In Silicon Valley Culture Debate

        February 23, 2026

        Google Co-Founder’s Epstein Contacts Reignite Scrutiny of Elite Tech Circles

        February 7, 2026

        Bill Gates Denies “Absolutely Absurd” Claims in Newly Released Epstein Files

        February 6, 2026
      TallwireTallwire
      Home»Tech»Major Supply-Chain Hack Hits Over 200 Firms via Gainsight-Salesforce Link
      Tech

      Major Supply-Chain Hack Hits Over 200 Firms via Gainsight-Salesforce Link

      4 Mins Read
      Facebook Twitter Pinterest LinkedIn Tumblr Email
      Major Supply-Chain Hack Hits Over 200 Firms via Gainsight-Salesforce Link
      Major Supply-Chain Hack Hits Over 200 Firms via Gainsight-Salesforce Link
      Share
      Facebook Twitter LinkedIn Pinterest Email

      In a serious data-security incident, Google‘s Threat Intelligence Group has confirmed that hackers stole data from more than 200 companies by exploiting apps published by Gainsight that connect to Salesforce instances. According to reports, the breach did not stem from a vulnerability in Salesforce’s core platform, but rather from an integration point—third-party apps using OAuth tokens and API connections to access sensitive data. The hack should serve as a sharp reminder that even when main platforms are secure, the ecosystem of connected apps and services can present a wide attack surface. The incident is yet another example of how supply-chain vulnerabilities within enterprise software can afford threat actors prolific access to data across many organizations.

      Sources: TechRadar, Cyber Security Dive

      Key Takeaways

      – The breach illustrates that the weakest link in enterprise security may be third-party integrations, not the primary platform itself.

      – More than 200 Salesforce customer instances may have been affected through Gainsight-published apps, suggesting broad impact across multiple industries.

      – Swift incident response — token revocations, pausing of integrations, and ecosystem audit — is critical once unauthorised access is detected.

      In-Depth

      The recent disclosure by Google’s Threat Intelligence Group that hackers accessed and stole data from over 200 companies through compromised apps published by Gainsight underscores a growing, but still under-publicised threat vector in enterprise cloud security. According to the detailed reporting, the attack did not exploit a flaw in Salesforce’s platform itself. Instead, threat actors leveraged the ecosystem of connected applications: apps developed by Gainsight, which integrate into Salesforce environments, were the conduit. These integrations often rely on OAuth tokens, API permissions, and cross-system trust relationships. Once the attackers had those tokens or abused the token refresh mechanism, they could view or extract underlying customer data in the broader environment.

      In one article, it’s noted that the breach stemmed from “the app’s external connection to Salesforce,” per Salesforce’s post-incident statement. The fact that Salesforce emphasised “there is no indication that this issue resulted from any vulnerability in the Salesforce platform” instead suggests the focus should be on the third-party linkages. On the surface this may seem like splitting hairs, but for enterprise security teams the implication is profound: it’s not enough to lock down the cloud-platform perimeter; you must also govern all apps and partners that plug into your systems.

      At least three key defensive lessons emerge. First, organizations must inventory and monitor all connected third-party apps, including rarely-used integrations, and assign least-privilege permissions rather than allowing broad custom integrations. Second, the token and API access model needs constant auditing—refresh tokens, long-lived credentials, and excessive scopes are especially high-risk. Third, incident response must oversee not just the primary platform but the entire software-supply-chain – including vendor integrations, channel partners, and inter-system data flows. In this case, once the breach was detected, Salesforce revoked all active and refresh tokens associated with Gainsight-published apps and temporarily removed those apps from the AppExchange, while Gainsight announced rotating credentials, isolating VPN access, and asking customers to rotate S3 keys.

      To conservative-minded enterprises wary of regulatory risk, reputational damage, and cross-industry impact, the message is clear: compliance and security frameworks must extend beyond “just the main system” to vigilantly include every adjacent integration. The threat actors here reportedly include groups like ShinyHunters and Scattered Lapsus$ Hunters, known for leveraging compromised tokens and third-party access into wide compromise campaigns. By targeting the supply-chain of SaaS integrations, rather than attempting to crack the main platform directly, they exploit the predictable trust relationships that software vendors and customers assume. In short: for enterprises that assume “our platform is secure so we’re safe,” this breach functions as a wake-up call. Token abuse, integration oversight, and vendor risk must now sit front-and-centre in enterprise risk management. The consequences of ignoring this shift aren’t hypothetical — hundreds of companies already seem to have paid the price.

      Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
      Previous ArticleMajor Music Labels Forge Licensing Deals With AI Startup
      Next Article Malaysia To Ban Social Media Use For Under-16s Starting 2026

      Related Posts

      Say Goodbye to the Undersea Cable That Made the Global Internet Possible

      March 1, 2026

      Microsoft Copilot Bug Exposed “Confidential” Emails Despite Label

      February 28, 2026

      Taara Beam Launch Brings 25Gbps Optical Wireless Networks to Cities

      February 27, 2026

      Global Memory Shortage Set to Push Up Prices on Phones, Laptops, and More

      February 27, 2026
      Add A Comment
      Leave A Reply Cancel Reply

      Editors Picks

      Say Goodbye to the Undersea Cable That Made the Global Internet Possible

      March 1, 2026

      Microsoft Copilot Bug Exposed “Confidential” Emails Despite Label

      February 28, 2026

      Taara Beam Launch Brings 25Gbps Optical Wireless Networks to Cities

      February 27, 2026

      Global Memory Shortage Set to Push Up Prices on Phones, Laptops, and More

      February 27, 2026
      Popular Topics
      Startup Sundar Pichai Series A Satya Nadella Samsung Robotics Quantum computing Tim Cook Qualcomm Ransomware Tesla Series B SpaceX Taiwan Tech UAE Tech trending picks Tesla Cybertruck Sam Altman spotlight
      Major Tech Companies
      • Apple News
      • Google News
      • Meta News
      • Microsoft News
      • Amazon News
      • Samsung News
      • Nvidia News
      • OpenAI News
      • Tesla News
      • AMD News
      • Anthropic News
      • Elbit News
      AI & Emerging Tech
      • AI Regulation News
      • AI Safety News
      • AI Adoption
      • Quantum Computing News
      • Robotics News
      Key People
      • Sam Altman News
      • Jensen Huang News
      • Elon Musk News
      • Mark Zuckerberg News
      • Sundar Pichai News
      • Tim Cook News
      • Satya Nadella News
      • Mustafa Suleyman News
      Global Tech & Policy
      • Israel Tech News
      • India Tech News
      • Taiwan Tech News
      • UAE Tech News
      Startups & Emerging Tech
      • Series A News
      • Series B News
      • Startup News
      Tallwire
      Facebook X (Twitter) LinkedIn Threads Instagram RSS
      • Tech
      • Entertainment
      • Business
      • Government
      • Academia
      • Transportation
      • Legal
      • Press Kit
      © 2026 Tallwire. Optimized by ARMOUR Digital Marketing Agency.

      Type above and press Enter to search. Press Esc to cancel.